It's All About Balance and Returns, A Quiet Resurrection, Unexpected Exposure, Hidden Figures, Security Overboard, and Oops: TMI! It's CISO Intelligence for Friday, 18th July 2025.
Today's teaching moment, "they're back," definitely not cricket, a silent spectre, the alarm bells are ringing, and even the best have weaknesses.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. How to Calculate Cybersecurity ROI for CEOs and Boards
2. CryptoJacking is Dead, Long Live CryptoJacking
3. The Ministry of Defence Gets a Cyber Nosebleed
4. GhostContainer: The Phantom Menace
5. Heapdump Hiccups: When Messaging Apps Go MIA
6. AI Hiring Bot Maker's Password Puzzle: Crack It Before the Bots Do!
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
How to Calculate Cybersecurity ROI for CEOs and Boards
_You want returns? Here's your signpost in the cyber wilderness._
What You Need to Know
CEOs and executive management need to recognize that cybersecurity ROI is not traditional—it's about risk mitigation rather than profit. This article examines methodology, focusing on how security investments influence the overall strategic objectives of the company.
CISO focus: Cybersecurity Management & Financial Analysis
Sentiment: Neutral
Time to Impact: Short (3-18 months)
*
In the ever-evolving world of cybersecurity, one concept consistently stumps even the sharpest minds in executive suites: Return on Investment (ROI). It’s a trickier territory than traditional financial paradigms due to its unique nature. While most business investments aim to generate direct profits, cybersecurity investments typically focus on risk mitigation, requiring a different lens for evaluation. This blur between defense and business value can leave CEOs scratching their heads. Fear not; charting this course is simpler than you might think.
The ABCs of Cybersecurity ROI
Why Calculate Cybersecurity ROI?
1. Risk Mitigation: The primary goal of investing in cybersecurity tools is minimizing risks of potential cyber threats, which could lead to significant financial and reputational damages.
2. Financial Justification: It deters decision-makers from seeing cybersecurity as a cost center and allows them to view it as a component that underpins the entire production line, workforce operation, and customer trust.
3. Performance Metrics: Evolving beyond abstract notions to truly measure how well defenses perform in threat scenarios.
Frameworks for Measure: Aligning Security with Strategy
1. Key Performance Indicators (KPIs): Establish specific KPIs to gauge cybersecurity effectiveness, such as incident response times, number of prevented breaches, or compliance status metrics.
2. Cost Savings Approach: Compare costs of cybersecurity investments against potential loss mitigation, covering areas like legal fees, loss of revenue during downtime, or tarnishing of brand reputation.
3. Business Process Enablement: Evaluate how cybersecurity initiatives propel business efficiencies and innovation, parallelly contributing to organizational growth.
Key Elements to Leverage for Cyber ROI
Tangible vs. Intangible Costs: Recognize the differentiation between hard figures (expenses on software and personnel) versus soft figures (brand equity, regulatory fines).
Incident Statistics and Analytics: Using data analytics tools to glean insights on reduced exposure to cyber threats and customer data breaches.
Risk Calculations: Assess risk severity before and after implementation of new cybersecurity protocols to derive ROI.
The Role of the CISO
The Chief Information Security Officer (CISO) is crucial, acting as the bridge between technical execution and executive communication:
Articulating Risks in Business Terms: Translates cybersecurity jargon into the tangible value, reinforcing the narrative that cybersecurity is a business enabler, not a blockade.
Fostering a Security-Conscious Culture: Encouraging every employee to be a stakeholder, since human errors often account for breaches.
Vendors, Analytics, and the Cyber Calculus
No piece on cybersecurity ROI is complete without acknowledging the role of vendors:
1. Vendor Evaluation: Align with partners who understand your business objectives, not just tech specs.
2. Adapting Technologies: Work with vendors to vigorously access the scalability and adaptability of solutions.
3. SLA and Performance Benchmarks: Establish specific Service Level Agreements (SLAs) that include ROI-oriented metrics.
Don’t Expect Cash Back, But…
Your cybersecurity investment is like the ALDI shopping of tech — not flashy, but reliable. It won’t spit out cash returns but buys peace of mind through threat mitigation. CEOs and boards must align security as a larger strategic investment that facilitates enterprise stamina and success.
