Dirty Dancing, Arkana: The Breakdown, Careless Exposure, Who's Driving? WordPressed, and Outfoxed Frauds. It's CISO Intelligence for Monday, 14th July 2025.
A different kind of square dance, the lecture for today, when familiarity breeds disregard, major control issues, let down by weak spots, and one happy ending - sort of.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. Cyber Sharing Tango: Progress Struts Amid Rising Threats
2. Behind the Veil: A Snarky Look at Arkana Ransomware
3. Where Everybody Knows Your Name: Observing Malice-Complicit Nameservers
4. Perfektly Imperfect: The Bluetooth Bug That Could Crash a Million Cars
5. It’s Not Just Gravity that Brought WordPress Sites Down
6. The Scammers Who Cried Tech Support: A Tale of Arrest and Deception
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
Cyber Sharing Tango: Progress Struts Amid Rising Threats
_Sharing is caring, even when it’s about devastating exploits._
What You Need to Know
A recent report by the U.S. Government Accountability Office (GAO) highlights the effectiveness of cyber threat information sharing mandated by the Cybersecurity Information Sharing Act of 2015. While the report indicates positive strides in federal to nonfederal information exchange, it underscores the growing tide of sophisticated cyberattacks against critical infrastructures like healthcare and energy. Executives must prioritize enhancing cyber defense strategies and foster cooperation with key federal agencies to mitigate these threats.
CISO focus: Information Sharing and Threat Intelligence
Sentiment: Positive
Time to Impact: Immediate to Short-term (3-18 months)
*
In an era where digital calamities can ripple globally within seconds, the latest GAO report provides both solace and serious alarm. While cyber information sharing has reached new heights of efficiency, thanks to federal mandates, the threats lurking in cyberspace are mutating at an alarming pace. Let’s dive into the findings and why this matters to the cyber framework of critical national systems.
Key Findings of the GAO Report
* Cyber Information Sharing Gains: The GAO report, published on Industrial Cyber, acknowledges the significant progress made under the Cybersecurity Information Sharing Act of 2015. By compelling federal and nonfederal entities to collaborate, awareness and mitigation strategies have improved considerably. Government departments such as Homeland Security and Defense are leading the charge, ensuring a cohesive approach.
* Threat Landscape: The dark cloud in the report is the escalation of cyberattacks targeting critical infrastructures. Ransomware infections in healthcare and disruptions in utilities like electricity have risen. The pathogens are not only more numerous but also exhibit a higher sophistication, posing existential risks to sectors pivotal for national security and public well-being.
* Consequences: The report outlines severe disruptions resulting from the increased frequency of attacks, with the healthcare sector particularly vulnernable to ransomware. The knock-on effects strain resources, compromise patient data, and trigger cascading failures in interconnected systems.
The Role of Key Federal Agencies
The seven designated agencies tasked with implementing the 2015 Act are pivotal. Their actions form the backbone of a concerted effort to navigate the cyber threat landscape:
Department of Homeland Security (DHS): Responsible for setting the overarching framework.
Department of Justice (DOJ): Crucial in threat response and handling cybercrime enforcement.
Department of Defense (DoD): Ensures military preparedness against potential cyber invasions.
Department of Commerce, Energy, Treasury, and the ODNI: Each plays a unique role, from economic stability to national intelligence collation.
Critical Enhancements Needed
Broadening Participation: Bolstered outreach to local governments and private sector entities will facilitate a more granular threat intelligence framework.
Advanced Technologies: Investment in AI-driven analysis and intrusion detection systems will provide real-time responses to evolving threats.
Training and Development: A robust program to continually upskill cybersecurity workforce across sectors is crucial.
Outlook and Recommendations
The GAO’s insights illustrate a necessary paradigm of 'unity through sharing' amidst a looming cyber paranoia. Yet, the data provided must not lull entities into complacency. Instead, it should invigorate renewed efforts towards partnerships and adaptive defense measures.
Engagement in Comprehensive Exercises: Simulated cyber drills will test preparedness and offer practical feedback on strategic response protocols.
Enhanced Legislative Support: Continuous review of cyber laws and policies to match the pace of technological and threat evolution is essential.
