<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
<channel>
<title><![CDATA[ Mandos ]]></title>
<description><![CDATA[ M&amp;A security due diligence, fractional CISO, and program optimization for PE firms, boards, and executives. Backed by 13 years of experience and data from 5,800+ security products ]]></description>
<link>https://mandos.io</link>
<image>
    <url>https://mandos.io/favicon.png</url>
    <title>Mandos</title>
    <link>https://mandos.io</link>
</image>
<lastBuildDate>Wed, 22 Apr 2026 13:13:11 +0200</lastBuildDate>
<atom:link href="https://mandos.io" rel="self" type="application/rss+xml"/>
<ttl>60</ttl>

    <item>
        <title><![CDATA[ Brief #149: FortiClient EMS Zero-Day, EU Commission 340GB Breach, LinkedIn BrowserGate ]]></title>
        <description><![CDATA[ Fortinet patches second critical zero-day in days, TeamPCP steals 340 GB from the European Commission via Trivy, and LinkedIn secretly scans for 6,000+ browser extensions on every page load. ]]></description>
        <link>https://mandos.io/newsletter/brief-149-forticlient-ems-zero-day-eu-commission-340gb-breach-linkedin-browsergate/</link>
        <guid isPermaLink="false">69d280beef7f23a4d9994193</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 05 Apr 2026 18:09:39 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2026/04/14.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>Supply chain fallout intensifies:</strong> TeamPCP's Trivy compromise led to 340 GB stolen from the European Commission, Claude Code's accidental leak became a malware delivery vehicle, and Fortinet is patching its second critical zero-day in days.</li><li><strong>LinkedIn's hidden surveillance:</strong> A "BrowserGate" investigation revealed LinkedIn scans for 6,167 browser extensions on every page load, building intelligence profiles tied to real identities, without disclosure.</li><li><strong>AI agent security gaps:</strong> Google published its prompt injection defense playbook, Unit 42 exposed multi-agent exploitation paths in Amazon Bedrock, and a new report warns AI agents can cost more than employees without controls.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Industry-News-1.png" style="background-image: url(https://mandos.io/content/images/2024/09/Industry-News-1.png)"><h2 class="kg-header-card-header" id="threats"><span style="white-space: pre-wrap;">Threats</span></h2></div><h3 id="fortinet-forticlient-ems-zero-day-exploited-in-the-wild-cvss-91-emergency-hotfix-released"><a href="https://cybersecuritynews.com/fortinet-forticlient-ems-0-day/?ref=mandos.io" rel="noopener">Fortinet FortiClient EMS Zero-Day Exploited in the Wild, CVSS 9.1 Emergency Hotfix Released</a></h3><ul><li><strong>Fortinet</strong> released an emergency hotfix for <strong>CVE-2026-35616</strong>, a critical pre-authentication API bypass in <strong>FortiClient EMS</strong> versions 7.4.5 and 7.4.6 that lets unauthenticated attackers execute arbitrary code without any user interaction or privileges.</li><li>This is the second critical FortiClient EMS flaw exploited in days, following <strong>CVE-2026-21643</strong> (also CVSS 9.1). <strong>watchTowr</strong> recorded exploitation attempts starting March 31, timed to hit during a holiday weekend when security teams run at half capacity.</li><li>Security teams running FortiClient EMS should apply the hotfix immediately, restrict external access to the EMS management interface, and audit logs for anomalous unauthenticated API requests that could indicate prior compromise.</li></ul><h3 id="european-commission-breached-via-trivy-supply-chain-attack-340-gb-of-data-stolen"><a href="https://www.securityweek.com/european-commission-confirms-data-breach-linked-to-trivy-supply-chain-attack/?ref=mandos.io" rel="noopener">European Commission Breached via Trivy Supply Chain Attack, 340 GB of Data Stolen</a></h3><ul><li><strong>CERT-EU</strong> confirmed that threat group <strong>TeamPCP</strong> breached the European Commission's AWS environment by poisoning <strong>Aqua Security's Trivy</strong> vulnerability scanner, stealing an API key that gave them control over cloud accounts serving 71 clients across EU institutions.</li><li>The attackers exfiltrated <strong>340 GB of data</strong> including personal information, usernames, and email content from the Europa.eu hosting service. <strong>ShinyHunters</strong> published the stolen dataset on a dark web leak site on March 28, just days after initial compromise.</li><li>Organizations using Trivy should immediately verify they're running a known-safe version, rotate all AWS credentials, pin GitHub Actions to immutable SHA hashes instead of mutable tags, and enable CloudTrail logging to detect anomalous STS calls.</li></ul><h3 id="claude-code-source-leak-weaponized-to-spread-vidar-stealer-and-ghostsocks-malware"><a href="https://www.bleepingcomputer.com/news/security/claude-code-leak-used-to-push-infostealer-malware-on-github/?ref=mandos.io" rel="noopener">Claude Code Source Leak Weaponized to Spread Vidar Stealer and GhostSocks Malware</a></h3><ul><li>After <strong>Anthropic</strong> accidentally exposed <strong>513,000 lines</strong> of Claude Code source via an npm packaging error on March 31, attackers created fake GitHub repositories offering "unlocked enterprise" versions that instead delivered a <strong>Rust-based dropper</strong> containing <strong>Vidar v18.7</strong> infostealer and <strong>GhostSocks</strong> proxy malware.