*
Vendor Diligence Questions
1. What metrics and benchmarks for ROI do you currently provide?
2. How do you propose to align your solutions with our business strategy beyond technical conformance?
3. Can you provide case studies or references that demonstrate successful ROI for organizations similar to ours?
Action Plan
Define and Develop KPIs : Establish clear KPIs for cybersecurity investments.
Risk Assessment : Annually conduct comprehensive risk evaluations pre- and post-implementation.
Vendor Performance Review : Regularly evaluate vendor provided solutions for alignment with business objectives and ROI metrics.
*
Source: How to calculate cybersecurity ROI for CEOs and boards
*
CryptoJacking is Dead, Long Live CryptoJacking
_Cryptojacking: proof that in cybersecurity, not all ghosts vanish._
What You Need to Know
Cryptojacking, which seemed to have fizzled out after initial browser crackdowns, is experiencing a resurgence with new tactics and technologies. Cybersecurity teams must stay vigilant against the evolving threats of cryptojacking scripts hidden in benign-looking websites and software. The executive management group should prioritize updating cybersecurity strategies and continuously monitor digital assets for unusual activities as a preventive measure.
CISO Focus: Cybercrime Threats & Defense Strategies
Sentiment: Strong Negative
Time to Impact: Immediate
*
A Tale of Two Cryptojacking Eras: Same Script, Different Players
When Coinhive, the notorious in-browser Monero miner, was shut down in 2019 following a wave of countermeasures by major browsers and user backlash, many believed cryptojacking was a thing of the past. Yet, as is the case with many facets of cybersecurity, cryptojacking has proven to be more of a recalcitrant specter than a fading memory.
The Rise and Fall of Coinhive
Initially launched in 2017, Coinhive enabled websites to leverage user processing power to mine Monero, a cryptocurrency focused on privacy features. Websites could earn revenue without displaying ads, a stipulation eagerly welcomed by webmasters but unknowingly endured by users. At its zenith, Coinhive had its scripts running on thousands of sites, capturing roughly 12% of Monero’s network hash rate, essentially commandeering users' computing resources to inflate mining operations.
However, the dream of ad-free revenue soon turned into a nightmare as complaints of sluggish performance, overheated devices, and drained batteries mounted. By 2018, cybersecurity firms and browser developers responded by enforcing stringent anti-mining measures, and Coinhive ceased operations in 2019.
Cryptojacking: The Specter Returns
Despite previous measures, cryptojacking has evolved rather than disappeared. The same underlying principle continues to entice hackers: the potential for profit without consent, neatly skimming off digital resources from unsuspecting users. Recent reports highlight that cryptojacking operations are not only thriving but have become more sophisticated. With advancements in stealth tactics and distribution methods, the absence of Coinhive doesn’t equate to the extinction of their methodologies.
New Age of Cryptojacking
Today’s cryptojackers glide through the ecosystem by embedding scripts deeper into unsuspecting environments. They target vulnerabilities in software and hardware infrastructure, using 'living off the land' tactics to ride existing processes or system capabilities invisibly. Crypto mining malware, disguised as legitimate updates or concealed within a myriad of applications, operates clandestinely, skirting by much of the conventional security software due to obfuscation and polymorphic transformations.
Key Characteristics of Modern Cryptojacking:
Polymorphic Scripts: These adaptive scripts evade traditional signature-based detection methods.
Fileless Attacks: Utilizing in-memory execution rather than disk-based files to circumvent detection.
Stealth Attacks: Deployment with delayed activation and throttled resource use to avoid user suspicion.
The Defensive Playbook
While technology providers continue enhancing their defenses against cryptojacking, cybersecurity teams must devise preemptive strategies to hunt down these cloaked operations:
Regular Audits & Penetration Testing: Regular assessments can identify weaknesses or infections before they exploit systems extensively.
Cloud Environment Monitoring: With cloud-based servers being as susceptible, a watchful eye on system metrics like unusual CPU spikes is crucial.
Endpoint Detection and Response (EDR) Solutions: Implement solutions that offer visibility into endpoint activity to quickly detect aberrant behavior.
The Re-emphasized Need for Vigilance
As this evolving threat landscape continues mutating, diligent monitoring and proactive threat intelligence sharing remain paramount. Organizations should aim to educate and arm themselves against cryptojacking by staying informed of emerging trends and integrating resilient defenses across their infrastructure.