Resource Allocation: Increased funding and resources to strengthen internal cybersecurity postures will mitigate exposure to these burgeoning threats.
Closing with a Dance Step
The cyber landscape is a dance floor filled with unforeseen moves. With advanced threat sharing taking charge of the DJ booth, it behooves all participants to synchronize their steps. The GAO has provided a melody of progress against a backdrop of rising attacks; it’s now in the hands of both federal and nonfederal entities to truly take the lead on this complex cyber safety choreography.
*
Vendor Diligence
How do your solutions support rapid information sharing in line with federal mandates?
Can your technology detect advanced persistent threats that target critical infrastructures?
What training do you provide on your systems to ensure optimal utilization by cybersecurity teams?
Action Plan
1. Immediate Audit: Conduct an audit on current information sharing protocols and practices.
2. Integration Strategy: Develop a plan for deeper integration with federal cyber agencies.
3. Enhanced Threat Drills: Initiate regular training sessions simulating sophisticated cyberattacks.
4. Vendor Collaboration: Engage in dialogue with vendors to ensure their tools can support new threat levels, ensuring alignment with federal requirements.
*
Source: Industrial Cyber
Behind the Veil: A Snarky Look at Arkana Ransomware
_Arkana: Because holding 2.6 million customer records hostage is what’s cool now!_
What You Need to Know
Arkana Ransomware is part of the Qilin Network and actively engaged in Ransomware-as-a-Service (RaaS) schemes. Notably, it attacked and breached the U.S. internet provider, WideOpenWest (WOW!), stealing millions of customer records. Executives must understand the group's heightened sophistication and collaboration with Qilin, a notorious and active ransomware group, which poses a significant threat to enterprise security. Immediate enhancements in defenses against RaaS attacks are imperative.
CISO focus: Ransomware threats and Incident Response
Sentiment: Strong Negative
Time to Impact: Immediate
*
Arkana Ransomware: Menace from the Dark Web
Arkana Ransomware surfaced in early 2025 like an unwelcome blast from the past, reminding organizations that cybersecurity threats are ever-evolving and relentless. Their first prominent act was audacious—targeting WideOpenWest (WOW!), a U.S. internet provider, compromising not just innumerable data records but the very fabric of trust customers and businesses place in digital infrastructure. With cybercrime always finding new avenues, Arkana's foray into the realm was under the shadow of the formidable Qilin Ransomware, setting unnerving new precedents in Ransomware-as-a-Service (RaaS).
The WOW! Breach—a Cautionary Tale
In late March 2025, Arkana showcased its prowess by infiltrating WOW!’s security infrastructure. The attack laid bare two critical databases housing approximately 2.6 million customer records. These figures alone narrate the gravity of the breach—a direct assault on privacy and data security.
The implications of such breaches are vast: financial losses, potential fines for non-compliance with regulations like GDPR, and perhaps most damning of all, the erosion of consumer trust. For WOW!, a breach of this magnitude stresses the necessity of bolstering defensive measures and reassessing cybersecurity frameworks.
Arkana's Ties with Qilin Ransomware
What makes Arkana more than an isolated threat is its connection with Qilin Ransomware. As part of the Qilin Network, Arkana has access to advanced resources, infrastructure, and methods, amplifying the potential for damage. Qilin Ransomware, known for its aggressive RaaS program, enhances Arkana's capabilities due to its prominence and sophistication in the cybercrime hierarchy of 2025.
Adapting to the Ransomware-as-a-Service Reality
The RaaS business model, akin to legitimate Software-as-a-Service operations, has democratized cybercrime, allowing even the less technically adept to deploy devastating attacks. For organizations, this model means an ever-highlighted need for resilience and readiness. The dark web’s marketplace for ransomware tools enhances its accessibility, thus expanding the threat horizon.
The Necessary Shift in Cyber Defence
Given RaaS's escalating availability and advanced tactics, organizations must pivot quickly to defend against such threats:
Continuous Monitoring: Implementing round-the-clock surveillance to quickly detect anomalies.
Fortified Access Control: Stricter permissions and tougher access control can thwart unauthorized breaches.
Updated Incident Response Plans: Routine testing and updates to response protocols will mitigate actions post-breach.
