Critical Alliances, Unmitigated Failure, Flawed Oracle, Cybersecurity Strength is Power, Vulnerable Android Phones, and Hiding Behind a Name. It's CISO Intelligence for Friday 18th April 2025.
A melding of security functions, when there's not enough tea to fix a disaster, a rip in the clouds, the Senate says "More," cheap phones and deadly tricks, and not so shiny Chrome.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. National Security Meets Cybersecurity: The CNSS Instruction Tango
2. A Law Firm, a Ransomware Attack, and a Whole Lot of Confidential Data
3. The Oracle Predicament: When Clouds Spill More Than Rainwater!
4. US Senators Push for Stronger Cybercrime and Computer Fraud Legislation
5. Nice Chatting with You: What Connects Cheap Android Smartphones, WhatsApp, and Cryptocurrency Theft?
6. Chrome Extensions: Secret Agents of Surveillance
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
National Security Meets Cybersecurity: The CNSS Instruction Tango
_Because when it comes to national security, even your grandma’s cookie recipes might be vulnerable._
What You Need to Know
The article dives into the evolving landscape of CNSS (Committee on National Security Systems) instructions, which are critical for aligning your organization's cybersecurity posture with national security requirements. Executive leaders are expected to understand the implications of these regulations fully and ensure their organizations are compliant. Immediate action includes reviewing current cybersecurity frameworks and conducting a gap analysis to integrate CNSS guidelines.
CISO Focus: Cybersecurity Governance and Compliance
Sentiment: Neutral
Time to Impact: Immediate
*
With the rapid evolution of cyber threats, adhering to established cybersecurity guidelines has become more critical than ever. The CNSS instructions offer integral frameworks to synchronize organizational cybersecurity efforts with national security standards. As weak points in cybersecurity can impact national integrity, organizations are increasingly recognized as frontline defenders.
Key Insights from the CNSS Instructions
The Urgency of Compliance
CNSS instructions are pivotal for any organization involved with national security systems or data. These directives are not just suggestions but essential compliance mandates that protect sensitive national data from increasingly sophisticated cyber threats. Embracing these instructions is indispensable to fortify not only national security but also the integrity of your organization’s infrastructure.
Understanding the Directives: CNSS instructions are designed to be comprehensive. They entail rigorous criteria necessary to shield information systems from breaches.
Mandatory for Government Entities: These guidelines are a necessity for federal agencies and contractors. However, businesses working in sectors critical to national security will benefit from early adoption.
Strategic Alignment and Core Objectives
Organizations must conduct a thorough gap analysis to compare their existing cybersecurity measures against CNSS standards. Such alignment will ensure robust security postures that are synchronized with broader national security initiatives.
Core guidelines include: Risk Management Framework (RMF), certification and accreditation processes, and ongoing surveillance.
Integration into Policies: These should be ingrained in the organizational structure, forming the backbone of security protocols.
The Road Ahead: Implementation and Impact
As the landscape shifts, a proactive approach in implementing CNSS standards can significantly reduce the risk of cyberattacks. Close collaboration between C-level executives and IT departments will pave the way to seamless integration of these instructions.
Immediate Actions Required: Execute a comprehensive cybersecurity audit aligned with CNSS directives.
Training & Awareness: Educate teams about the importance of CNSS standards in maintaining a national cyber defense posture.
Technological Upgrade: Ensure that your tools and systems are up-to-date and capable of meeting CNSS standards.
The instructions are engineered to propel organizations toward a state of high resilience and readiness against cyber threats. The stakes are high — a breach could have ramifications well beyond financial losses, potentially endangering national security. Your role in this ecosystem is both pivotal and significant.
Dancing to the National Security Beat
As CNSS instructions form an essential part of national defense against cyber threats, ensuring that your organization not only understands but integrates these protocols can mean the difference between vulnerability and resilience. As cyber threats loom large, it’s time for organizations to step up and secure not just their own interests but also contribute to the national security framework.
*
Vendor Diligence Questions
1. How do your current security protocols align with CNSS standards, and can you provide a compliance roadmap?
2. What experience do you have in integrating CNSS instructions into existing IT frameworks?
3. How equipped are your solutions in managing and monitoring compliance on an ongoing basis?
Action Plan
1. Assess Current Security Posture: Conduct a cyber defense audit to identify gaps in compliance with CNSS instructions.
2. Develop a Compliance Strategy: Formulate a strategic plan focusing on closing identified gaps and onboarding CNSS protocols.