Understanding cryptojacking's past, present, and future proves not just helpful but necessary in our arsenal of cybersecurity measures—a sobering reminder that the game never really ends, it just changes players.
*
Vendor Diligence Questions
1. How does your cybersecurity product specifically address the detection of polymorphic cryptojacking scripts?
2. Can your endpoint solution provide real-time monitoring and instant alerts for unauthorized cryptocurrency mining attempts?
3. What guarantees and support services do you offer to ensure continuous protection against emerging cryptojacking threats?
*
Action Plan
Deploy Threat Intelligence Tools : Use advanced threat intelligence tools to detect cryptojacking scripts and patterns.
Conduct Security Awareness Training : Educate staff about the signs of cryptojacking and ways to mitigate its impact.
Review Security Protocols : Align current security operations with latest cryptojacking threat vectors, ensuring up-to-date defenses.
*
Source: <https://cside.dev/blog/cryptojacking-is-dead-long-live-cryptojacking>
*
The Ministry of Defence Gets a Cyber Nosebleed
_Even moles and whistleblowers need cyber tissues._
What You Need to Know
A critical data breach at the UK Ministry of Defence (MoD) has exposed sensitive information of over 100 British government personnel. This breach not only questions the integrity of MoD's cybersecurity measures but also poses severe risks to national security. The board and executive management are expected to engage in immediate strategic discussions to evaluate existing cybersecurity frameworks and implement urgent corrective measures to protect infrastructure and personnel data.
CISO focus: Data Breach Management
Sentiment: Strong Negative
Time to Impact: Immediate
*
The Ministry of Defence, a cornerstone of the UK's national security apparatus, has found itself enmeshed in a significant cyber controversy. A data breach has led to the exposure of sensitive information of more than 100 British government personnel. This incident has sent ripples through both government structures and the public domain, revealing glaring vulnerabilities in the MoD's cybersecurity framework.
The Incident at a Glance
During routine operations, a cybersecurity lapse within the Ministry of Defence resulted in unauthorized access to a sensitive database containing personal, and potentially compromising, information about British governmental employees. These details include not only names and addresses but also sensitive role information that could jeopardize operations and national security efforts.
Implications of the Breach
1. National Security Threats: The exposed information can endanger ongoing operations or missions and might be leveraged by hostile entities.
2. Personnel Safety Risks: Personal data exposure elevates the risk of blackmail or targeting the individuals and their families.
3. Diplomatic and Public Relations Fallout: Trust in government cybersecurity competence is eroded both domestically and internationally, disrupting diplomatic relations.
Immediate Responses and Concerns
* Compromised Privileges Revoked: As an immediate precaution, any compromised access credentials were nullified, and affected personnel briefed on personal security measures.
* Incident Response Teams Deployed: The MoD's Incident Response Teams initiated a full-scale investigation to ascertain the breach's cause and breadth.
* Public Statement and Damage Limitation: To mitigate public skepticism, the MoD has committed to transparency, stating ongoing measures to rectify the weaknesses revealed.
Unfolding the Cause
Initial analyses suggest that the breach was a result of complacency in applying routine cybersecurity updates, compounded by a lack of rigorous internal audits. The identified entry point seems to be a legacy system inadequately shielded against more sophisticated modern cyber threats.
Steps Forward
For institutions embodying national trust and expectation, this breach underlines the vital need for evolving cybersecurity paradigms:
1. Strengthen Cybersecurity Infrastructure: Including the installation of AI-driven threat detection systems to anticipate and intercept breaches before they manifest.
2. Policy Revisions and Training: Update cybersecurity protocols comprehensively while administering regular training programs for all personnel to ensure vigilance against potential cyber threats.
3. Comprehensive Security Audits: Perform intensive and periodic third-party audits to evaluate and enhance existing cyber defenses.
The MoD’s Defense Strategy in the Digital Age
Enhancing digital defenses has transcended from being a routine check to a strategic priority. This incident serves as a wake-up call for revisiting not only standard operating procedures but the philosophy of cybersecurity in a digital age brimming with latent threats.