</li><li>The malicious repos ranked near the top of Google search results for "leaked Claude Code," targeting developers who cloned what appeared to be legitimate forks. <strong>Zscaler ThreatLabz</strong> identified the campaign as part of a broader operation impersonating 25+ software brands since February 2026.</li><li>Development teams should only use verified binaries from official sources, avoid cloning unverified repositories, and monitor developer workstations for anomalous outbound connections that could indicate credential theft or proxy tunneling.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Leadership-Insights.png" style="background-image: url(https://mandos.io/content/images/2024/09/Leadership-Insights.png)"><h2 class="kg-header-card-header" id="ciso-lens"><span style="white-space: pre-wrap;">CISO Lens</span></h2></div><h3 id="linkedin-secretly-scans-for-6000-browser-extensions-collects-device-data-without-disclosure"><a href="https://www.bleepingcomputer.com/news/security/linkedin-secretly-scans-for-6-000-plus-chrome-extensions-collects-data/?ref=mandos.io" rel="noopener">LinkedIn Secretly Scans for 6,000+ Browser Extensions, Collects Device Data Without Disclosure</a></h3><ul><li>A <strong>Fairlinked e.V.</strong> investigation dubbed "BrowserGate" revealed that <strong>LinkedIn</strong> injects hidden JavaScript that scans Chromium browsers for <strong>6,167 extensions</strong> and collects 48 device characteristics on every page load, without any mention in its privacy policy or user consent.</li><li>The scanned extensions include <strong>509 job search tools</strong>, religious practice indicators, political orientation markers, neurodivergent support apps, and 200+ competitor products. Since LinkedIn ties to real identities and employers, this creates detailed intelligence profiles on the professional workforce at scale.</li><li>Security teams should evaluate whether LinkedIn's undisclosed data collection practices conflict with internal privacy policies, consider browser isolation or switching to non-Chromium browsers for sensitive roles, and review third-party platform risk assessments.</li></ul><h3 id="gitguardian-report-29-million-secrets-leaked-on-github-in-2025-ai-credentials-up-81"><a href="https://thehackernews.com/2026/03/the-state-of-secrets-sprawl-2026-9.html?ref=mandos.io" rel="noopener">GitGuardian Report: 29 Million Secrets Leaked on GitHub in 2025, AI Credentials Up 81%</a></h3><ul><li><strong>GitGuardian's</strong> State of Secrets Sprawl 2026 report found <strong>29 million new hardcoded secrets</strong> on public GitHub in 2025, a <strong>34% year-over-year increase</strong> and the largest single-year jump ever recorded. AI service credential leaks surged <strong>81%</strong>, with orchestration tools like Firecrawl (+796%) and Supabase (+992%) leading the growth.</li><li>Analysis of the <strong>Shai-Hulud 2</strong> supply chain attack showed each compromised machine contained an average of <strong>8 copies</strong> of the same secret spread across .env files, shell history, and build artifacts. <strong>59% of compromised machines were CI/CD runners</strong>, not developer laptops, meaning secrets sprawl is now an infrastructure problem.</li><li>Organizations should eliminate long-lived static credentials, adopt short-lived identity-driven access, implement secrets vaulting as the default workflow, and treat every service account, CI job, and AI agent as a governed identity with lifecycle management.</li></ul><h3 id="akira-ransomware-achieves-initial-access-to-encryption-in-under-one-hour"><a href="https://cyberscoop.com/akira-ransomware-initial-access-to-encryption-in-hours/?ref=mandos.io" rel="noopener">Akira Ransomware Achieves Initial Access to Encryption in Under One Hour</a></h3><ul><li>Researchers documented <strong>Akira</strong> ransomware operators completing the full attack chain, from initial VPN access to deploying encryption, in <strong>under 60 minutes</strong>. The group exploited compromised VPN credentials lacking multi-factor authentication to gain entry, then moved laterally using RDP and standard admin tools.</li><li>This speed leaves almost zero window for traditional detection and response. Most SOC teams operate with response times measured in hours, not minutes. Akira's pace means that by the time an alert triggers and an analyst investigates, encryption may already be complete.</li><li>Incident response playbooks need to account for sub-hour ransomware execution. MFA on all remote access is no longer optional, and automated containment actions (network isolation on high-confidence alerts) should replace manual triage for initial response.</li></ul><hr>
<!--kg-card-begin: html-->
<style>
  .mfb-card * { margin: 0; padding: 0; box-sizing: border-box; }
  .mfb-card { font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', sans-serif; width: 100%; max-width: 480px; background: linear-gradient(135deg, #0a2e1a 0%, #0c3d22 50%, #0a2e1a 100%); border: 1px solid rgba(20, 184, 112, 0.25); border-radius: 12px; padding: 28px 24px; text-align: center; margin: 24px auto; color: #e4e4e7; }
  .mfb-title { font-size: 15px; font-weight: 500; color: #b0e8cf; margin-bottom: 16px; letter-spacing: 0.01em; }