3. Engage with Vendors: Establish vendor agreements ensuring that third-party solutions comply with CNSS standards.
4. Internal Training Programs: Initiate comprehensive education programs to increase organizational awareness about the CNSS guidelines.
*
Source: CNSS Instruction: Why It’s Critical for National Security and Your Organization
*
A Law Firm, a Ransomware Attack, and a Whole Lot of Confidential Data
_Confidentiality is not just a pledge—it's an obligation. Turns out, it’s one British law firm’s very expensive oversight._
What You Need to Know
As a high-level executive, it's crucial to be aware of the recent incident involving a British law firm that faced significant financial penalties following a ransomware attack. Confidential client data was leaked online after the law firm failed to adhere to necessary cybersecurity standards. This incident serves as a reminder for all organizations to reassess their cybersecurity architecture and compliance with data protection laws. Take immediate action to bolster your cyber defenses, emphasize internal training, and bring your third-party vendors under greater scrutiny.
CISO Focus: Data Breaches and Ransomware
Sentiment: Negative
Time to Impact: Immediate
*
Law Firm Fined Post-Ransomware Data Spill
Ransomware attacks have been the bane of the digital age, and when a prestigious British law firm found themselves on the wrong end of such an attack, the disaster only magnified from there. The ransomware group not only breached the firm’s security net but also published swathes of their confidential client information, leading to severe repercussions, including a hefty fine.
A Costly Infiltration
The invasion, which compromised sensitive legal documents and personal information, has resulted in regulatory fines due to non-compliance with data protection laws. It accentuates the trivialization of proactive cybersecurity measures and the heavy price paid for security oversights.
* Regulatory Actions: The law firm faced penalties that serve as a harsh lesson on securing client data. Regulatory bodies demanded the firm improve its data protection measures to prevent future breaches.
* Client Trust Eroded: This breach did not merely attract financial censure but also tarnished the law firm’s reputation. Client trust, once lost, takes years to rebuild—a luxury not every business can afford in a competitive landscape.
What Went Wrong?
The crux of the issue lay in the inadequate cybersecurity protocols employed by the firm. Despite the widespread knowledge of ransomware tactics and maneuvers, the law firm's security measures were either outdated or insufficiently enforced, making it an easy target.
* Lack of Robust Defense: Absence of layered network defenses made it easier for the cybercriminals to access their systems, and a lack of regular vulnerability assessments allowed minor security lapses to grow into substantial threats.
* Insufficient Backup Systems: A flawed backup strategy meant that even after the attack, data restoration was laborious, making the organization contemplate paying the ransom—a grave mistake.
* Untrained Personnel: The staff's lesser-known proficiency in cybersecurity protocols contributed to the speed and magnitude of the attack's success. Without adequate training, employees are the weakest link in cybersecurity defenses.
Prevent, Don’t Repent
For other firms, this serves as an authoritative nudge to revisit their security frameworks. The cost of prevention starkly outweighs the financial and reputational hits of post-breach reparations.
* Enhanced Cyber Hygiene: Companies must commit to enhancing their cybersecurity protocols, investing in cutting-edge technologies, and fostering a culture of diligence.
* Regular Audits and Training: Security audits should be routine, not reactive. Regular training and simulation exercises should also be implemented to keep staff alert to potential threats.
* Vendor Management: Third-party vendors need to be evaluated critically. The cybersecurity strength of any partner can directly impact your firm’s safety.
Remember, closing the barn door after the horse has bolted offers little solace in the realm of cybersecurity. Like Alice chasing the White Rabbit, you might find yourself tumbling into a deep, dark pit of cyber chaos. Best to build a secure perimeter than venture too far into the digital Wonderland unprepared.
*
Vendor Diligence Questions
1. What protocols do you have in place to protect client data from ransomware attacks?
2. Can you demonstrate your history of compliance with relevant cybersecurity standards?
3. How do you ensure that your backup systems are secure and efficient during a cyber incident?
Action Plan
1. Review and Fortify: Immediately review and strengthen cybersecurity policies to enhance defenses.
2. Staff Deployment: Ensure all staff receive role-specific cybersecurity training focusing on threat recognition and response.
