Cyber Kombat, Sophisticated Web Slinging, Intel Flaws Inside, Sleight of Email, Protection by Numbers, and Raising the Ransomware Game. It's CISO Intelligence for Monday 19th May 2025.
Taking cyber defense to the mat, snake oil sellers, critical weakness, full-service phishing, going through the full checklist, and inserting squatters into the system.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. The Land of Rising Cyberdefense: Japan's New Offensive Cyber Law
2. The Art of Spider Whispering: Scattered Spider’s Trickery Exposed
3. Intel's "Flaw-Some" Memory Leak and Spectre v2 Revelation
4. Operation RoundPress: Phishing for Your Credentials in a Coffee Mug
5. Data Protection: Because We All Love a Good Security Blanket
6. Ransomware Gangs: Now with More Skitnet!
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
The Land of Rising Cyberdefense: Japan's New Offensive Cyber Law
_When cyber punches get thrown, Japan's throwing them back, with precision._
What You Need to Know
Japan has enacted its new Active Cyberdefense Law, fundamentally shifting its cyber policy to include proactive and offensive measures. As part of this legislative change, organizations must prepare to deal with potentially more aggressive stances in international cyberdiscourses and conflicts. Executive groups should closely monitor Japan's implementation strategy and anticipate shifts in international cybersecurity norms. Your organization is expected to evaluate its own defensive capabilities and assess the impact of Japan’s policy on its strategic cybersecurity objectives.
CISO focus: Cyber Policy and International Cybersecurity
Sentiment: Positive
Time to Impact: Short (3-18 months)
*
Navigating Japan's New Active Cyberdefense Law on the Cyber World Stage
Japan has entered a new era in its cybersecurity strategy through the enactment of the Active Cyberdefense Law, allowing the country to conduct offensive cyber operations. This pivotal move positions Japan alongside a select group of nations embracing a more assertive cyber posture.
Legislative Game-changer
The newly enacted law empowers Japan to deploy offensive measures in response to cyber threats, an evolution from its historically defensive stance. The legislation seeks to deter cybercrimes more effectively by allowing counteractive operations against aggressors. This change has been largely driven by increasing vulnerability to sophisticated cyberattacks that previously went unpunished and often untraceable. Japan's new strategy reflects a growing global sentiment towards assertive cyber policies as essential in curbing rampant cybercrime.
Origins of the Law
Japan's journey to this legislative milestone was not abrupt. The nation had been fortifying its cybersecurity framework for years, partly motivated by high-profile cyber incidents that exposed vulnerabilities. With the Tokyo 2020 Olympics and subsequent high-tech infrastructure initiatives, cybersecurity became a priority. The transition to an active defense involved rigorous debate over ethical considerations and alignment with international law.
Key Components of the Law
Authorization for Offensive Measures : The law enables Japan to engage in pre-emptive strikes against cyber threats to its national security.
Regulated Engagement Protocols : A stringent set of regulations governs the execution of offensive operations, ensuring they remain proportionate and traceable.
Collaboration with Allies : Japan emphasizes working collaboratively with international partners, ensuring operations align with shared goals and ethical standards.
International Implications
Japan’s legislative shift could lead to significant changes in how nations view and engage in cyberspace. Its proactive stance could prompt recalibration in international cyber treaties and norms, pushing other countries to revisit their cybersecurity strategies. Especially under scrutiny is how Japan's approach might influence its relationships with critical partners like the United States and its positioning within regional power dynamics involving China and North Korea.
Industry Reactions
As Japan embarks on this new path, industries globally are urged to reassess their cyber defenses. There's anticipation around the economic implications, particularly concerning the tech and defense sectors. Cybersecurity firms are expected to ramp up innovations, driven by increased governmental demand for offensive capabilities. The shift could instigate a redefinition of national security that emphasizes cyber capabilities as a core deterrent.
Speed Bumps Ahead
The enactment of Japan’s new law is not without its challenges. Critics voice concerns over the potential for escalated cyber conflicts and ethical issues regarding sovereign rights and impact on civilian cyber infrastructure. Japan’s response to these criticisms will shape the law's acceptance and efficacy on the global stage. Transparency and adherence to international standards will prove crucial in assuaging public and diplomatic concerns.