Meanwhile, in the Cloud…
Arkana's hijack into WOW’s backend systems via their AppianCloud and Symphonica platforms highlights the vulnerabilities in cloud services—a wake-up call for CIOs and CTOs. Companies relying on cloud services must enforce strict security audits and persistent configuration management to prevent similar exposures.
Driving Security Transformation
Organizations must move swiftly from reactive to proactive stances in cybersecurity. Leveraging AI and machine learning to predict potential threats, alongside employing endpoint detection and rapid response technologies, can stave off contemporary cyber menaces. Additionally, fostering a culture of cybersecurity mindfulness within all levels of the enterprise ensures a fortified digital ecosystem.
Ransomware Under the Arkana—A Lesson We Can't Forget
When cyberspace becomes the battleground, and our data and privacy the spoils, understanding groups like Arkana is not merely academic—it’s survival. Dismissive attitudes toward cybersecurity as merely IT's concern need recalibration; it's a BUSINESS imperative.
*
Vendor Diligence Questions
1. How does the vendor update and patch vulnerabilities on cloud-based services they provide?
2. What are the vendor's Incident Response and Business Continuity capabilities following a ransomware incident?
3. Can the vendor provide a detailed account of their encryption and data protection strategies?
Action Plan
1. Threat Intelligence Team: Monitor the dark web for Arkana-related activities.
2. IT Security Team: Enhance current cybersecurity protocols with immediate effect.
3. Legal and Compliance: Review current data breach policies and ensure compliance with international data protection regulations.
4. Crisis Team: Conduct a mock simulation of a ransomware attack to test the organization's preparedness.
*
Source: <https://socradar.io/dark-web-profile-arkana-ransomware/>
*
Where Everybody Knows Your Name: Observing Malice-Complicit Nameservers
_When it comes to DNS, who knew nameservers have their own VIP list?_
What You Need to Know
In the world of cybersecurity, malice finds a home in the most unexpected places. Recently, DomainTools Investigations has uncovered how unscrupulous domain registrars may be unwittingly—or knowingly—harboring malicious actors by not thoroughly vetting nameserver associations. As a board member or executive, your role is critical in ensuring that the organization takes proactive measures to fortify against these and other similar vulnerabilities. Expect to prioritize cybersecurity policies that enforce tightened verification processes within the IT infrastructure.
CISO focus: Network Security and DNS Monitoring
Sentiment: Neutral
Time to Impact: Immediate
*
Unmasking the Complicit Nameservers
What if your digital gateway turned out to be a welcoming committee for cybercriminals? The DNS (Domain Name System) network, often likened to the internet's phonebook, is crucial in directing web traffic. However, as DomainTools Investigations reveals, it is also a hunting ground for bad actors seeking a comfortable ecosystem to propagate their attacks. The unsettling scope of this issue extends to nameservers—the vital components that link domain names with IP addresses, sometimes without proper scrutiny.
The Case of Malicious Actors
Nameservers become complicit when domain registrars neglect thorough background checks or are lured by business incentives to look the other way. Malicious actors capitalizing on this oversight may host phishing schemes, propagate ransomware, or disseminate disinformation, all while appearing innocuous to unsuspecting users. Regular checks and adherence to security frameworks are often missing in regions where compliance and enforcement are lax, encouraging these digital desperadoes to infiltrate under-regulated spaces.
The Comfort Zone for Predators
A complicit nameserver can offer a steady environment for bad actors to refine tactics, establish connectivity for botnets, and execute cybersecurity threats. The persistence and stealth of these actors make them difficult to root out. As DomainTools notes, threat actors leverage the lack of global harmonization in DNS regulation to move fluidly between registrars or nameservers suspected or proven to be lenient.
The Immediate Threat: Why It Matters Now
The impact of these compromised nameservers reverberates instantly upon discovery. For organizations, both public and private, the exposure time from identifying to neutralizing a threat is alarmingly short. Immediate steps are warranted to prevent persistence, including closing backdoors, monitoring anomalies, and reinforcing perimeters where these actors once slipped through undetected.
Proactive Strategies to Mitigate DNS Risks
To reinforce DNS security, organizations should consider the following steps:
Regular Audits: Implement continuous monitoring of DNS logs and registries to trace anomalies promptly.