  .mfb-stars { display: flex; justify-content: center; gap: 8px; margin-bottom: 6px; }
  .mfb-star { background: rgba(0, 0, 0, 0.3); border: 2px solid rgba(20, 184, 112, 0.3); border-radius: 10px; width: 52px; height: 52px; cursor: pointer; display: flex; align-items: center; justify-content: center; font-size: 18px; font-weight: 600; color: rgba(20, 184, 112, 0.6); transition: all 0.2s ease; font-family: inherit; }
  .mfb-star:hover { border-color: #14b870; background: rgba(20, 184, 112, 0.15); transform: translateY(-2px); color: #14b870; }
  .mfb-star.selected { border-color: #14b870; background: rgba(20, 184, 112, 0.2); color: #fff; box-shadow: 0 0 12px rgba(20, 184, 112, 0.3); }
  .mfb-labels { display: flex; justify-content: space-between; padding: 0 4px; }
  .mfb-labels span { font-size: 11px; color: rgba(20, 184, 112, 0.5); }
  .mfb-comment { max-height: 0; overflow: hidden; opacity: 0; transition: max-height 0.4s ease, opacity 0.3s ease, margin 0.3s ease; margin-top: 0; }
  .mfb-comment.visible { max-height: 200px; opacity: 1; margin-top: 20px; }
  .mfb-textarea { width: 100%; background: rgba(0, 0, 0, 0.4); border: 1px solid rgba(20, 184, 112, 0.25); border-radius: 8px; padding: 12px 14px; color: #e4e4e7; font-family: inherit; font-size: 14px; resize: none; height: 64px; outline: none; transition: border-color 0.2s; }
  .mfb-textarea::placeholder { color: rgba(176, 232, 207, 0.4); }
  .mfb-textarea:focus { border-color: #14b870; }
  .mfb-btn { margin-top: 10px; width: 100%; background: #14b870; color: #0a2e1a; border: none; border-radius: 8px; padding: 10px 0; font-family: inherit; font-size: 14px; font-weight: 600; cursor: pointer; transition: background 0.2s, transform 0.1s; }
  .mfb-btn:hover { background: #17d483; }
  .mfb-btn:active { transform: scale(0.98); }
  .mfb-btn:disabled { background: rgba(20, 184, 112, 0.3); color: rgba(10, 46, 26, 0.6); cursor: not-allowed; }
  .mfb-thanks { display: none; padding: 20px 0 4px; text-align: center; }
  .mfb-check { width: 40px; height: 40px; background: rgba(20, 184, 112, 0.2); border-radius: 50%; display: inline-flex; align-items: center; justify-content: center; margin-bottom: 12px; }
  .mfb-check svg { width: 20px; height: 20px; stroke: #14b870; fill: none; stroke-width: 2.5; stroke-linecap: round; stroke-linejoin: round; }
  .mfb-thanks h3 { font-size: 16px; font-weight: 600; color: #e4e4e7; margin-bottom: 4px; }
  .mfb-thanks p { font-size: 13px; color: #b0e8cf; }
  .mfb-error { font-size: 12px; color: #ef4444; margin-top: 8px; display: none; }
  .mfb-spinner { display: none; width: 16px; height: 16px; border: 2px solid transparent; border-top-color: #0a2e1a; border-radius: 50%; animation: mfbSpin 0.6s linear infinite; margin: 0 auto; }
  @keyframes mfbSpin { to { transform: rotate(360deg); } }
</style>
<div class="mfb-card">
  <div id="mfbStep">
    <div class="mfb-title">How was this week's brief?</div>
    <div class="mfb-stars">
      <button class="mfb-star" data-r="1">1</button>
      <button class="mfb-star" data-r="2">2</button>
      <button class="mfb-star" data-r="3">3</button>
      <button class="mfb-star" data-r="4">4</button>
      <button class="mfb-star" data-r="5">5</button>
    </div>
    <div class="mfb-labels"><span>Not useful</span><span>Very useful</span></div>
    <div class="mfb-comment" id="mfbComment">
      <textarea class="mfb-textarea" id="mfbText" placeholder="Any thoughts? (optional)" maxlength="500"></textarea>
      <button class="mfb-btn" id="mfbBtn" onclick="mfbSubmit()">
        <span id="mfbBtnT">Send feedback</span>
        <div class="mfb-spinner" id="mfbSpin"></div>
      </button>
      <div class="mfb-error" id="mfbErr">Something went wrong. Try again.</div>
    </div>
  </div>
  <div class="mfb-thanks" id="mfbThanks">
    <div class="mfb-check"><svg viewBox="0 0 24 24"><polyline points="20 6 9 17 4 12"/></svg></div>
    <h3>Thanks for the feedback</h3>
    <p>It helps shape next week's brief.</p>
  </div>
</div>
<script>
(function(){
  var WEBHOOK='https://builder.mandos.io/webhook/a1a78ac7-9ff1-4aa7-8bd2-3cb8294134df';
  var APIKEY='w3pA6KvoyNgG67VBLwkdAUNpPWkuJ8CmeyETLW3KacKXFcshVMZbMWd3iohxx9m3';
  var TITLE='Mandos Brief';
  try{var pageTitle=document.title||'';var match=pageTitle.match(/Brief\s*#\d+/i);if(match){TITLE=match[0];}else{var h1=document.querySelector('.gh-article-title, .post-full-title, h1');if(h1){var h1match=h1.textContent.match(/Brief\s*#\d+/i);if(h1match)TITLE=h1match[0];}}}catch(e){}
  var rating=null,entryId=null;
  document.querySelectorAll('.mfb-star').forEach(function(btn){btn.addEventListener('click',function(){rating=parseInt(this.dataset.r);document.querySelectorAll('.mfb-star').forEach(function(b){b.classList.remove('selected');});this.classList.add('selected');document.getElementById('mfbComment').classList.add('visible');fetch(WEBHOOK,{method:'POST',headers:{'Content-Type':'application/json','Authorization':APIKEY},body:JSON.stringify({pageTitle:TITLE,rating:rating,comment:'',timestamp:new Date().toISOString()})}).then(function(r){return r.json();}).then(function(d){if(d.id)entryId=d.id;}).catch(function(){});});});