*
Vendor Diligence
Questions
1. How does your system ensure consistent application of security updates across all platforms?
2. What proactive measures are integrated to handle potential breaches before they escalate?
3. How do you ensure transparency and compliance with international cybersecurity standards?
Action Plan
1. Conduct immediate vulnerability assessment across all systems.
2. Implement an accelerated timeline for cybersecurity infrastructure overhaul.
3. Initiate mandatory cybersecurity awareness and response training for all employees.
4. Establish a cross-departmental task force to evaluate risk management strategies and liaison with external cybersecurity experts.
*
Source: More than 100 British government personnel exposed by Ministry of Defence data leak
*
GhostContainer: The Phantom Menace
_When life gives you servers, make sure they're not haunted._
What You Need to Know
In a recent cybersecurity incident, dubbed "GhostContainer," a sophisticated backdoor malware targeting Exchange servers of high-value organizations in Asia was uncovered. This breach exploits N-day vulnerabilities, giving attackers comprehensive control over the servers. Board members and executive managers should prepare to review and enhance current cybersecurity protocols to safeguard their organization's IT infrastructure.
CISO focus: Advanced Persistent Threats (APT), Exchange Server Security
Sentiment: Strong Negative
Time to Impact: Immediate
*
The Incursion
In a chilling revelation for cybersecurity operatives, GhostContainer, a cunning and adaptable malware, has been discovered infiltrating Exchange servers in Asian government and high-tech sectors. GhostContainer presents a dire threat, granting its handlers full control over these vital infrastructures by exploiting known N-day vulnerabilities. Unveiling such a sophisticated adversary, characterized by its modular architecture, not only underscores the importance of vigilant cybersecurity postures but also calls into question current protective measures against advanced persistent threats (APT).
Modus Operandi: Invisible and Relentless
GhostContainer represents the stealth epitome of modern cyber warfare. By blending in as a standard server component, it effectively dodges traditional security detections. This stealth is achieved through open-source circumventions tailored for this purpose, making it invisible to many security scans. Furthermore, the malware serves multiple roles: a proxy, a tunnel and potentially an agent for sensitive data exfiltration. Its flexibility poses a significant challenge, as it can easily adapt and evolve, making containment even more arduous.
The Scope: Beyond Borders
While initially detected within high-value targets in government and tech industries in Asia, the potential expansiveness of GhostContainer should provoke deliberation. Isolated as part of a larger APT campaign, this malware might just be the tip of the iceberg. With capabilities to extend dynamically through additional downloadable modules, the implications of such a breach could prove catastrophic if similar endeavors are underway elsewhere globally.
Reaction and Responsibility
Cybersecurity teams across the affected industries have mobilized to assess damages and contain the spread. The incident demands immediate introspection within corporate cybersecurity strategies. While organizations scramble to patch existing vulnerabilities and fortify defenses, GhostContainer serves as a harrowing reminder of what persistent vigilance and proactive security measures should entail in today's interconnected technical landscape.
What Lies Ahead?
Organizations are urged to overhaul existing cybersecurity protocols, reinforcing the infrastructure with multifactor authentication, regular vulnerability assessments, and comprehensive incident response plans. Given the potential for GhostContainer to expose sensitive data and act as a conduit for external threats, the emphasis must be on endurance and adaptability in threat response measures.
Each phase of a cyberattack is an opportunity to learn, adapt, and prepare. Remember, when your servers are seemingly haunted, it's time for an exorcism of lax security practices.
*
Vendor Diligence Questions
1. How does your solution handle the detection of modular malware like GhostContainer, which uses open-source tools?
2. How frequently are your platforms updated to address known N-day vulnerabilities?
3. What measures do you take to ensure that security solutions can differentiate between legitimate server components and disguised malware?
Action Plan
Conduct an urgent security assessment to identify potential vulnerabilities in Exchange servers.
Deploy immediate patches for known N-day vulnerabilities and enhance monitoring capabilities.
Train staff on the latest phishing and social engineering tactics that could be exploited by similar malware.
Consider engaging with an external cybersecurity firm specialized in APTs for a detailed audit.
Increase collaboration with threat intelligence partners to keep abreast of emerging threats.