Ethical Nihonga Musing
As Japan navigates its newfound cyber landscape, the world watches closely, interpreting its movements as potential precursors to broader shifts in global cyber relations. This offensive stride against cyber threats not only exemplifies a new Japanese stance but challenges the international community to balance security measures and cyber ethics. Through this evolution, Japan aims to paint a resilient landscape, one cyber brushstroke at a time.
*
Vendor Diligence Questions
1. How do you ensure compliance with international cyber offensive laws and ethical standards?
2. What collaboration strategy do you have in place with governmental bodies for offensive cybersecurity operations?
3. Have you conducted a risk assessment on potential repercussions of engaging in offensive cyber operations?
Action Plan
Assess current threat intelligence capabilities and identify gaps in offensive readiness aligned with international laws.
Initiate a training program to familiarize cybersecurity teams with the tactical and ethical aspects of offensive cyber operations.
Engage with industry peers to understand potential shifts in cybersecurity strategies as influenced by Japan’s new law.
*
Sources:
* Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations (Databreaches.net)
*
The Art of Spider Whispering: Scattered Spider’s Trickery Exposed
_Not all heroes wear capes—some wear headsets and fake accents._
What You Need to Know
In a chilling revelation, cybersecurity experts, including a former NSA victory-turned-hunter, have exposed the sophisticated social engineering tactics used by Scattered Spider, a notorious hacking group. Executives are urged to reevaluate security protocols and invest in user training to combat these innovative deceit strategies.
CISO Focus: Social Engineering and Insider Threats
Sentiment: Strong Negative
Time to Impact: Immediate
*
When Hackers Play the Help Desk: A Security Tale
In an unsettling exposé that reads like a page-turning thriller, cybersecurity analysts have revealed Scattered Spider's cunning social engineering antics that mimic legitimate help desk activities to infiltrate corporate systems. Led by a peculiar mix of bravado and technical prowess, these "faithful impersonators" have left cybersecurity personnel scrambling to catch up. In a recent session intercepted by cybersecurity analysts, an ex-NSA operative found himself both astounded and begrudgingly impressed by the hackers' finesse.
The Scattered Spider Technique
Imitation Game : Hackers impersonate help desk staff, using convincing scripts and even emotionally charged narratives to dupe users into revealing sensitive info.
Deep Reconnaissance : Every detail, from employee ID numbers to departmental hierarchies, is meticulously researched, making their calls unnervingly convincing.
Layered Charades : Unlike run-of-the-mill phishing scams, their operations are layered, employing psychological tactics and cunning conversational tricks.
Real-World Implications
This elevated level of social engineering poses a direct threat to corporations and warrant immediate attention. The vulnerability exposed goes beyond technical infrastructure—it shines a light on the human factor, often the weakest link in the security chain. With methods this sophisticated, organizations are at risk of breaching not only data but brand trust and integrity.
What Makes This Different?
Human Touch : The calls are designed to play with the human psychological vulnerabilities.
Real-Time Adaptation : Operators adapt mid-conversation, responding dynamically to cues from the person they are impersonating or manipulating.
Multi-layered Deception : This isn't just about acquiring passwords—it’s about long-term infiltration and control.
Expert Insights
The analysis of these tactics underscores the necessity for a multifaceted security approach. Training employees to recognize warning signs of phishing and enhancing verification processes for internal calls have become pivotal. Furthermore, integrating AI-driven anomaly detection systems could help catch suspicious activities before they escalate.
Vendor Diligence Questions
1. How does your technology detect and respond to social engineering tactics similar to those used by Scattered Spider?
2. What training or educational resources do you offer to help organizations enhance their resistance to sophisticated social engineering attacks?
3. Can your systems integrate with our current infrastructure to provide real-time alerts and insights on potential internal threats?
Action Plan
1. Revise Security Protocols:
Update verification processes for all intra-company calls.
Mandate multi-level authentication for sensitive data access.
2. Employee Training:
Conduct simulated phishing and social engineering scenarios to enhance employee vigilance.
Develop a mandatory cybersecurity education program focusing on social engineering.
3. Tech Enhancements:
Deploy AI and machine learning tools to monitor and flag unusual patterns in communications.
Strengthen endpoint security to reduce risk from compromised devices.