  window.mfbSubmit=function(){var comment=document.getElementById('mfbText').value.trim();var btn=document.getElementById('mfbBtn');var btnT=document.getElementById('mfbBtnT');var spin=document.getElementById('mfbSpin');var err=document.getElementById('mfbErr');btn.disabled=true;btnT.style.display='none';spin.style.display='block';err.style.display='none';var payload={pageTitle:TITLE,rating:rating,comment:comment,timestamp:new Date().toISOString()};if(entryId)payload.id=entryId;fetch(WEBHOOK,{method:'POST',headers:{'Content-Type':'application/json','Authorization':APIKEY},body:JSON.stringify(payload)}).then(function(r){if(r.ok){document.getElementById('mfbStep').style.display='none';document.getElementById('mfbThanks').style.display='block';}else throw new Error();}).catch(function(){err.style.display='block';btn.disabled=false;btnT.style.display='inline';spin.style.display='none';});};
})();
</script>
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/AI---Security.png" style="background-image: url(https://mandos.io/content/images/2024/09/AI---Security.png)"><h2 class="kg-header-card-header" id="ai-amp-security"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2></div><h3 id="google-details-layered-defense-strategy-against-indirect-prompt-injection-in-workspace"><a href="https://security.googleblog.com/2026/04/google-workspaces-continuous-approach.html?ref=mandos.io" rel="noopener">Google Details Layered Defense Strategy Against Indirect Prompt Injection in Workspace</a></h3><ul><li><strong>Google's GenAI Security Team</strong> published a detailed breakdown of how they defend <strong>Gemini in Workspace</strong> against indirect prompt injection, combining adversarial model training, proprietary ML-based content classifiers, markdown sanitization, suspicious URL redaction, and human-in-the-loop confirmation for sensitive actions.</li><li>The approach treats prompt injection as a continuous arms race, not a one-time fix. Google uses both human and automated red-teaming plus its <strong>AI Vulnerability Reward Program</strong> to build one of the most advanced catalogs of generative AI attack patterns, feeding this data back into model hardening.</li><li>As organizations roll out AI assistants that process emails, documents, and calendar data, this defense-in-depth model offers a practical reference architecture for building layered protections into enterprise AI deployments.</li></ul><h3 id="palo-alto-unit-42-multi-agent-ai-applications-in-amazon-bedrock-open-to-exploitation"><a href="https://unit42.paloaltonetworks.com/amazon-bedrock-multiagent-applications/?ref=mandos.io" rel="noopener">Palo Alto Unit 42: Multi-Agent AI Applications in Amazon Bedrock Open to Exploitation</a></h3><ul><li><strong>Palo Alto Networks Unit 42</strong> published research showing how attackers can exploit <strong>Amazon Bedrock's</strong> multi-agent collaboration framework, where one compromised or poorly configured agent can manipulate other agents in the chain to access sensitive data or perform unauthorized actions.</li><li>The research demonstrated that agentic architectures create new trust boundaries between AI agents that most security teams are not yet monitoring. When agents delegate tasks to other agents, traditional access controls break down because permissions compound across the chain.</li><li>Security teams deploying multi-agent AI systems should enforce strict least-privilege access per agent, implement monitoring at inter-agent communication boundaries, and validate that no single agent can escalate its own permissions through delegation.</li></ul><h3 id="ai-agents-can-cost-more-than-employees-without-proper-controls-report-warns"><a href="https://www.cio.com/article/4152601/without-controls-an-ai-agent-can-cost-more-than-an-employee.html?ref=mandos.io" rel="noopener">AI Agents Can Cost More Than Employees Without Proper Controls, Report Warns</a></h3><ul><li>A new analysis warns that <strong>AI agents</strong> deployed without spending controls, usage monitoring, or governance frameworks can generate costs that exceed the salary of the employees they were meant to augment, driven by runaway API calls, redundant processing, and uncapped token usage.</li><li>The report highlights cases where autonomous agents running in loops consumed thousands of dollars in compute costs within hours, with no alerting mechanism in place. Most organizations lack the financial visibility to track AI agent spending in real time.</li><li>Before deploying autonomous AI agents, organizations should set hard spending limits per agent, implement real-time cost monitoring dashboards, and define clear escalation paths that require human approval for actions above spending thresholds.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Market-Analysis.png" style="background-image: url(https://mandos.io/content/images/2024/09/Market-Analysis.png)"><h2 class="kg-header-card-header" id="market-intelligence"><span style="white-space: pre-wrap;">Market Intelligence</span></h2></div><h3 id="depthfirst-raises-80m-series-b-for-ai-native-software-security-platform"><a href="https://www.securityweek.com/depthfirst-raises-80-million-in-series-b-funding/?ref=mandos.io" rel="noopener">Depthfirst Raises $80M Series B for AI-Native Software Security Platform</a></h3><ul><li><strong>Depthfirst</strong>, an applied AI lab founded by <strong>DeepMind, Databricks, and Faire</strong> alumni, raised <strong>$80M in Series B</strong> led by <strong>Meritech Capital</strong>, bringing total funding to <strong>$120M</strong> in under 90 days since emerging from stealth. The speed of back-to-back raises signals strong investor conviction in AI-native security.