3. Implement Monitoring Tools: Employ real-time detection systems to rapidly identify and mitigate unauthorized access.
4. Vendor Audits: Conduct comprehensive audits on all third-party service providers to ensure their compliance with data protection benchmarks.
5. Communication Strategy: Develop a strategic communication plan for handling breach disclosures.
*
Source: British law firm fined after ransomware group publishes confidential client data
*
The Oracle Predicament: When Clouds Spill More Than Rainwater!
_Oh Oracle, you had one job, but it seems you’ve been spilling more than just beans!_
What You Need to Know
The cybersecurity community is in a state of heightened alert following the revelation of a significant Oracle Cloud infrastructure breach. This exposure has potentially amplified risks for numerous businesses relying on Oracle's cloud services. As a senior executive, you need to immediately review your organization's dependencies on Oracle Cloud, reevaluate your risk management strategies, and prepare for potential operational disruptions. Prioritize reaching out to the CISO for a comprehensive cybersecurity response plan.
CISO focus: Cloud Security and Risk Management
Sentiment: Strong negative
Time to Impact: Immediate
*
Oracle's Cloud Conundrum: Increased Breach Risks
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert following revelations of a security lapse within Oracle's cloud infrastructure. The discovery has raised the concern of increased data breach risks among the businesses leveraging Oracle’s cloud services. The breach reportedly exposes a large cache of sensitive customer data, posing severe operational and reputational risks.
Key Details of the Breach
Last week, Oracle’s cloud division unintentionally exposed a massive volume of sensitive data through misconfigured cloud-related settings. Security researchers found that certain data compartments were not adequately secured, leaving them vulnerable to unauthorized access. This vulnerability has placed data at risk of being compromised, leading to immediate apprehension among Oracle’s extensive user base, which includes enterprises across various sectors.
Potential Fallout for Organizations
It is crucial now for organizations to assess their exposure to this breach. The breach sheds light on internal and vendor-related cyber vulnerabilities, potentially compromising sensitive business operations. Affected enterprises must urgently address these vulnerabilities, mitigate risks, and ensure compliance with data protection regulations.
Impact Assessment
Operational Disruptions : Organizations heavily relying on Oracle services can expect possible disruptions as security protocols are fortified.
Reputational Damage : Exposure of client data can lead to public relations challenges.
Financial Legitimacies : Potential regulatory fines or legal actions could affect enterprises neglecting prompt response measures.
CISA's Recommendations
CISA urges organizations utilizing Oracle Cloud to:
Conduct a detailed audit of their cloud configurations.
Implement enhanced security monitoring and logging practices to detect any unusual activities.
Review and update incident response strategies tailored to cloud environments.
Businesses' Immediate Concerns
The exposure calls for immediate action to reassess data privacy compliance. Corporations must take a hard look at their cloud storage policies and deploy multilayered security measures to safeguard against similar threats.
The Silver Lining: An Opportunity for Reinforcement
While the breach poses significant challenges, it also serves as a catalyst for refining cybersecurity approaches, particularly concerning third-party cloud service providers. Organizations should explore reinforcing cybersecurity best practices and educating stakeholders on heightened vigilance in cloud interactions.
*
Vendor Diligence Questions
1. What measures has Oracle implemented post-incident to prevent future misconfigurations?
2. How does Oracle ensure continuous monitoring and security updates across its cloud offerings?
3. Can Oracle provide evidence of compliance with leading cybersecurity frameworks or standards post-breach?
Action Plan
Immediate Steps Suggested
Data Review : Re-evaluate the types of data stored within Oracle Cloud and assess the sensitivity levels.
Strengthen Access Controls : Implement stringent access management to ensure only authorized personnel have data access.
Employee Training : Regular workforce training to recognize potential security breaches or misconfigurations.
Ongoing Steps
1. Audit Oracle Dependencies : Examine all Oracle Cloud dependencies thoroughly.
2. Review and Update Security Policies : Apply strict security protocols tailored for cloud environments.
3. Engage with Oracle : Direct communication with Oracle for updates on security improvements and breach mitigation strategies.