4. Communication Strategy:
Issue internal memos to raise awareness of these new tactics.
Foster a culture of skepticism and verification when dealing with unsolicited requests for information.
5. Response Framework:
Establish clear protocols for responding to suspected breaches or unusual activities.
Ensure swift incident reporting channels are available to all staff.
The Flip Side of Philanthropy
As companies grapple with these sophisticated hacking attempts, a new breed of cybersecurity hero emerges—those blending the art of deception with enduring vigilance. With threats evolving at breakneck speed, it's imperative to remember that sometimes, the best defense is teaching everyone to think like a hacker.
*
Sources:
Databreaches.net, Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
CyberWire Daily, Strategies in combating sophisticated social engineering attacks.
Forbes, The human factor in cybersecurity: Why it’s your company’s biggest vulnerability.
*
Intel's "Flaw-Some" Memory Leak and Spectre v2 Revelation
_You can't spell 'Intel' without 'I,' 'N,' 'T,' and 'tangled CPU exploits'._
What You Need to Know
Executives, brace yourselves: Researchers have unveiled critical flaws in Intel CPUs that expose systems to memory leaks and Spectre v2 attacks. As Intel CPUs are ubiquitous in enterprise environments, this is a significant issue that requires immediate attention and coordinated action. Expect to engage with your IT and cyber defense teams to assess potential impacts, apply patches, and manage communications both internally and externally.
CISO Focus: Hardware Vulnerabilities
Sentiment: Strong Negative
Time to Impact: Immediate
*
A new report reveals critical vulnerabilities in Intel CPUs, which could lead to memory leaks and new versions of Spectre attacks. These flaws, identified by researchers, affect a wide swath of systems, demanding a swift response from both vendors and end-users to mitigate the potential risks.
An Overview of the Intel CPU Flaws
The recent findings unveiled by security researchers highlight previously undiscovered vulnerabilities in Intel’s processor architecture. The flaws, impacting performance management units, pave the way for sophisticated Spectre v2 attacks, which exploit speculative execution to leak sensitive data.
Despite Intel's longstanding reputation for robust architecture, these newly detected flaws compromise both server and client CPUs. The vulnerabilities can effectively aid attackers in bypassing traditional security measures, thus posing a formidable challenge to data security and user privacy.
Implications for Enterprises
For businesses relying heavily on Intel processors, the implications of these flaws are profound. Systems using affected processors are potential targets for data theft and unauthorized access. The threat landscape evolves with these findings, highlighting the necessity for a reassessment of current cybersecurity strategies.
Enterprises are urged to prioritize patch management and system updates while considering hardware replacements or vendor diversification to safeguard against these threats. The simultaneous discovery of variants of the Spectre v2 attack suggests a renewed vigilance in monitoring and mitigating such exploitation forms.
Potential Impact on the Industry
The ramifications of these CPU vulnerabilities extend beyond individual security and touch on industry standards and practices. Intel’s ongoing commitment to transparency and security can help restore confidence. However, the recurring nature of speculative execution attacks necessitates a paradigm shift in how chip security is architecturally approached.
Moreover, collaboration between hardware manufacturers and the cybersecurity community remains crucial to anticipate and deter such emerging threats. Investments in advanced research and development are vital to tracing and resolving new attack vectors before they become widespread.
Hardware Security: A Call to Arms
The new insights into Intel’s architectural vulnerabilities signal a broader call to arms for the tech industry’s handling of chip security. It’s critical that researchers, manufacturers, and end-users adopt a more integrated approach, ensuring that each layer of technology is meticulously secured against novel attack vectors.
For an immediate response, your technical teams should liaise with Intel and relevant software providers to remain informed on the latest developments and recommended actions. Employee education and readiness will form the backbone of an effective defense strategy against exploiting such high-profile vulnerabilities.
*
Vendor Diligence Questions
1. What measures are in place to detect and respond to known processor vulnerabilities?
2. How quickly can updates and patches be applied across a distributed environment?
3. What commitment does your vendor have towards transparency and proactive communication regarding security flaws?
Action Plan
Immediate Patch Implementation: Intel promises new patches to address these exploits. Companies need to prioritize their application across all affected systems.