</li><li>The company launched <strong>dfs-mini1</strong>, its first in-house security model for smart contract security, and reports <strong>80% of its fix recommendations</strong> are accepted and merged by developers. Customers include ClickUp, Supabase, and Moveworks.</li><li>The raise reinforces a broader market thesis: security-specific AI models trained on domain data will outperform general-purpose LLMs applied to security. Founders building in this space should watch how Depthfirst's "own the model" strategy plays out against wrapper-based approaches.</li></ul><h3 id="censys-raises-70m-to-expand-internet-intelligence-platform"><a href="https://www.securityweek.com/censys-raises-70-million-for-internet-intelligence-platform/?ref=mandos.io" rel="noopener">Censys Raises $70M to Expand Internet Intelligence Platform</a></h3><ul><li><strong>Censys</strong> closed <strong>$70M</strong> in strategic funding ($40M Series D + $30M debt), led by <strong>Morgan Stanley Expansion Capital</strong>, bringing total venture funding to <strong>$149M</strong>. The capital will fuel AI-driven solutions for attack surface management and threat hunting.</li><li>The company is trusted by <strong>300,000+ security practitioners</strong> and organizations representing over <strong>50% of the Fortune 500</strong>. As internet infrastructure becomes the top attack vector, demand for real-time intelligence on exposed assets continues to grow.</li><li>For security vendors, Censys's raise highlights how data-centric platforms that own proprietary intelligence are attracting premium valuations. The combination of equity and debt financing also suggests the company is approaching profitability.</li></ul><h3 id="variance-raises-215m-for-ai-agent-powered-compliance-investigation-platform"><a href="https://www.securityweek.com/variance-raises-21-5m-for-compliance-investigation-platform-powered-by-ai-agents/?ref=mandos.io" rel="noopener">Variance Raises $21.5M for AI Agent-Powered Compliance Investigation Platform</a></h3><ul><li><strong>Variance</strong> raised <strong>$21.5M</strong> to build an AI agent-powered platform that automates compliance investigations, targeting the manual, resource-heavy work of sifting through regulatory requirements and incident documentation.</li><li>The funding signals growing investor interest in applying <strong>agentic AI</strong> to GRC (governance, risk, compliance) workflows, where most organizations still rely on spreadsheets, manual review, and consulting hours to handle investigations.</li><li>Compliance-focused AI tools are an underserved segment with clear enterprise demand. Security founders should watch this space as traditional GRC vendors will likely need to add AI-native capabilities to compete.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/TOOLS.png" style="background-image: url(https://mandos.io/content/images/2024/09/TOOLS.png)"><h2 class="kg-header-card-header" id="security-stack"><span style="white-space: pre-wrap;">Security Stack</span></h2></div><h3 id="gitguardian-non-human-identity-security"><a href="https://cybersectools.com/tools/gitguardian-non-human-identity-security?ref=mandos.io">GitGuardian Non-Human Identity Security</a></h3><p>With 29 million secrets leaked on GitHub in 2025, GitGuardian's NHI security platform detects hardcoded credentials, API keys, and tokens across repositories and CI/CD pipelines. Directly relevant to this week's Secrets Sprawl report findings.</p><h3 id="cycode-secrets-detection-and-scanning"><a href="https://cybersectools.com/tools/cycode-secrets-detection-and-scanning?ref=mandos.io">Cycode Secrets Detection and Scanning</a></h3><p>Cloud-based secrets detection that scans code repositories for exposed credentials before they reach production. Useful for teams looking to implement the secrets vaulting and governance workflows recommended in this week's CISO Lens coverage.</p><h3 id="fullhunt"><a href="https://cybersectools.com/tools/fullhunt?ref=mandos.io">FullHunt</a></h3><p>Free external attack surface management tool for discovering exposed assets and services. Relevant this week given the Censys $70M raise and the growing importance of knowing what's internet-facing before attackers find it first.</p><hr><p>Thank you for reading this week's brief.</p><p>Whenever you're ready, there are three ways I can help you:</p><ul><li>Get your cybersecurity product in front of 15,000 cybersecurity professionals on CybersecTools. <a href="https://cybersectools.com/promote?ref=mandos.io" rel="noopener">Promote Your Product</a></li><li>Position your product to sell to CISOs correctly. <a href="https://cybersectools.com/advisory?ref=mandos.io" rel="noopener">Positioning Advisory</a></li><li>Analyze entire cybersecurity market with AI. <a href="https://cybersectools.com/mcp-access?ref=mandos.io" rel="noreferrer">Access CybersecTools MCP server</a></li></ul><p>Talk to you in the next one.</p><p>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #148: Telnyx PyPI Supply Chain Attack, F5 BIG-IP RCE Exploited, Databricks Launches Lakewatch SIEM ]]></title>
        <description><![CDATA[ TeamPCP compromised the Telnyx Python SDK on PyPI using audio steganography, partnered with LAPSUS$ and a ransomware group, and turned developer tools into entry points for extortion campaigns. ]]></description>