4. Educate Stakeholders : Initiate cybersecurity awareness programs focusing on cloud vulnerabilities.
*
Source: CISA warns of increased breach risks following Oracle Cloud leak
*
US Senators Push for Stronger Cybercrime and Computer Fraud Legislation
_Just when you thought it was safe to log on..._
What You Need to Know
US Senators are advocating for enhanced cybersecurity measures to counter rising cybercrime. Legislation is proposed to strengthen laws against computer fraud and criminal activities online. This move aims to bolster national cybersecurity defenses and protect sensitive data across various sectors. Executive management must assess the proposed legislative changes, grasp their implications for corporate security posture, and strategize compliance efforts effectively.
CISO focus: Legislative Compliance and Cybercrime Mitigation
Sentiment: Positive
Time to Impact: Short (3-18 months)
*
Tighter Cybercrime Legislation on the Horizon
In today's increasingly connected world, cybercrime remains a pernicious threat undermining security across governmental, corporate, and personal domains. In response, US Senators are advocating for stronger cybercrime and computer fraud legislation designed to tighten the proverbial net around cybercriminal activities.
Immediate Stakes
As linked in the report by Tripwire, the legislation aims to enhance existing frameworks governing cybercrime, equipping authorities with necessary tools to tackle modern digital threats more effectively. The proposed legislative amendments intend to fortify the Computer Fraud and Abuse Act (CFAA)—a key national statute tackling cybercrime.
Modernizing CFAA : The enhancement focuses on broadening definitions of unauthorized access and activity scope, thus reflecting current cyber risks.
Increased Penalties : By imposing harsher penalties on cybercriminals, proponents believe it will serve as a deterrence for potential offenders.
The initiative has garnered bipartisan support, which fuels its likelihood of fruition within a relatively short timeline—a point of relief amidst otherwise polarized political landscapes. This shift looks to provide much-needed resilience against cyber threats, promising immediate benefits for national cybersecurity posture.
Implication Flashpoints
Understanding the nuanced implications of these legislative changes is critical for businesses and individuals alike. Enhanced laws could significantly change compliance requirements:
1. Corporate Accountability : Organizations must adapt to heightened legal accountability for safeguarding digital assets and compliance with federal guidelines.
2. Data Protection Standards : Reinforced data protection standards are likely to emerge, requiring bolstered data encryption and access controls.
3. International Influence : Global firms operating with U.S. interests need to anticipate comparable adjustments to international cybercrime frameworks.
These areas pose challenges but also offer opportunities for improved security measures and company practices. Proactive compliance can become a competitive edge, providing better security assurances to customers and stakeholders.
Cautionary Annoyances
Opponents of the legislative changes caution against overreach and potential negative impacts on innovation. The worry is that stiffer penalties and broader definitions could discourage technological experimentation and entrepreneurial spirit. They advocate for balanced regulations that preserve flexibility and nurture innovation.
Further debate will likely unfold as detailed legislative language develops, with industry voices weighing in to shape pragmatic, balanced solutions.
"Crime Doesn't Pay (Enough to Justify the Risk)"
As we peer towards a horizon with potentially more stringent cybersecurity laws, the promise of added protection comes with its share of hurdles. Entities can start preparing by focusing on awareness, resilience, and strategic partnerships that align with legislative directives.
Proactive Steps Recommended
As businesses anticipate the regulatory changes, proactive adaptation is prudent:
Security Audits : Engage in comprehensive security audits to ensure systems align with best practices and anticipated requirements.
Training Programs : Implement regular training to update employees on emerging threats and internal security policies.
Tech Investments : Explore technology investments that automate compliance and boost threat detection capabilities.
By staying ahead of potential compliance challenges, organizations can ameliorate risks and turn new requirements into strategic opportunities for strengthening their defenses in the digital ecosystem.
*
Vendor Diligence Questions
1. How does your product align with the latest cybersecurity legislative requirements, particularly regarding unauthorized access?
2. Can your services facilitate compliance with anticipated changes in data protection standards?
3. What advancements have your technologies made to adapt to enhanced cybersecurity mandates?
Action Plan
1. Assessment : Conduct a detailed review of current security practices against anticipated legislative standards.
2. Policy Updates : Develop or amend cybersecurity policies in anticipation of new compliance requirements.
3. Stakeholder Briefings : Host sessions to brief key stakeholders on proposed legislative changes and their implications.