Vulnerability Scanning: Rerun internal and external scans to identify where your systems may be vulnerable. Prioritize critical systems that handle sensitive user data or business processes.
Security Awareness: Elevate awareness campaigns regarding phishing and social engineering attacks, as attackers often leverage these tactics in conjunction with hardware exploits.
CISO Focus: Tactics and Implementation
Vendor Coordination: Work closely with Intel and other suppliers to ensure the timely receipt and application of necessary updates or patches.
Incident Response Enhancements: Refine incident response protocols to efficiently manage potential exploitations of similar vulnerabilities in the future.
Technology Risk Assessment: Reevaluate technology asset deployments considering the newly disclosed threats and adjust procurement strategies accordingly.
*
Source: Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
*
Operation RoundPress: Phishing for Your Credentials in a Coffee Mug
_Phishing: It's like trying to catch the best fish, sometimes you get the one swimming in your own pond._
What You Need to Know
Operation RoundPress is a sophisticated spearphishing campaign exploiting vulnerabilities in webmail platforms to execute malicious code and steal critical information. The attack's primary vector is a spearphishing email utilizing a cross-site scripting (XSS) vulnerability to upload malicious JavaScript payloads into the victim’s webmail interfaces including Roundcube, Horde, MDaemon, and Zimbra. Key targets of this campaign are government entities and defense companies, predominantly in Eastern Europe. The executive management is expected to ensure immediate investigation and mitigation of these vulnerabilities within their organization’s infrastructure and review the effectiveness of existing defenses against such phishing tactics.
CISO focus: Email Security, Vulnerability Management, Threat Intelligence
Sentiment: Strong Negative
Time to Impact: Immediate
*
Stepping into the Trap: Understanding Operation RoundPress
Operation RoundPress is the newest paradigm of modern cyber threats targeting webmail systems via spearphishing attacks. Initially documented by ESET, the campaign utilizes a blend of cunningly crafted spearphishing emails paired with XSS vulnerabilities to execute a series of JavaScript payloads like SpyPress.HORDE, SpyPress.MDAEMON, SpyPress.ROUNDCUBE, and SpyPress.ZIMBRA.
How the Scam Unfolds
Spearphishing Emails: The campaign begins with personalized and crafted emails that trick recipients into exposing vulnerabilities in their webmail servers.
XSS Exploitation: Exploits an XSS vulnerability, allowing attackers to inject malicious JavaScript into the webmail page.
JavaScript Payloads: These payloads are adept at data theft, including stealing credentials and extracting emails.
Wide Range of Targets
Initially aimed at Roundcube in 2023, the operation expanded in 2024 to include other popular webmail platforms such as Horde, MDaemon, and Zimbra. MDaemon’s exploitation involved a zero-day XSS vulnerability, patched by its developers upon notification. The attack predominantly targeted Eastern European governments and defense sectors while also showing activity in Africa, Europe, and South America.
The Illusory Nature of Security
The JavaScript payloads designed by the operators of Operation RoundPress don’t just compromise user accounts. They take data extraction to new heights: stealing webmail credentials, exfiltrating contacts, and snaring email messages directly from the victim’s mailbox.
SpyPress.MDAEMON is particularly sophisticated, having the capability to bypass two-factor authentication (2FA). This raises alarms as 2FA is commonly a key part of the security protocols for protecting sensitive data.
Why You Should Care
Operation RoundPress isn’t just another in a sea of digital threats; it precisely targets high-value email systems. With many organizations using these webmail services, understanding these risks is pivotal for robust email security strategy.
Cybersecurity officials should prioritize closing these breaches to prevent data leaks and safeguard information integrity. They must initiate immediate action to reinforce their defenses against XSS vulnerabilities and spearphishing attempts.
*
Vendor Diligence Questions
1. How does your product detect and mitigate XSS vulnerabilities and similar threats?
2. Can you provide assurances that all known vulnerabilities are consistently patched?
3. What tools or strategies do you offer to protect against spearphishing attacks?
Action Plan
1. Assess Vulnerabilities: Conduct an immediate vulnerability assessment on your organization’s webmail systems to check for existing XSS vulnerabilities.
2. Patch Upgrades: Ensure all email software, especially those identified in the Operation RoundPress article (Roundcube, Horde, MDaemon, and Zimbra), are updated to the latest versions or patches.