        <link>https://mandos.io/newsletter/brief-148-telnyx-pypi-supply-chain-attack-f5-big-ip-rce-exploited-databricks-launches-lakewatch-siem/</link>
        <guid isPermaLink="false">69c8f35fef7f23a4d99934e9</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 29 Mar 2026 17:00:38 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2026/03/13.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday,</p><p>In this week's analysis:</p><ul><li><strong>Supply chain threat escalation:</strong> TeamPCP's multi-ecosystem campaign now includes ransomware partnerships, signaling a shift where open-source infrastructure becomes a first-stage attack vector for extortion.</li><li><strong>CISO leadership deficit:</strong> Only 35,000 CISOs serve 359 million businesses globally, a 10,000-to-1 ratio that leaves SMBs structurally exposed.</li><li><strong>Platform disruption:</strong> Databricks' Lakewatch SIEM uses consumption pricing to challenge incumbents, and security teams should start evaluating it for 2026 renewal cycles.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Industry-News-1.png" style="background-image: url(https://mandos.io/content/images/2024/09/Industry-News-1.png)"><h2 class="kg-header-card-header" id="threats"><span style="white-space: pre-wrap;">Threats</span></h2></div><h3 id="teampcp-compromises-telnyx-pypi-package-hides-credential-stealer-inside-wav-audio-files"><a href="https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html?ref=mandos.io" rel="noopener">TeamPCP Compromises Telnyx PyPI Package, Hides Credential Stealer Inside WAV Audio Files</a></h3><ul><li><strong>TeamPCP</strong> pushed two malicious versions (4.87.1 and 4.87.2) of the popular <strong>Telnyx</strong> Python SDK to PyPI on March 27, embedding credential-stealing malware inside .WAV audio files using steganography to evade detection.</li><li>The attack is part of a broader supply chain campaign that already hit <strong>Trivy</strong>, <strong>KICS</strong>, and <strong>litellm</strong>, and the group has announced partnerships with <strong>LAPSUS$</strong> and ransomware group <strong>Vect</strong> to scale credential abuse before victims complete remediation.</li><li>Pin all GitHub Actions and PyPI dependencies to exact commit SHAs, audit environments for telnyx 4.87.1/4.87.2, rotate all secrets if found, and block the C2 IP (83[.]142[.]209[.]203).</li></ul><h3 id="cisa-adds-f5-big-ip-apm-critical-rce-flaw-to-kev-catalog-after-active-exploitation"><a href="https://thehackernews.com/2026/03/cisa-adds-cve-2025-53521-to-kev-after.html?ref=mandos.io" rel="noopener">CISA Adds F5 BIG-IP APM Critical RCE Flaw to KEV Catalog After Active Exploitation</a></h3><ul><li><strong>CISA</strong> added <strong>CVE-2025-53521</strong> (CVSS 9.3) to its Known Exploited Vulnerabilities catalog on March 28 after <strong>F5</strong> confirmed active exploitation of a remote code execution flaw in <strong>BIG-IP Access Policy Manager</strong> that was originally classified as denial-of-service.</li><li>The reclassification from DoS to RCE based on new March 2026 intelligence means organizations that deprioritized the original advisory now face significantly higher risk than initially assessed.</li><li>Verify all BIG-IP APM instances are patched immediately, review network logs for anomalous traffic to virtual servers with APM policies, and treat this as a priority-one patch cycle.</li></ul><h3 id="european-commission-investigating-breach-after-hackers-access-aws-cloud-infrastructure"><a href="https://www.bleepingcomputer.com/news/security/european-commission-investigating-breach-after-amazon-cloud-hack/?ref=mandos.io" rel="noopener">European Commission Investigating Breach After Hackers Access AWS Cloud Infrastructure</a></h3><ul><li>The <strong>European Commission</strong> confirmed on March 27 that threat actors infiltrated its networks and accessed its <strong>AWS</strong> cloud infrastructure, with some data confirmed stolen during the breach.</li><li>The incident raises questions about sovereign cloud strategies and third-party cloud dependency across EU institutions, especially as Europe pushes to reduce reliance on US tech infrastructure.</li><li>Review cloud provider access controls and logging configurations, ensure incident response plans cover cloud-native breach scenarios, and monitor for follow-up campaigns targeting exposed data.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Leadership-Insights.png" style="background-image: url(https://mandos.io/content/images/2024/09/Leadership-Insights.png)"><h2 class="kg-header-card-header" id="ciso-lens"><span style="white-space: pre-wrap;">CISO Lens</span></h2></div><h3 id="only-35000-cisos-serve-359-million-businesses-2026-report-reveals-10000-to-1-leadership-gap"><a href="https://www.sophos.com/en-us/blog/2026-ciso-report?ref=mandos.io" rel="noopener">Only 35,000 CISOs Serve 359 Million Businesses: 2026 Report Reveals 10,000-to-1 Leadership Gap</a></h3><ul><li>The <strong>2026 CISO Report</strong> from <strong>Cybersecurity Ventures</strong> and <strong>Sophos</strong> found just 35,000 CISOs worldwide serving an estimated 359 million businesses, a 10,000-to-1 ratio that creates a massive security leadership vacuum, especially for SMBs.