*
_Source:SecureList GhostContainer Article_
*
Heapdump Hiccups: When Messaging Apps Go MIA
_Why secure your message in a bottle when your ship’s already leaking?_
What You Need to Know
A flaw discovered earlier this year in the TeleMessage™ SGNL application modeled after Signal app has revealed serious vulnerabilities that can lead to exposure of sensitive data, including usernames and passwords. The diagnostic /heapdump endpoint, accessible without authentication, poses a significant risk as it shares a full snapshot of heap memory. This issue has been recognized by CISA as a known exploited vulnerability. Boards and executive management should ensure immediate assessment of their internal communications structures and verify if they are affected by this vulnerability. Immediate remedial actions are essential.
CISO Focus: Vulnerability and Patch Management
Sentiment: Strong Negative
Time to Impact: Immediate
*
In a digital world where secrets should be kept tighter than Fort Knox, a glaring vulnerability in the TeleMessage™ SGNL system has unveiled that the ship of secure messaging might be taking on water. This enterprise messaging platform, heralded for mirroring the security forte of Signal, encountered a flaw of epic proportions, disclosing one of its weaknesses—the unchecked heapdump endpoint.
Riding on Legacy: When Cybersecurity Meets Archaeology
The problem traces back to a legacy misconfiguration in the Spring Boot Actuator that impacts certain deployments of TeleMessage™ SGNL. While designed for robustness, its careless handling allowed a publicly accessible /heapdump endpoint without authentication. This endpoint generously imparts around 150 MB of heap memory, presenting a potentially rich harvest of usernames, passwords, and more.
What's heartbreaking for any cybersecurity enthusiast is that newer versions of Spring Boot have already closed this gap. Yet, many TeleMessage deployments persist in treading the shaky bridge of older setups, despite improved safety nets waiting merely a few steps ahead in newer configurations.
The Bleak Timeline: Where Patience Isn’t a Virtue
Despite the vulnerability being disclosed as early as May 2025 through CVE-2025-48927, instances of its existence thrived well past May 5, 2025. GreyNoise’s acumen tracked active reconnaissance and exploit attempts, ultimately leading to its addition to CISA’s Known Exploited Vulnerabilities catalog as of July 14, 2025. Alarm bells indeed, but one wonders if they’ve rung across every boardroom and IT department.
TeleMessage Instances & The Security Standoff
Interestingly, TeleMessage™ isn’t habitually the enterprise’s first choice for small talk—rather, it handles critical government and enterprise-level messages. This makes the vulnerability more akin to discovering the front door open at a high-security facility. The implications are severe and deeply unsettling, especially when one considers the sensitive nature of communications handled by these systems.
First Steps to Safety
This issue underscores the necessity for businesses to continually audit and update their systems, evaluate configurations, and actively engage with trusted cybersecurity advisories. For those invested in TeleMessage or similar platforms, verification against this vulnerability must take priority. Mitigation could involve immediate configuration changes or adopting updated software versions.
Protecting the Communication Kingdom
Organizations should establish a checkpoint for communication security, ensuring no legacy configurations are impeding current safety measures. Empower your teams with the necessary tools for swift adaptation and validation of security postures to keep up with evolving cyber threats. Trust between companies, agencies, and communication providers must be established not only through policy but proactivity in security management.
After all, a little diligence now could save a hull breach that no security drill could truly prepare for.
*
Vendor Diligence Questions
1. How does the vendor ensure that all endpoints in their systems are secured and updated regularly?
2. What safeguards does the vendor have against legacy configurations in their solutions?
3. Can they provide documentation for recent audits or assessments done on their platform's security posture?
Action Plan
1. Immediate Audit: Evaluate all TeleMessage instances for vulnerability to CVE-2025-48927.
2. Update Deployments: Migrate to the latest secure versions of the platform and ensure all endpoints are authenticated.
3. Risk Assessment: Conduct a thorough risk assessment for potential data exposure incidents.
4. Ongoing Monitoring: Implement continuous monitoring mechanisms for anomaly detection relevant to this vulnerability.
5. Training: Educate teams about recognizing and responding to signs of exploitation attempts promptly.
*
Source: GreyNoise Blog on Active Exploit Attempts — Technical Write-Up on Scope of CVE-2025-48927
*
AI Hiring Bot Maker's Password Puzzle: Crack It Before the Bots Do!
