No Oasis, The Scam Upgrade, Browsers: The New Armour, The Letters Game, SecOps Change is Coming, and Phishing for Crypto. It's CISO Intelligence for Friday 25th April 2025.
Digital savannah strikes: who knew? Scamming with AI: no surprises there, browsers: the new digital knights, acronyms: getting them right, SecOps covering more bases, and the giant crypto phishing heist - don't try: don't get.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. Hackers on Holes: The Lazarus Group Strikes Again
2. Scams 2.0: The Scammer's Delight
3. Don't Phish Me, Browser!
4. Peeling Away the Acronyms: DLP vs DSPM Showdown
5. Change is in the Wind for SecOps: Are You Ready?
6. DPRK Strikes Again: A Heist from TRON Users, But Don't Be a Prawn
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
Hackers on Holes: The Lazarus Group Strikes Again
_Lazarus hackers redefine ‘watering hole’—it's not just for animals anymore._
What You Need to Know
The notorious Lazarus Group has successfully breached six companies through sophisticated watering hole attacks. Executives need to understand the critical nature of this breach, take immediate action to assess vulnerabilities in their organization's cyber defenses, and ensure they have a strategic response plan in place to mitigate future risks.
CISO focus: Threat Intelligence, Penetration Testing, Incident Response
Sentiment: Negative
Time to Impact: Immediate
*
Lazarus Hackers Breach Six Companies in Watering Hole Attacks
In a startling series of cyber antics, the notorious Lazarus Group has once again made headlines by breaching six companies using a particularly sly modus operandi—watering hole attacks. This strategy involves compromising a reliable site to attack someone else's network, making innocent-lookin' spaces the stage for their malicious performances. If this sounds less like a cyber threat and more like a wildlife documentary, guess what? It's playing out in the digital savannah near you.
What Happened?
The Strategy: Watering hole attacks target popular websites frequented by employees of the intended companies. Lazarus Group, like a predatory lion at a drinking hole, compromised these sites, injecting malicious scripts into the website’s backend.
The Outcome: Once inside, the hackers utilized this vantage point to deploy malware into the visitors' networks who considered these online spaces safe for daily 'cyberwashing.'
The Impact: The attacks led to unauthorized access and data theft, compromising the integrity of sensitive organizational information.
Who’s Affected?
Affected parties include a spectrum of companies across technology, finance, and energy sectors. These sectors, known for holding a treasure trove of sensitive data, provided ample bounty for the Lazarus group.
Immediate Repercussions
The affected companies are grappling with immediate cleanup efforts, resulting in a scramble to identify breached data and secure their networks against further attacks. The trusted reputation of compromising websites is now teetering, impacting visitor traffic and business partnerships.
How to Mitigate Risks
Regular Security Audits: Conducting frequent audits and penetration tests can help identify vulnerabilities before threat actors exploit them.
Employee Training: Raising awareness about potential threat vectors and signs of compromised sites helps in early detection of uncommon activity.
Deploying Anti-Malware Tools: Advanced anti-malware solutions detect and neutralize threats in real-time, circumventing potential infiltration.
Keeping the Hackers at Bay
Organizations must understand this isn’t a one-off incident but part of a broader strategy from cyber criminals to exploit digital blind spots. Continuous vigilance, updates, and robust protocols are the only sustainable defenses.
Examining Lazarus Group's Motive
Lazarus Group, believed to have ties with North Korean state-sponsored entities, remains a significant threat globally. Their relentless pursuit of high-value targets indicates a hunger not just for data, but for leveraging stolen information to facilitate bigger nefarious plots.
The Silver Lining?
Well, there isn't a humorous silver lining unless you enjoy chasing metaphorical feathers. However, this incident shines a light on possible security gaps, prompting organizations to revamp and bolster their cyber defense mechanisms.
When in Rome, Water the Hole
Understanding Lazarus' enduring tactics offers a rare glimpse into their playbook, equipping cybersecurity professionals to turn the tables and protect operational assets more effectively.
*
Vendor Diligence Questions
1. How often are your penetration tests conducted, and what actions are taken upon finding vulnerabilities?
2. Can you provide details on your incident response plan and team training initiatives?
3. Does your company utilize advanced threat intelligence solutions to mitigate evolving cyber threats such as those posed by state-sponsored actors?