</li><li>The <strong>World Economic Forum</strong> estimates 90% of companies globally are small businesses, yet close to zero percent employ a dedicated security officer, leaving them exposed to enterprise-grade threats without executive-level risk guidance.</li><li>Fractional CISO models and AI-augmented security leadership platforms represent the most scalable near-term solutions, but human bandwidth constraints remain the bottleneck for serving hundreds of millions of organizations.</li></ul><h3 id="how-cisos-can-survive-geopolitical-cyberattacks-lessons-from-the-stryker-handala-incident"><a href="https://www.prsol.cc/2026/03/26/how-cisos-can-survive-the-era-of-geopolitical-cyberattacks/?ref=mandos.io" rel="noopener">How CISOs Can Survive Geopolitical Cyberattacks: Lessons from the Stryker-Handala Incident</a></h3><ul><li>The Iran-linked group <strong>Handala</strong> attacked <strong>Stryker</strong>, a Fortune 500 medical device manufacturer, in March 2026, reportedly wiping tens of thousands of devices across 79 countries and disrupting manufacturing, logistics, and order processing.</li><li>Threat intelligence research shows many Iranian destructive campaigns rely on manual operations rather than advanced malware, meaning defenders who understand these operational patterns can limit damage even after perimeter breach.</li><li>Build incident response playbooks specifically for destructive wiper scenarios, segment critical OT networks from IT infrastructure, and incorporate geopolitical threat briefings into quarterly security strategy reviews.</li></ul><h3 id="state-of-ai-cybersecurity-2026-92-of-security-pros-concerned-about-ai-agent-impact"><a href="https://cimetrics.com/march-2026-cybersecurity-news/?ref=mandos.io" rel="noopener">State of AI Cybersecurity 2026: 92% of Security Pros Concerned About AI Agent Impact</a></h3><ul><li>The <strong>State of AI Cybersecurity 2026</strong> report found that 92% of security professionals are concerned about the impact of AI agents on their organization's security posture as embedded AI features go mainstream.</li><li>Security teams are struggling to adapt governance frameworks, tooling, and talent to the speed of enterprise AI adoption, creating a gap between deployment velocity and security readiness.</li><li>Establish an AI asset inventory across the organization, define acceptable use policies for AI agents before deployment scales further, and allocate dedicated budget for AI-specific security controls.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/AI---Security.png" style="background-image: url(https://mandos.io/content/images/2024/09/AI---Security.png)"><h2 class="kg-header-card-header" id="ai-amp-security"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2></div><h3 id="langchain-and-langgraph-flaws-expose-files-secrets-and-databases-in-popular-ai-frameworks"><a href="https://thehackernews.com/2026/03/langchain-langgraph-flaws-expose-files.html?ref=mandos.io" rel="noopener">LangChain and LangGraph Flaws Expose Files, Secrets, and Databases in Popular AI Frameworks</a></h3><ul><li>Researchers disclosed three security vulnerabilities in <strong>LangChain</strong> and <strong>LangGraph</strong>, widely used open-source frameworks for building LLM-powered applications, that could expose filesystem data, environment secrets, and conversation history.</li><li>As organizations rush to build AI agents and LLM-powered workflows, the security of the underlying frameworks becomes a critical attack surface that most teams are not yet auditing.</li><li>Audit all LLM framework dependencies for known CVEs, restrict filesystem and environment variable access for AI agent processes, and implement network segmentation for AI workloads.</li></ul><h3 id="shadowprompt-vulnerability-in-claude-chrome-extension-allowed-zero-click-xss-and-token-access"><a href="https://www.hendryadrian.com/cybersecurity-news-daily-recap-27-mar-2026/?ref=mandos.io" rel="noopener">ShadowPrompt Vulnerability in Claude Chrome Extension Allowed Zero-Click XSS and Token Access</a></h3><ul><li>A critical vulnerability dubbed <strong>ShadowPrompt</strong> in <strong>Anthropic's Claude</strong> Chrome extension allowed zero-click XSS prompt injection and token access, which has since been patched by Anthropic and <strong>Arkose Labs</strong>.</li><li>Browser-based AI extensions with deep system access represent a growing attack surface that security teams rarely include in their threat models, despite handling sensitive prompts and authentication tokens.</li><li>Inventory all AI-related browser extensions across the organization, enforce extension allowlisting policies, and monitor for unauthorized AI tool installations in endpoint management platforms.</li></ul><h3 id="github-adds-ai-powered-bug-detection-to-expand-code-security-coverage-beyond-codeql"><a href="https://www.bleepingcomputer.com/news/security/github-adds-ai-powered-bug-detection-to-expand-security-coverage/?ref=mandos.io" rel="noopener">GitHub Adds AI-Powered Bug Detection to Expand Code Security Coverage Beyond CodeQL</a></h3><ul><li><strong>GitHub</strong> announced AI-based scanning for its Code Security tool on March 25, expanding vulnerability detection beyond <strong>CodeQL</strong> static analysis to cover more languages and frameworks.</li><li>The move signals that AI-assisted code review is becoming table stakes for DevSecOps, reducing the gap between code commit and vulnerability discovery for development teams using GitHub.