4. Monitoring and Adjustment : Establish a system to monitor legislative developments and adjust strategies dynamically.
*
Source: Tripwire State of Security
*
Nice Chatting with You: What Connects Cheap Android Smartphones, WhatsApp, and Cryptocurrency Theft?
_Oh WhatsApp? More like What's Up with our crypto, Mr. Scammer?_
What You Need to Know
The rise in cryptocurrency usage has inadvertently attracted cybercriminals looking to exploit vulnerabilities within the ecosystem. Recently, suspicious apps disguised as WhatsApp are being pre-installed in cheap Android smartphones to facilitate cryptocurrency theft. This poses a significant risk to individuals and organizations utilizing such devices. Board members and executives should prioritize the assessment of current mobile policies and strengthen internal controls to protect company and personal cryptocurrency assets.
CISO Focus: Mobile Security Threats
Sentiment: Strong Negative
Time to Impact: Immediate
*
Cryptocurrency adoption rates are skyrocketing globally, leading to sophisticated scamming operations targeting tech-savvy users. In a recent investigation by Dr. Web's virus laboratory, cheap Android smartphones became a focal point of a large-scale plot revolving around a malicious WhatsApp app targeting cryptocurrency holders.
The Current Threat Landscape
In mid-2024, Dr. Web began receiving complaints from users who had installed their antivirus software on newly purchased Android phones, only to discover a fake version of WhatsApp lurking in the system partition. These were not isolated incidents but a part of a coordinated campaign to siphon off cryptocurrency through a technique known as "clipping"—switching legitimate wallet addresses with malicious ones to reroute funds during transactions.
Why Cheap Android Smartphones Are the Perfect Targets
Pre-installed Vulnerabilities: Many inexpensive Android devices come with pre-installed software, often without sufficient quality control, making them fertile ground for embedded malware.
Wide Reach: These smartphones are particularly popular in regions with developing banking infrastructure, where cryptocurrency is a widely adopted alternative.
User Trust: Users tend to trust pre-installed apps, thinking they are vetted by manufacturers, making them less suspicious of potential threats.
Unmasking the Fake WhatsApp
Upon deeper investigation, it was revealed this app mimicked the popular messaging service nearly perfectly at the front end. However, in the background, the machinery was set to dig into cryptocurrency exchanges and digital wallets. Victims were completely unaware of the scam until funds started disappearing from their wallets.
How the Clipping Attack Works
Monitoring Clipboard Data: The malicious app silently monitors clipboard data for cryptocurrency wallet addresses.
Interception and Injection: When a wallet address is copied to the clipboard, the malware intercepts it and replaces it with an address belonging to the cybercriminals.
Completion of Transaction: The unsuspecting user completes a transaction, unknowingly sending funds to the attackers.
Critical Implications for Businesses and Individuals
For both businesses and users, the repercussions are significant:
Financial Loss: The irreversibility of cryptocurrency transactions means stolen funds are likely gone forever.
Erosion of Trust: Companies using Android devices might face reputational damage and loss of client trust if data breaches occur.
Compliance Concerns: Heightened risks necessitate reevaluation of compliance measures concerning digital asset management.
Securing the Enterprise
Immediate steps must be taken to prevent such vulnerabilities:
Mobile Device Management (MDM): Deploy MDM solutions to control the installation of apps and monitor device integrity.
Employee Education: Train employees on safe cryptocurrency handling, emphasizing the dangers posed by clipboard monitoring.
Regular Audits: Conduct frequent audits of pre-installed device software to catch anomalous apps early.
As cryptocurrencies gain traction, so do the schemes devised to exploit them. Mobile security, particularly in seemingly innocuous applications, requires a sharper focus, lest that beachside WhatsApp chat takes more than your time.
*
Vendor Diligence Questions
1. What measures do you have in place to ensure pre-installed apps are thoroughly vetted and free of malware?
2. How do you handle software updates for your devices to protect against emerging threats?
3. Can you provide a history of addressing past vulnerabilities in your devices?
Action Plan
1. Device Inventory Assessment: Identify and classify all Android devices used within the organization.
2. Policy Update: Revise existing mobile security policies to include security controls specific to cryptocurrency applications.