Action Plan
1. Immediate Secure Audit: Conduct an emergency cyber audit focusing on potential entry points akin to those exploited in recent attacks.
2. Update Protocols: Revise and strengthen security protocols, focusing on websites most frequented by your organization's users.
3. Engage Security Experts: Collaborate with third-party cyber experts to assess your current security posture and simulate potential attacks for better preparedness.
4. Crisis Management Plan: Develop a comprehensive plan addressing immediate incident response, media communication, and partnership management to restore reputational trust.
*
Source: Lazarus hackers breach six companies in watering hole attacks
*
Scams 2.0: The Scammer's Delight
_Beware: Scammers are not just thieves but tech-savvy devils ready to outsmart you with your own gadgets._
What You Need to Know
The digital fraud landscape is transforming with the times, leveraging technology in ways that make old-school scams look quaint. These enhanced scams harness everything from artificial intelligence to social media algorithms. Companies must understand these evolving tactics and invest in innovative countermeasures. The board and executive management should allocate funding and resources to bolster cybersecurity infrastructure and educate their teams on the nuanced arts of digital deception that characterize Scams 2.0.
CISO focus: Fraud Prevention and Detection
Sentiment: Strong Negative
Time to Impact: Immediate
*
Scams 2.0: How Technology Is Powering the Next Generation of Fraud
The fraudsters have gone digital. In an era where technology continually reshapes our world, it comes as no surprise that scams have evolved to exploit the connectivity and convenience of the digital age. This new breed of fraud, dubbed "Scams 2.0," uses AI, machine learning, and social media to exploit vulnerabilities in systems and users alike.
Old Tricks, New Tech
Gone are the days of Nigerian princes seeking your help to transfer their fortune; today's scammers are much more sophisticated. From voice cloning to sophisticated phishing schemes optimized by machine learning, the toolkit of the modern scammer is vastly superior to its predecessors. Phishing, for instance, now uses AI to tailor-make emails that align with the target's psychology, rendering them almost indistinguishable from legitimate communications.
The Role of AI and Machine Learning
Artificial intelligence is not just a tool for innovation—it's a weapon in the scammer's arsenal. AI's capacity to analyze massive datasets at unprecedented speeds allows scammers to identify potential victims based on browsing behaviors and social media activity. With machine learning algorithms, these scammers can automate an ever-increasing volume of attacks, optimizing tactics in real-time based on success rates.
Social Media: The Silent Partner
Social media platforms are unwitting partners in crime. Algorithms designed to connect people with similar interests also help scammers find and connect with potential victims. Scams like fake charity appeals or dubious investment opportunities typically spread rapidly in networks where trust and shared interests create a fertile ground for deception.
The Economic Impact
The economic ramifications are significant. According to the Federal Trade Commission (FTC), losses from investment scams alone hit a staggering $3.31 billion in 2022, a substantial increase from previous years. Companies must brace themselves to manage not only the direct financial losses but also the reputational damage and subsequent loss in consumer trust.
Fighting Back: What's an Organization to Do?
So, how can organizations protect themselves and their clients from succumbing to these advanced scams? Here are critical steps that businesses can implement:
Strengthen Authentication Protocols: Multi-factor authentication (MFA) can thwart unauthorized access even if credentials are compromised.
Educate and Train Staff: Regular training sessions about the latest scams can build a culture of cybersecurity vigilance.
Monitor Social Media: Proactive surveillance of social media channels can help detect fraudulent schemes targeting the organization or its clientele.
Yes, Even You Can Be a Victim
A moment's lapse can render even the most technologically savvy individual or company vulnerable to these scams. Thus, awareness and preparedness are your best defenses.
Conclusion? More Like a Call to Arms!
In a world increasingly dominated by digital connections, intending individuals and organizations must arm themselves with both technology and knowledge. Hence, engage proactive technological protections and cultivate a vigilant cybersecurity culture to wrestle back control from would-be fraudsters. The time to act is now, lest you find yourself wily deceived by a synthetic voice or duped by a deepfake video.