3. Phishing Simulations and Training: Organize spearphishing awareness and response training for all users, with simulated phishing exercises to test readiness.
4. Strengthen Email Security: Deploy email filtering solutions that can detect and neutralize phishing emails and malicious payloads before they reach users’ inboxes.
5. Investigate and Report: If vulnerable systems are found, perform a deep investigation to uncover any existing breaches or compromise, and report findings to the appropriate cybersecurity authorities and bodies.
6. 2FA Review: Ensure that two-factor authentication mechanisms are reviewed, updated, and made mandatory where possible, preventing unauthorized access even if credentials are compromised.
*
Source: ESET's Operation RoundPress
*
Data Protection: Because We All Love a Good Security Blanket
_In a digital world, data protection is the difference between peace of mind and a security nightmare._
What You Need to Know
In an age where data is the lifeblood of your business, understanding the crux of data protection is imperative. Right now, you’re tasked with ensuring that sensitive information remains secure from prying eyes. Armed with effective best practices, this article maps out a path that your organization needs to follow to safeguard its assets. Executive management should prioritize allocating resources and supporting initiatives that enhance data security frameworks.
CISO Focus: Information and Data Security
Sentiment: Strong Positive
Time to Impact: Short (3-18 months)
*
Top 10 Best Practices for Effective Data Protection
Data protection is not merely a checkbox on the compliance list—it's a powerful ally in keeping your organization’s reputation and bottom line protected. As cyber threats become increasingly sophisticated, adopting a proactive data protection strategy ensures you can defend against breaches that cost both financially and reputationally.
1\. Embrace Encryption
Encrypt data at rest and in transit. Whether within your data center or across the Internet, encryption is essential in thwarting unauthorized access. As Tony Sager, SVP of the Center for Internet Security, notes, "Encryption is a critical component of comprehensive data security."
2\. Regular Audits
Conduct regular audits of your data and systems. Identifying where sensitive information resides and the controls in place is crucial. Audits help pinpoint vulnerabilities and gauge current compliance posture.
3\. Data Minimization
Less is more! Minimize the data you collect and store. Retain only what is necessary for operations, limiting your risk exposure in case of a breach.
4\. Employee Training
Human error remains a leading cause of data breaches. Conduct ongoing training for employees about the importance of data security. Instill a culture of vigilance, stating loudly that "security is everyone's responsibility."
5\. Strong Access Management
Implement role-based access controls ensuring that individuals only access the data necessary for their roles. It constrains potential exposure of sensitive data and bolsters your security posture.
6\. Data Loss Prevention (DLP) Solutions
Deploy DLP technologies that can detect and prevent potential data breaches. Automatic alerts can guide teams to swiftly address anomalies or data leaks.
7\. Patch Management
Keep software and systems updated with the latest security patches. Vulnerabilities often exist in out-of-date systems, offering a gateway for attackers.
8\. Incident Response Plan
Have a clearly defined incident response strategy. When a breach occurs, a swift execution of this plan can minimize damage and reduce recovery time.
9\. Secure Remote Access
In a remote workforce era, securing remote access is critical. Deploy VPNs and multi-factor authentication to protect your organization's network perimeter.
10\. Robust Backup and Recovery
Maintain regular backups and test recovery processes to ensure data can be retrieved following an incident. As Veeam's annual report suggests, backups may be your last line of defense in a ransomware attack.
Data Protection: The Lifesaver You Never Knew You Needed
Like a lifeboat on a stormy sea, effective data protection shelters your organization from the storm of modern cyber threats. By adopting these strategies, your organization not only meets compliance standards but more importantly, secures its digital assets against an increasingly menacing threat landscape.
*
Vendor Diligence Questions
1. What encryption methods does the vendor utilize to protect data both in transit and at rest?
2. How does the vendor ensure staff are trained in and compliant with data protection standards?
3. Can the vendor demonstrate a clear incident response plan to address potential data breaches?
Action Plan
Assess Current Practices: Conduct a thorough review of your organization's existing data protection measures.
Implement Training Programs: Develop and schedule regular training sessions for employees, focusing on data protection and cyber hygiene.
Upgrade Security Tools: Evaluate and deploy necessary technology updates, particularly encryption and DLP solutions.