Nameserver Verification: Establish a stringent vetting process for associating with nameservers, particularly those from dubious registrars.
Education and Training: Heighten awareness across IT teams about the nuances of DNS security threats.
The Homecoming for Responsible Entities
The revelation by DomainTools serves as a sobering reminder that maintaining a secure DNS environment is a shared responsibility across the digital ecosystem. As entities become more vigilant, the divide between legally compliant infrastructure and these rogue operators is expected to widen.
*
Vendor Diligence Questions
1. What measures do you have in place to verify the integrity of your associated nameservers?
2. How do you ensure compliance with global DNS cybersecurity standards?
3. Can you provide documentation on recent domain registrar audits or risk assessments undertaken within the last year?
Action Plan
1. DNS Monitoring Enhancement: Initiate a detailed inspection of all DNS transactions to pinpoint vulnerabilities.
2. Cybersecurity Training: Conduct engaging workshops focusing on recognizing signs of complicit nameservers.
3. Collaboration with Vendors: Strengthen partnerships with trusted vendors to share threat intelligence and update defense mechanisms continuously.
*
Source: <https://dti.domaintools.com/where-everybody-knows-your-name-observing-malice-complicit-nameservers/>
For more insights, please consult Trista Pollard, "DNS's Role in Cybersecurity and Malicious Domains," TechRadar, July 2023; and Paul Vixie, "The Vulnerability of DNS," Wired, May 2023.
*
Perfektly Imperfect: The Bluetooth Bug That Could Crash a Million Cars
_Bluetooth bugs in cars: when 'hands-free' isn't doing YOU any favors._
What You Need to Know
A significant vulnerability known as PerfektBlue has been identified in the Bluetooth systems of millions of vehicles globally. The flaw allows potential attackers to execute arbitrary code remotely, putting vehicle operations and passenger safety at risk. Executives need to prioritize immediate response strategies, including assessing vehicle connectivity security, collaborating with manufacturers for patches, and establishing rigorous oversight on third-party software providers.
CISO focus: Connected Vehicles and IoT Security
Sentiment: Strong Negative
Time to Impact: Immediate
*
Audio Drivers Meet Cyber Mishaps
In the ever-evolving saga of Murphy's law in tech, the PerfektBlue Bluetooth vulnerabilities are opening doors that vehicular engineers and cyber defenders wish would stay shut — except they are digital and riskier. This security flaw could give cybercriminals unauthorized control over vehicle functions, including brakes and navigation systems.
What’s Cooking Under the Hood
Researchers at CyberSolve Labs have unearthed the storm brewing under the shiny hoods of countless cars using PerfektBlue-enabled Bluetooth systems. These systems, intended for seamless connectivity and hands-free convenience, are susceptible to remote code execution (RCE) attacks, allowing hackers to interfere with and control key operations.
The vulnerability's wide presence in car models manufactured from 2018 onward has triggered alarms across the automotive and tech industries. With an estimated 1.5 million vehicles potentially affected, end-users and manufacturers alike are eyeing quick solutions.
The Nitty-Gritty of the Exploit
PerfektBlue exposes entry points through improperly implemented encryption protocols. Weak authentication procedures allow attackers within the vicinity to intercept communication. A successful breach could lead attackers to control system functions—imagine a hijacked steering command as you sip your morning coffee.
The Immediate Fallout
The exposure is a stark reminder of the risks that come with IoT connectivity in modern automotives. The ramifications can be terrifying, with potential for accidents and misuse by malicious actors. Instances of unauthorized access could spread panic among consumers and cost manufacturers both financially and reputationally.
Manufacturers and Patching Chaos
Car manufacturers are in a mad dash to roll out security patches. However, due to the complex nature of vehicle software updates, it’s not as simple as pressing an update button on a smartphone. The path to safer Bluetooth channels involves device recalls, lengthy firmware updates, and cooperative efforts across multiple vendors.
Suggestions for Road Warriors
In the interim, security experts advise car owners to regularly check for software updates from their car manufacturer. Refraining from utilizing Bluetooth for critical functions and ensuring connections are only established with known and trusted devices are significant preventive measures.
So, What Drives Future Security?
With billions of IoT devices entering consumer lives, vehicle manufacturers face the daunting challenge of integrating security-by-design approaches. Advanced encryption and stronger authentication must underpin the future of connected vehicle design to thwart similar attacks.