*
Vendor Diligence
1. How do you deploy AI to detect and avoid sophisticated scams?
2. What advanced technologies do you offer for phishing protection?
3. Can your services integrate social media monitoring to detect potential fraud?
Action Plan
1. Establish a task force to assess current vulnerabilities that emerging scams could exploit.
2. Initiate cybersecurity training sessions highlighting the nuances of modern digital fraud tactics.
3. Collaborate with tech vendors to enhance current systems with AI-driven security measures to preemptively detect and neutralize Scams 2.0.
*
Sources:
1. Scams 2.0: How Technology Is Powering the Next Generation of Fraud
2. Federal Trade Commission (FTC) Reports
3. Journal of Cybersecurity Research
*
Don't Phish Me, Browser!
_Spoofing threats one tab at a time._
What You Need to Know
Phishing attacks are evolving, and as they do, so too must our defenses. A recent analysis highlights the superiority of browsers in combating these deceptive incursions. C-level executives need to understand the importance of leveraging browser-based security tools as a frontline defense against phishing. Decision-makers are expected to prioritize funding for necessary browser enhancements and ensure compliance with best practices in cyber protection.
CISO focus: Phishing Prevention
Sentiment: Positive
Time to Impact: Short (3-18 months)
*
The digital battleground of cybersecurity is ever-shifting. With phishing attacks becoming increasingly sophisticated, the role of our everyday internet tools is under the microscope. Can a browser be the knight-in-shining-armor against these malicious threats? According to experts, absolutely.
Browsers: The Unexpected Heroes
Browsers have transcended their traditional role as mere conduits to the digital world. Now, they are part of the frontline defense against phishing. Here’s how:
1. Real-Time Protection:
Browsers have developed real-time protective measures. They automatically check URLs against updated blacklists and display warnings if users try to navigate known malicious sites. This instantly thwarts phishing attempts before they hook unsuspecting victims.
2. Isolation Tactics:
Browser isolation acts as a barrier between a user's device and the potential threat. By rendering web pages remotely, if a phishing page is encountered, it can be safely contained without affecting the user's system. This not only reduces risk but also enhances browsing safety in general.
3. Controlled Environment:
With features such as sandboxing, browsers restrict sites from accessing your computer's resources, ensuring phishing sites can't exploit vulnerabilities. This containment strategy significantly mitigates risk and makes browsers an integral part of anti-phishing architecture.
The Price of Ignorance
Ignoring these browser capabilities could lead to expensive breaches. Phishing attacks are responsible for a significant chunk of data breaches globally:
Human Error : Phishing often succeeds due to user mistakes. Browsers mitigate this by removing reliance solely on personal judgment.
Financial Loss : According to IBM's Cost of Data Breach Report 2023, phishing is one of the most costly security breach types, averaging $4.65 million per incident.
Livelihood in a Post-Phishing Era
Investing in browser security enhancements not only strengthens defense but potentially saves millions in breach mitigation.
1. User Education :
Educating users about secure browsing practices enhances the efficacy of browser-based protections. This includes recognizing error messages and understanding browser alerts.
2. Policy Implementation :
Organizations must implement policies ensuring browsers are up-to-date. Outdated software is notorious for being a weak link in cybersecurity.
3. Collaboration with Vendors :
Engaging with browser vendors to access advanced security features and integrate them with organizational cybersecurity measures ensures a layered defense against phishing attacks.
Riding the Phish Wave with Humor
In this fight against phish, browsers are your trusty shield and mighty sword. Keep them polished, ready, and – most importantly – loved. With the right combination of tools and user awareness, phishing attempts stand no chance.
*
Vendor Diligence Questions
1. What measures do you have in place to ensure your browser's URL blacklist is continually updated in real-time?
2. Can your browser's isolation capabilities be customized to fit our organization's specific needs?
3. What is your process for responding to zero-day phishing threats, and how quickly are patches deployed?
Action Plan
* Immediate Steps :
Conduct an audit of current browser configurations and document adherence to best practices.
Schedule regular security training for staff focusing on phishing awareness and browser safety features.
Next 6 Months :
Partner with browser vendors to enhance real-time phishing protection tailored to organizational needs.
Develop a feedback loop from incidents to refine browser configurations and threat intelligence dissemination.
12 Months & Beyond:
Review the impact of browser-based protections on phishing incidents regularly and adjust strategies accordingly.
Integrate browser security metrics into overall cybersecurity performance indicators.
