Threats & Security News

the latest cybersecurity threat alerts and industry happenings

DEF CON Research Takes Aim at ZTNA, Calls It a Bust Article Link: https://www.networkworld.com/article/4039042/def-con-research-takes-aim-at-ztna-calls-it-a-bust.html Personalization in Phishing: Advanced Tactics for Malware

St. Paul, Minnesota, Hit by Major Cyber Attack, State of Emergency Declared, National Guard Deployed Article Link: https://www.cpomagazine.com/cyber-security/st-paul-minnesota-hit-by-major-cyber-attack-state-of-emergency-declared-national-guard-deployed/ Google Breached —

Saint Paul City Council Extends Local State of Emergency to Respond to Digital Security Incident Article Link: https://www.stpaul.gov/news/saint-paul-city-council-extends-local-state-emergency-respond-digital-security-incident The Healthcare Industry

U.S. Nuclear Weapons Department Compromised in SharePoint Attack Article Link: https://www.neowin.net/news/us-nuclear-weapons-department-compromised-in-sharepoint-attack/ Humans Can Be Tracked with Unique ‘Fingerprint’ Based on How

Google Gemini Flaw Hijacks Email Summaries for Phishing Article Link: https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/   Hackers Exploit a Blind Spot Hiding Malware Inside DNS

Citrix is back with vulnerability news no one wanted. CitrixBleed2 is affecting Citrix NetScaler ADC and Gateway devices between versions 14.1

The Top Red Teamer in the US Is an AI Bot Article Link: https://www.csoonline.com/article/4012801/the-top-red-teamer-in-the-us-is-an-ai-bot.html FDA Expands Premarket Medical Device Cyber Guidance

Ransomware Disruptions Contributed to a Patient Death, NHS Finds Article Link: https://www.techradar.com/pro/security/ransomware-disruptions-contributed-to-a-patient-death-nhs-finds Scans Probing for MOVEit Systems May Be Precursor to

Law Enforcement Takedowns Disrupt Cybercrimes Across the Globe Article Link: https://cyberscoop.com/cybercrime-crackdown-operation-endgame-operation-secure/   Microsoft 365 to Block File Access Via Legacy Auth

Do You Want to Shore Up Your Defenses?

We're opening our first round of threat hunting engagements to 100 organizations. Sign up or join the wait list here.