_How secure is your intelligent hiring assistant when the keys are under the mat?_
What You Need to Know
The recent spotlight on Paradox.ai, an AI hiring platform, reveals a glaring cybersecurity lapse—weak password practices. This case underscores the urgency for executive management to enforce stringent password policies and robust cybersecurity frameworks to safeguard sensitive data and maintain user trust. Management teams are expected to revisit and fortify their cybersecurity strategies immediately, ensuring that the integrity of their systems is not compromised by basic oversights.
CISO focus: Identity and Access Management (IAM)
Sentiment: Negative
Time to Impact: Immediate
*
Pardon Our Interruption - Your Password Is Showing!
In an era where AI and advanced algorithms aid recruitment processes, the reliability of such solutions largely depends on robust cybersecurity practices. In an embarrassing revelation, Paradox.ai, a trailblazing AI hiring firm, is under fire after a security investigation exposed lax password protocols, threatening the confidentiality of their client and applicant data.
Sounding the Alarm: What's the Big Deal?
The cybersecurity community, led by investigative journalist Brian Krebs, has taken note of the dire implications of Paradox.ai's password debacle. A seemingly small oversight in password sophistication could lead to massive data breaches, with sensitive candidate information exposed and exploited. This case serves as a stark reminder of how even the most technologically innovative solutions can falter due to elementary security lapses.
The Password Problem
Weak passwords are, undeniably, the Achilles' heel of data security. Industries reliant on cloud-based services and AI technologies, like Paradox.ai, must realize that sophisticated security structures are non-negotiable. Paradox.ai's breach highlights their user's ability to concoct passwords that could be easily cracked, potentially jeopardizing vast datasets comprising user credentials, personal particulars, and business secrets.
Possible consequences of compromised passwords include:
Unauthorized access to candidate and company data.
Identity theft and subsequent legal repercussions.
Reputational damage and erosion of customer trust.
Cybercriminals are Lurking
Today's digital landscape is rich with bad actors waiting to exploit vulnerabilities. In Paradox.ai's case, the oversights in password management are an invitation for cybercriminals to infiltrate systems and extract valuable data. These incidents emphasize the responsibility of tech companies to not only innovate but rigorously safeguard their digital fortresses.
Immediate Measures for Damage Control
To avoid falling into similar traps, companies akin to Paradox.ai need to implement:
Two-Factor Authentication (2FA): A fail-safe method adding an extra layer of protection beyond standard password entry.
Regular Audits and Training: Frequent security audits complemented with employee training sessions can significantly curb careless password management practices.
Enhanced Password Policies: Mandates ensuring passwords meet complexity requirements and are regularly updated can thwart unauthorized access attempts.
Today's Oversight, Tomorrow's Headline
The implications of such lapses transcend direct financial impacts. Once trust erodes due to perceived negligence, clients and partners may hesitate to engage or renew contracts. An organization’s reputation, once tarnished, can require considerable time and effort to rehabilitate.
_Advice for Businesses:_
Reassess current cybersecurity protocols with a critical lens.
Invest in advanced IAM solutions and third-party consultations to plug potential vulnerabilities.
Ensure continuous monitoring and adaptation to emerging cybersecurity threats.
Who's Next?
The spotlight on Paradox.ai is illuminating a broader industry challenge—how integral robust security measures are to the success of AI-driven operations. Organizations can no longer afford complacency in their security frameworks; avoiding similar debacles is a corporate priority.
* In summary, fortifying password security is not just an optional best practice but a necessity for survival in the tech-dominant job market landscape.
*
Vendor Diligence Questions
1. What measures do you have in place to ensure robust password hygiene across your platforms?
2. Can you provide evidence of regular security audits and up-to-date training for your staff regarding cybersecurity best practices?
3. How do you monitor and react to potential security breaches in real-time?
Action Plan
1. Conduct a Comprehensive Security Audit: Evaluate current password policies and practices to identify weak points.
2. Implement Two-Factor Authentication: Make 2FA mandatory for accessing sensitive data.
3. Training and Awareness: Roll out frequent training sessions on cybersecurity awareness focused on password management.
4. Strengthen IAM Protocols: Upgrade identity management to detect and respond promptly to unauthorized access attempts.
*
Source: Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