*
Source: Three Reasons Why the Browser is Best for Stopping Phishing Attacks
*
Peeling Away the Acronyms: DLP vs DSPM Showdown
_In a world addicted to acronyms, let's untangle the DLP from the DSPM without losing our minds—or our data._
What You Need to Know
In the rapidly evolving landscape of cybersecurity, understanding the tools to protect data is crucial for executives. Data Loss Prevention (DLP) and Data Security Posture Management (DSPM) are both instrumental in defending data assets, though they serve complementary purposes. Executives need to align their strategies with the capabilities and limitations of each solution to ensure maximal data protection. It is essential to evaluate current data security approaches to determine if integrating or revisiting these solutions could fill existing gaps.
CISO Focus: Data Protection and Compliance
Sentiment: Neutral
Time to Impact: Short (3-18 months)
*
In the modern era of data breaches and rampant cyber threats, effective data protection strategies are more vital than ever before. Our digital society thrives on data, and protecting this asset is at the forefront of every Chief Information Security Officer's (CISO) agenda. Often, organizations find themselves in a limbo of choosing the right tools, which leads to the age-old debate: DLP vs. DSPM. Understanding what these acronyms mean and how they differ is crucial for optimizing data security strategies.
DLP vs. DSPM: A Quick Rundown
Data Loss Prevention (DLP):
DLP solutions are designed to prevent sensitive data from leaving an organization inappropriately. DLP policies are typically rule-based and focus on monitoring, identifying, and protecting data in use, in motion, and at rest. They safeguard against data breaches and unauthorized access by setting alerts, blocking specific data transmissions, or encrypting sensitive data before it leaves the corporate environment.
Data Security Posture Management (DSPM):
DSPM solutions offer a holistic approach to securing data across complex environments. They provide visibility into the data security posture by identifying and assessing risks within the IT infrastructure. DSPMs are less about the direct control of outgoing data flows than about managing configurations and compliance postures to ensure security policies are up to par with industry standards.
Complex Environments Need Both
Complementary Roles:
While DLP directly addresses data leakage incidents, DSPM operates by enhancing data security configurations across environments. Many organizations find that leveraging both involves better protection mechanisms.
Integration Potential:
Combining DLP and DSPM can cover vulnerabilities by detecting weak points through DSPM and enforcing policies through DLP. Harmonizing the capabilities of both tools can avert data security incidents before they escalate.
Which Should You Choose?
Ultimately, the choice between DLP and DSPM—or their combined application—depends on the organization's specific needs.
Regulatory Compliance:
For companies heavily regulated, the immediate priority may tilt towards adopting DLP to handle compliance better by preventing violations through stringent data controls.
Dynamic Environments:
Organizations operating within high-risk environments or undergoing rapid digital transformation may benefit more from DSPM, which affords better visibility and management of security configurations.
Making a "Posture Shift"
A shift towards an integrated approach to data security demands revisiting the current stance on both protection and detection mechanisms.
Scenario-Based Analysis:
Executives are encouraged to assess diverse scenarios where data might be vulnerable or compliance might be at risk. This approach ensures the chosen solution effectively mitigates potential breaches.
Continuous Update of Policies:
Both DLP and DSPM thrive on up-to-date policies. Regular audits and updates help in adapting to the evolving threat landscape.
*
Vendor Diligence Questions
1. How does the vendor ensure seamless integration between DLP and DSPM products within existing infrastructure?
2. What ongoing support and updates are offered to adapt the tool to changing regulatory requirements?
3. How does the vendor address scalability to accommodate organizational growth or changes in digital architecture?
Action Plan
Assessment: Conduct a thorough review of current data management and protection processes.
Selection Strategy: Identify the gaps and align them with either DLP, DSPM, or both where necessary.
Implementation: Create a roadmap for implementation focusing on integration where DLP and DSPM will be most effective.
Review and Support: Establish metrics for performance evaluation; engage with vendors for regular support and updates.
*
Source: DLP vs. DSPM: What's the difference?
*
Change is in the Wind for SecOps: Are You Ready?