Enforce Access Controls: Review and adjust access controls to ensure role-based data access is strictly implemented.
Establish Incident Protocols: Review and update the incident response plan to ensure it's well-understood and actionable across departments.
*
Source: Top 10 Best Practices for Effective Data Protection
Ransomware Gangs: Now with More Skitnet!
_Ransomware just gave itself a promotion from a devious extortionist to an insidious back-office manager._
What You Need to Know
Ransomware gangs have been increasingly leveraging the Skitnet post-exploitation malware as part of their cyber-attack arsenal. This development adds another formidable layer to their strategies, aiming to heighten persistence and control over compromised systems. For board members and executives, it's vital to understand that ransomware alone isn’t the sole threat anymore; the use of augmentative malware like Skitnet indicates a clear escalation. You are expected to invest in updated threat detection systems and ensure that incident response plans are robust enough to handle this evolved threat landscape.
CISO Focus: Malware, Ransomware, Threat Detection
Sentiment: Strong Negative
Time to Impact: Immediate
*
An Insidious Addition to the Ransomware Arsenal
Ransomware attackers are stepping up their game by integrating Skitnet—a sophisticated post-exploitation malware—into their operations. This move signals a sinister evolution in the malicious tactics applied by cybercriminals, showing a shift from mere extortion to sustained, undetected operations within victim systems.
More than Just a Ransom
Cybersecurity has often spotlighted ransomware due to its highly disruptive nature and clear demands. However, the recent infusion of Skitnet takes these threats a notch higher by introducing functionalities that extend beyond the immediate ransom payoff. Skitnet enables longer-term residence in systems, allowing attackers to extract valuable data, create escalated access points, and avoid detection longer.
Skitnet Capabilities:
Persistence: Skitnet embeds itself within systems to ensure it remains operational over extended periods, even through reboot cycles and system updates.
Data Exfiltration: The malware specializes in siphoning off sensitive information, making it a dual threat as data can be held for ransom or sold on black markets.
Evasion Techniques: Advanced methods to avoid detection by antivirus programs and network traffic monitoring tools.
Why This Matters
The integration of Skitnet signifies a new, more dangerous phase of ransomware that goes beyond financial extortion. It reveals the attacker’s intent to gain advanced privileges within compromised systems, thereby increasing the potential for secondary attacks or long-term presence.
Implications:
Expanded Attack Surface: Businesses must now consider not just the initial attack vector but also the extended risk of ongoing breaches.
Complex Recovery: Traditional backup systems and simple decryption tools may no longer suffice, requiring more comprehensive incident response mechanisms.
Heightened Risk to Data: The dual abilities of encryption and data exfiltration make it imperative for organizations to employ encrypted storage solutions and beef up their data loss prevention strategies.
Preparing for the Unseen Guest
Organizations should shift their focus to not only thwarting initial breaches but also limiting the potential dwell time of malware like Skitnet. Teams must gear up for challenges in detection and require enhanced analytical tools capable of spotting subtle signals of prolonged breaches.
Key Steps:
Enhanced Threat Intelligence: Invest in solutions that provide real-time updates and insights into emerging threats like Skitnet.
Intrusion Detection Systems: Make use of sophisticated systems capable of detecting low-and-slow attacks that deploy over extended periods.
Regular Threat Simulations: Conduct frequent simulations of multi-layered attacks, testing both initial breach response and extended threat neutralization strategies.
*
Vendor Diligence Questions
1. How does our current cybersecurity solution detect and respond to post-exploitation malware like Skitnet?
2. What ongoing threat intelligence do you provide to keep us informed on emerging tools used by ransomware gangs?
3. Can your systems simulate complex attack vectors, including the use of dual-threat malware, in a testing environment?
Action Plan for CISO Teams
1. Immediate Audit: Verify that current cybersecurity measures are capable of detecting and mitigating post-exploitation frameworks.
2. Tool Enhancement: Integrate advanced threat detection and response tools focusing on persistence activities characteristic of Skitnet.
3. Training & Development: Facilitate continuous training for IT personnel on distinguishing and resolving complex multi-stage attack scenarios.
*
Source: Ransomware gangs increasingly use Skitnet post-exploitation malware
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
_Thank you so much for your support!_