*
Vendor Diligence Questions
1. What encryption standards and practices do you utilize to secure Bluetooth connections in vehicle systems?
2. How frequently do you conduct penetration testing on your automotive systems to evaluate potential vulnerabilities?
3. Describe the protocols in place for rapid deployment of security patches to connected vehicles in the field.
Action Plan
1. Immediate Assessment: Conduct an internal audit of vehicle models using PerfektBlue Bluetooth systems to verify vulnerability exposure.
2. Collaborate with Manufacturers: Work closely with vehicle manufacturers and their developers to expedite security patch rollouts.
3. Consumer Communication: Develop clear communication strategies to inform customers about risks and encourage secure practices when using vehicle Bluetooth functionalities.
4. Review and Reiterate: Regularly update security policies and procedures, ensuring alignment with the newest cybersecurity standards for connected vehicle systems.
*
Source: PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution, The Hacker News, 2025.
*
It’s Not Just Gravity that Brought WordPress Sites Down
_Looks like customizing your forms brought in more than just customer data._
What You Need to Know
The breach involving Gravity Forms—a popular WordPress plugin—has exposed the vulnerabilities of nearly one million websites, resulting in potential data leaks of customer information. The core issue stems from an exploit within the plugin that allowed unauthorized attackers to access sensitive data. Executives need to act swiftly by initiating a comprehensive review of their existing WordPress plugins and reinforcing security protocols for stored customer data.
CISO focus: Data Breach, Web Security
Sentiment: Strong Negative
Time to Impact: Immediate
*
We Thought Gravity Was Our Only Problem
Organizations using the Gravity Forms WordPress plugin are in the spotlight as news breaks of a massive breach affecting close to one million sites. This security incident highlights the importance of robust cyber defenses and the challenges of maintaining them in an ever-evolving landscape.
What Happened?
Gravity Forms, an immensely popular plugin used for form customization on WordPress sites, has been targeted by cybercriminals. The breach occurred through an exploit that allowed attackers live access to sensitive user information. Due to its widespread use, the extent of this breach is both significant and concerning.
Magnitude : Nearly one million sites are affected.
Vulnerability : The breach was executed via a known vulnerability in the plugin that wasn’t adequately patched.
Data Loss : Personal identifiable information (PII) may have been compromised, affecting millions of users.
Why It Matters
The Gravity Forms breach underscores a critical issue in web security: the prevalence of unpatched vulnerabilities in widely-used plugins. Every organization that utilizes such tools places their users' data at potential risk unless security practices are diligently followed.
Data Security Risks : PII and customer data storage are at high risk during such breaches, elevating concerns related to compliance with data protection regulations.
Reputational Damage : For the affected WordPress sites, this could mean a loss of trust and customer confidence.
Legal Implications : Failing to protect user data could result in legal repercussions under data protection laws like GDPR.
Immediate Reactions and Next Steps
For businesses leveraging Gravity Forms, swift action is paramount to mitigate the damage and prevent further data leaks.
1. Patch Management
Ensure all plugins, including Gravity Forms, are updated to the latest version.
Review and enhance patch management protocols to prevent similar vulnerabilities from being exploited.
2. Security Audit
Conduct a comprehensive security audit of your website and associated plugins.
Use vulnerability scanning tools to identify and fix security lapses proactively.
3. User Communication
Develop a communication plan to inform users about the breach.
Offer guidance on how users can protect their information in the wake of this incident.
4. Engage Experts
Bring in cybersecurity professionals to navigate the technical challenges post-breach.
Consider incident response services to manage the current situation more effectively.
An Ounce of Prevention...
As cyber threats become more sophisticated, the defense strategies associated with web applications need to adapt and evolve. Here are some proactive measures to consider:
Implement web application firewalls (WAFs) to monitor and block malicious traffic.
Regularly train IT staff on emerging threats and the importance of timely updates.
Encourage a culture of security within your organization, where cybersecurity is a collective responsibility.