3. Technical Controls Implementation: Create automated alerts for detecting and responding to suspicious app installations.
4. User Awareness Campaign: Launch a cybersecurity awareness campaign specifically aimed at educating users about threats to cryptocurrency.
*
Source: Dr. Web News
*
Chrome Extensions: Secret Agents of Surveillance
_If your Chrome extensions start acting sketchy, it’s not them, it’s definitely them._
What You Need to Know
In a startling cyber revelation, several popular Chrome extensions, aggregating over 6 million installations, are suspected of embedding hidden tracking codes, prompting significant privacy concerns. Executives must prioritize auditing software use policies and instigating a review of third-party extensions company-wide. Ensure IT teams are aware and prepared to mitigate potential privacy breaches and related risks.
CISO focus: Software Supply Chain Security
Sentiment: Strong Negative
Time to Impact: Immediate
*
Extensions with a Hidden Agenda
In a recent security exposé, many widely installed Chrome extensions—some boasting over six million downloads—have been identified carrying clandestine tracking codes. This alarming discovery opens up potential avenues for mass data harvesting, customer profiling, and security breaches. As we strive for seamless tech integrations in our daily operations, this revelation acts as a sobering reminder of the lurking threats beneath user-friendly interfaces.
These Chrome extensions, used by millions worldwide, are not mere tools but surreptitious vectors of unauthorized data mining. Unbeknownst to users, these add-ons track online behavior, collecting personalized data that can be monetized or exploited. The implications are profound, calling into question the trust placed in app ecosystems managed by tech giants like Google.
The Unseen Eye: How We Got Here
The stealthy tracking embedded within these extensions stems from obfuscated JavaScript code, deliberately hidden to avoid detection. This code operates secretly in the background, sending user information to remote servers managed by unknown third parties. Reports indicate that this method has broadened its reach with digital footprints leading back to undisclosed entities misusing the collected data for unknown ends.
*
Vulnerabilities and Risks
Massive Data Collection: The covert tracking system leads to vast amounts of personal data stored across unsecured networks, increasing vulnerabilities to data breaches.
User Trust Erosion: As users become aware of privacy invasions, trust in digital marketplaces and browser ecosystems may erode significantly.
Regulatory Backlash: Surveillance loopholes could lead to stringent policy revisions and fines from data protection authorities, impacting businesses that rely on such extensions.
On the Frontline of Damage Control
In the face of these daunting revelations, cybersecurity stakeholders must pivot towards immediate damage control strategies:
Systematic Audits: Conduct comprehensive audits of all third-party software integrations, closely examining extensions for unauthorized code.
Enhanced Permissions: Re-evaluate permission structures afforded to installed extensions, restricting data access based on necessity.
User Education: Initiate training programs highlighting responsible digital habits, encouraging the use of verified tools only.
Playing Catch-Up or Getting Ahead?
As Chrome users and tech companies grapple with these revelations, the fundamental question remains: Are we playing defense in a losing game, combating threats one breach at a time? The path forward must involve proactive measures such as stringent vetting processes in app markets, developing robust policies regarding extensions, and raising awareness on data privacy.
Solutions extend beyond merely addressing the symptoms, demanding a meticulous overhaul of user consent industries—a shift from reactive policies to adaptive strategies that anticipate potential cyber threats.
The situation demands a rapid response. As this scenario underscores, even trusted platforms are susceptible to vulnerabilities. Organizations must remain vigilant, adapting to evolving threats with agility and foresight to safeguard sensitive information in an increasingly digital landscape.
*
Vendor Diligence Questions
1. Can vendors provide a comprehensive audit trail showcasing their extension development and maintenance processes?
2. What mechanisms are in place to secure user data and ensure compliance with privacy regulatory frameworks?
3. How frequently are vendor extensions subjected to security reviews and third-party audits for malicious codes?
Action Plan
1. Initiate an Immediate Audit: Direct IT teams to scrutinize every installed extension for unauthorized tracking scripts and remove compromised extensions promptly.
2. Communicate Best Practices: Disseminate guidelines on secure extension use and warn employees against installing unverified browser add-ons.
3. Collaborate with Google: Engage with Chrome's security teams, pushing for transparency and improvement in detecting and removing malicious extensions.
*
Source: Chrome extensions with 6 million installs have hidden tracking code
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