_Security is like coffee: You want it to be hot, strong, and refreshingly good at keeping you awake._
What You Need to Know
A shift in Security Operations (SecOps) is imminent, demanding executive buy-in and strategic adjustment. Management must prioritize enhanced coordination between security and operations teams to address growing cyber threats. Immediate actions should include investing in next-gen security tools, enhancing threat intelligence capabilities, and fostering a culture of continuous learning among employees to adapt quickly to evolving digital risks.
CISO focus: Security Operations (SecOps) Transformation
Sentiment: Strongly Positive
Time to Impact: Immediate
*
In the ever-evolving landscape of cybersecurity, organizations are now at a significant tipping point. Security Operations (SecOps) teams are encountering unprecedented challenges due to the rapid advancements in technology and the growing sophistication of cyber threats. The onus is on SecOps to not only play defense but to adapt and innovate, ensuring that their approaches remain as dynamic as the threats they face.
The SecOps Evolution
The transformation in SecOps is driven by several critical factors:
1\. The Increasing Complexity of Cyber Threats
Cyber threats have evolved in complexity, necessitating a shift in the defensive postures of most organizations. From sophisticated phishing scams to ransomware attacks, cybersecurity threats are becoming more targeted and harder to detect. This complexity requires SecOps teams to increase their vigilance and employ more sophisticated tools to anticipate and mitigate these threats.
2\. Integration of AI and Machine Learning
Artificial Intelligence (AI) and Machine Learning (ML) are no longer just buzzwords—they are pivotal to the future of SecOps. Integrating AI and ML technologies can augment existing security measures by enhancing real-time threat detection and enabling predictive analytics. AI-driven security can help automate responses to incidents, decreasing the time to action significantly and mitigating damage.
3\. Collaboration is Key
In an era where breach consequences are severe, collaboration between IT, security teams, and the wider business units is imperative. There's a need for enhanced communication channels that allow swift and efficient exchange of vital security information across various segments of the organization. This collaboration ensures that security strategies are not developed in silos but are an integral part of the overall business strategy.
SecOps Strategy: Not a Choice but a Necessity
Transforming SecOps isn't merely an upgrade—it's a necessary evolution. Here’s why your organization should be leaning into this change:
* Operational Efficiency: Enhanced security operations translate to more efficient processes. Automating routine security tasks leads to reduced manual errors and frees up resources for strategic initiatives.
* Proactive Threat Management: A forward-thinking SecOps strategy places organizations in a proactive stance, continually assessing and guarding against potential threats before they manifest into tangible risks.
* Risk Mitigation: With regulatory requirements tightening, maintaining updated and efficient SecOps can significantly reduce the risks of non-compliance and the hefty fines that come with it.
The Playbook for Future-proofing SecOps
1. Invest in Next-gen Tools : Prioritize tools that offer advanced analytics, AI integration, and can process large datasets to identify patterns indicative of a threat.
2. Enhance Threat Intelligence : Develop a robust threat intelligence capability that leverages both internal and external threat data to enhance situational awareness and anticipate upcoming challenges.
3. Cultivate a Learning Culture : Encourage your teams to keep abreast of the latest trends and threats through continuous education and training.
4. Redefine SecOps Roles : As cybersecurity evolves, so too should the roles within your SecOps team. Define roles that are flexible and can adapt to new technologies and methodologies quickly.
In this digitally interconnected age, security isn't purely defensive anymore; it's about making informed decisions before threats become breaches. Are you prepared to ride these winds of change or risk being swept away by them?
*
Vendor Diligence Questions
1. How can your security solutions enhance real-time threat detection in our current infrastructure?
2. What support do you offer in integrating AI and ML to bolster our existing security framework?
3. Can you provide case studies or references demonstrating improvement in SecOps efficiency using your tools?
Action Plan
1. Budget Alignment: Secure and allocate necessary budget enhancements for new security technologies.
2. Training Programs: Initiate mandatory continuous learning programs focusing on new cybersecurity trends and technologies.
3. Internal Audit : Conduct a detailed internal audit to identify potential vulnerabilities and areas in need of technological upgrades.