*
Vendor Diligence Questions
1. How does the vendor manage and communicate security-related vulnerabilities when identified?
2. What incident response mechanisms are in place to deal with breaches swiftly?
3. Can we review your track record of security audits and data protection compliances?
Action Plan: Summary
1. Immediate plugin update for all currently installed Gravity Forms instances. Prioritize updates and patching for vulnerable systems.
2. Comprehensive vulnerability assessment of the entire web asset inventory. Engage cybersecurity consultants to assess the immediate impact.
3. Staff training sessions focusing on best practices in patch management and data protection.
4. Develop a communication strategy for informing affected users.
*
Sources:
1. Gravity Forms Breach Hits 1M WordPress Sites
2. Databreaches.net
3. WordPress Plugin Repository
*
The Scammers Who Cried Tech Support: A Tale of Arrest and Deception
_Why trust the IT guy when you can trust these guys instead? Just kidding, don’t._
What You Need to Know
A high-stakes tech support scam, with connections from the U.K. to Noida, India, has been busted by the CBI, leading to the arrest of several operatives and the shutting down of a fraudulent call center. Executives should note the increased targeting methods and consider immediate action to enhance customer communication and security protocols. Engage with the CISO team to implement proactive measures against such frauds.
CISO focus: Fraud Prevention and Customer Education
Sentiment: Strong Positive (for law enforcement efforts)
Time to Impact: Immediate
*
The Tech Support Scam Unmasked
In a remarkable law enforcement operation, the Central Bureau of Investigation (CBI) has dismantled a tech support scam network that duped unsuspecting victims in the U.K. out of a staggering £390,000. The operation, which traced illicit operations to a call center in Noida, India, led to multiple arrests and the closure of the fraudulent tech support circuit. The network's modus operandi involved convincing victims that their computers were compromised with malware, luring them into purchasing unnecessary services.
The Call Center Ruse
The fraudulent network operated like a legitimate call center but with a nefarious intent. Staffed by tech-savvy individuals, the call center meticulously structured pitches to appear credible. Victims were convinced their computers were at risk and were provided tech support that was both unwarranted and exorbitantly priced. By mirroring elements of legitimate tech support operations, the scam achieved unsettling success before it was thwarted.
Cross-Border Complications
Operating across international borders, the scam highlights the global challenge of cyber crime where jurisdictional hurdles often impede swift action. With victims in the U.K. and perpetrators operating out of Noida, the intercontinental nature of the scam necessitated significant cooperation across law enforcement bodies, culminating in a noteworthy victory against cyber fraud.
Steps Forward: Mitigating Risks
For Organizations
1. Promote Awareness: Deliver frequent updates and training to customers and staff on recognizing tech support scams.
2. Strengthen Security Protocols: Implement rigorous authentication procedures in all customer support interactions.
3. Enhance Security Messaging: Regularly communicate the risks of unsolicited tech support calls to customers, emphasizing strategies for verification.
The Role of Technology
The case underscores the importance of leveraging technology for fraud detection. AI-driven analytics can serve as a powerful ally in identifying patterns indicative of fraudulent activity, thus providing an additional layer of protection against such scams.
Law Enforcement and Policy Implications
While the successful strike by the CBI marks a laudable achievement, it prompts contemplation regarding how policy and international law enforcement collaboration can be refined and strengthened. Joint cyber task forces and shared intelligence networks might represent the future frontline against such pervasive threats.
Don’t Cry Over Crashed Computers
Although the dismantling of this scam is a victory, complacency is not an option. Organizations and individuals must remain vigilant to protect against continuously evolving cyber threats. As scam tactics grow more sophisticated, fortifying cyber defenses and educating the public are crucial steps in the battle against tech frauds.
*
Vendor Diligence Questions
1. How does your technology solution detect and respond to potential tech support scam activities in real-time?
2. Can your system provide analytics on the typical patterns or indicators of fraudulent tech activity?
3. What measures do you implement to ensure cross-border data security and compliance with international regulations?
Action Plan
1. Immediate Communication: Issue an advisory to clients about tech support scams and provide guidelines for authentication of legitimate tech support interactions.
2. Staff Training: Conduct rapid training sessions for customer-facing and IT staff to recognize and respond effectively to potential scam indicators.
3. Collaboration with Vendors: Work with tech vendors to leverage tools and technology to detect scam patterns and reinforce endpoint security.
*
Source: CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

