Brief

Brief #86: BeyondTrust API Exploit, Microsoft vs AI Hackers, OWASP Non-Human Identity Risks

Critical government systems compromised via API theft. New macOS malware emerges. DHS shares concrete guidance for AI implementation

8 min read
mandos brief cybersecurity leadership newsletter week 2 of 2025

Happy Sunday!

Hope you're enjoying your weekend! While you were busy wrapping up another week, the cybersecurity world has been pretty active (as always!). I've picked some interesting stories that I think you'll want to know about.

And there's plenty more where that came from. Grab your favorite Sunday beverage and dive in! 

Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share.

INDUSTRY NEWS

Chinese State Actors Access U.S. Treasury Systems Using Stolen BeyondTrust API Key

Azure Airflow Kubernetes Misconfiguration Enables Cluster-Wide Admin Access

Banshee Stealer Malware Targets macOS Users Through GitHub and Phishing Campaigns

LEADERSHIP INSIGHTS

OWASP Releases First Top 10 Non-Human Identities Security Risks List

KPMG and MIT Study Reveals AI's Potential Role in Strengthening Cybersecurity Culture

70% of CISOs Express Concern Over Personal Liability Risks in Leadership Role

Discover my collection of industry reports, guides and cheat sheets in Cyber Strategy OS.

CAREER DEVELOPMENT

SOC Analysts Share Unusual Workplace Security Incidents Including Data Misuse and False Positives

Security Professionals Discuss Value and Challenges of Proactive Threat Hunting

Cybersecurity Professionals Report Diverse Job Responsibilities Beyond Core Security Functions

AI & SECURITY

DHS Releases GenAI Deployment Playbook for Public Sector Organizations

LLM-Based Proactive Defense Architecture Proposed for Cloud Security

MARKET UPDATES

1Password Acquires Trelica to Enhance Shadow IT Detection and Access Management

Darktrace Acquires Cado Security to Enhance Cloud Investigation Capabilities

Synology Launches ActiveProtect Enterprise Backup Solution with All-in-One Architecture

TOOLS

Kunai

Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.

getallurls (gau)

Fetches known URLs from various sources for a given domain.

Verity

Verity is a comprehensive compliance management tool that helps organizations manage their governance, risk, and compliance initiatives.


Before you go

If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!

For more frequent cybersecurity leadership insights and tips, follow me on LinkedInBlueSky and Mastodon.

Best, 
Nikoloz

Share This Post

Check out these related posts

Brief #85: Windows LDAP Exploit, Tenable Nessus Outage, Security Leadership Pay

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read

Brief #84: Chrome Extension Attacks, Amazon Redshift Vulns, PAN-OS DoS

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read

Brief #83: TP-Link Ban, LastPass Breach Impact, SOC Analyst Crisis

  • Nikoloz Kokhreidze
by Nikoloz Kokhreidze | | 9 min read