*
Sources:
[Change is in the wind for SecOps: Are you ready?](https://www.techtarget.com/searchsecurity/opinion/Change-is-in-the-wind-for-SecOps-Are-you-ready)
*
DPRK Strikes Again: A Heist from TRON Users, But Don't Be a Prawn
_If you're not phishing in North Korea, are you really phishing at all?_
What You Need to Know
A recent phishing attack, attributed to North Korean hacker groups, has resulted in a $137 million loss for TRON users. The breach, taking place over a single day, highlights the sophisticated and aggressive tactics used by state-sponsored actors. Board members and executive management are advised to review their organization's security protocols around cryptocurrency transactions and invest in advanced threat intelligence to protect their digital assets.
CISO Focus: Cryptojacking and Phishing Attacks
Sentiment: Negative
Time to Impact: Immediate
*
A new mega-breach has rocked the cryptocurrency world as North Korean hackers successfully pulled off a single-day phishing attack resulting in the loss of $137 million from TRON users. This incident serves as a stark reminder of the persistent threats facing the digital finance sector, stressing the need for robust cybersecurity measures and heightened vigilance in all electronic transactions.
The Attack Unveiled
On April 24th, 2025, unsuspecting TRON users became the targets of a sophisticated phishing campaign that funneled vast amounts of cryptocurrency into the hands of a group backed by the notorious state-sponsored North Korean hackers. This attack not only underscores the capabilities and resourcefulness of these cyber adversaries but also exposes vulnerabilities within digital financial systems.
Anatomy of the Breach
The attackers deployed highly targeted phishing emails designed to dupe users into divulging their login credentials. These emails mimicked official communications from TRON, complete with branding and messaging typically trusted by users. Once credentials were compromised, the hackers swiftly drained crypto wallets, making off with the monumental sum.
Key aspects of the phishing attack included:
Social Engineering: Exploiting users’ expectations and trust by crafting convincing impersonations of legitimate TRON communications.
Technical Prowess: Employing advanced techniques to evade detection and prolong the attack's duration, maximizing stolen funds.
The Bigger Picture: State-Sponsored Cybercrime
North Korea’s involvement in this attack is consistent with its ongoing efforts to fund state activities amid economic sanctions. The regime has increasingly relied on sophisticated cyber operations to generate revenue, and cryptocurrencies provide an appealing avenue due to their decentralized nature and rapid transaction capabilities.
Past activities have shown a pattern, with North Korea implicated in major heists such as the 2017 WannaCry ransomware attack and the ill-famed 2014 Sony Pictures hack. The recent TRON incident hints at an evolution in strategy, leveraging ever more refined phishing attacks to exploit the burgeoning digital currency landscape.
What It Means for the Crypto Community
For the broader cryptocurrency ecosystem, this event is a wake-up call to bolster defenses against not only phishing but the entire spectrum of cyber threats. The burgeoning adoption of these technologies has outpaced security measures, leaving many unsuspecting investors vulnerable.
Immediate Remedies
Enhanced User Education: Greater emphasis on educating users about potential phishing scams and security practices.
Advanced Threat Detection: Incorporating AI and machine learning to anticipate and thwart phishing attempts before substantial losses occur.
Regulatory Oversight: Calls for increased regulation and guidance for cryptocurrency exchanges and wallets to standardize and enforce security protocols.
Looking Forward: Reducing the Risk
The trajectory of state-sponsored cyber-attacks suggests a persistent, evolving threat that crypto platforms and users must contend with. As these actors refine their methods, the crypto community must be prepared to adapt and counteract swiftly.
Strategies for Protection
Security Audits: Routine IT security audits to identify and address potential vulnerabilities in digital infrastructure.
Cross-platform Collaborations: Initiatives fostering information sharing and collaboration can amplify resistance to state-sponsored cyber threats.
Resiliency Training: Building organizational capacity to respond to incidents efficiently, ensuring rapid recovery and minimal disruption.
*
Vendor Diligence Questions
1. How does your security protocol align with protecting against state-sponsored phishing attacks?
2. What measures are in place to educate users continuously about emerging threats like phishing scams?
3. Can your solutions integrate easily with our existing threat detection and response systems to address cryptojacking attempts?
Action Plan
Immediate Threat Assessment: Conduct a comprehensive review of current security measures protecting your crypto assets against phishing.
User Awareness Campaigns: Launch immediate internal and external campaigns focusing on recognizing and avoiding phishing attempts.
Upgrade Security Infrastructure: Evaluate and update security infrastructure to include next-generation threat detection technologies.
*
Source: DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