</li><li>Enable the new AI scanning capabilities alongside existing CodeQL workflows, review initial findings for false positive rates before tuning alerting thresholds, and use the expanded coverage to address language gaps in current SAST tooling.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Market-Analysis.png" style="background-image: url(https://mandos.io/content/images/2024/09/Market-Analysis.png)"><h2 class="kg-header-card-header" id="market-intelligence"><span style="white-space: pre-wrap;">Market Intelligence</span></h2></div><h3 id="databricks-enters-cybersecurity-market-with-lakewatch-an-agentic-siem-ahead-of-expected-ipo"><a href="https://www.cnbc.com/2026/03/24/databricks-cybersecurity-lakewatch-ipo.html?ref=mandos.io" rel="noopener">Databricks Enters Cybersecurity Market with Lakewatch, an Agentic SIEM, Ahead of Expected IPO</a></h3><ul><li><strong>Databricks</strong> launched <strong>Lakewatch</strong> on March 24, an open, agentic SIEM that unifies security, IT, and business data in a single governed environment, directly challenging incumbents like <strong>Splunk</strong>, <strong>Palo Alto Networks</strong>, and <strong>Microsoft</strong> Sentinel.</li><li>The $134 billion-valued company is using a consumption-based pricing model that charges for work performed rather than data stored, attacking the biggest pain point in traditional SIEM economics where costs scale with log volume.</li><li>Security teams evaluating SIEM alternatives should add Lakewatch to shortlists for 2026 renewals, particularly if already running Databricks for data and analytics workloads.</li></ul><h3 id="eclypsium-raises-25m-to-expand-device-supply-chain-security-for-ai-infrastructure"><a href="https://www.securityweek.com/eclypsium-raises-25-million-for-device-supply-chain-security/?ref=mandos.io" rel="noopener">Eclypsium Raises $25M to Expand Device Supply Chain Security for AI Infrastructure</a></h3><ul><li><strong>Eclypsium</strong> raised $25 million in strategic funding led by <strong>PEAK6 Strategic Capital</strong>, bringing total capital to over $100 million, to expand firmware and hardware supply chain security across enterprise and government environments.</li><li>The company is expanding platform coverage to <strong>NVIDIA GPU servers</strong> in AI data centers and network edge appliances, addressing the growing attack surface created by AI infrastructure buildouts where traditional endpoint agents are blind.</li><li>Organizations deploying AI compute infrastructure should evaluate firmware and hardware integrity monitoring as part of their supply chain security strategy, especially for GPU clusters and edge devices.</li></ul><h3 id="onit-security-raises-11m-seed-to-automate-exposure-management-lifecycle"><a href="https://www.thesaasnews.com/news/onit-security-raises-11m-in-seed-funding?ref=mandos.io" rel="noopener">Onit Security Raises $11M Seed to Automate Exposure Management Lifecycle</a></h3><ul><li>Tel Aviv-based <strong>Onit Security</strong> raised $11 million in seed funding led by <strong>Hetz Ventures</strong> and <strong>Brightmind Partners</strong> for its agentic exposure management platform that automates the full lifecycle from vulnerability detection to remediation execution.</li><li>The company claims the founding was partly motivated by bottlenecks exploited during an Iranian state-sponsored cyberattack, targeting the gap between when vulnerabilities are found and when they are actually fixed.</li><li>The seed raise reflects investor confidence in the exposure management category, and security teams dealing with remediation backlogs should watch this space as AI-driven prioritization tools mature.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/TOOLS.png" style="background-image: url(https://mandos.io/content/images/2024/09/TOOLS.png)"><h2 class="kg-header-card-header" id="security-stack"><span style="white-space: pre-wrap;">Security Stack</span></h2></div><h3 id="eclypsium-supply-chain-security-platform"><a href="https://cybersectools.com/tools/eclypsium-supply-chain-security-platform?ref=mandos.io">Eclypsium Supply Chain Security Platform</a></h3><p>Firmware, hardware, and software supply chain security for enterprise devices. Covers inventory, hardening, threat detection, and response across the full device lifecycle. Relevant this week as the company raised $25M to expand into AI infrastructure security.</p><h3 id="legit-security-software-supply-chain-security"><a href="https://cybersectools.com/tools/legit-security-software-supply-chain-security?ref=mandos.io">Legit Security Software Supply Chain Security</a></h3><p>Secures the software development pipeline from code to deployment, covering CI/CD security, secret detection, and software supply chain risk. Directly relevant following TeamPCP's ongoing campaign targeting developer tools like Trivy, KICS, litellm, and Telnyx.</p><h3 id="prevalent-exposure-management"><a href="https://cybersectools.com/tools/prevalent-exposure-management?ref=mandos.io">Prevalent Exposure Management</a></h3><p>Cloud-based exposure management platform that prioritizes vulnerabilities based on business context. Connects to this week's Onit Security seed raise and the broader shift toward automated remediation workflows. </p><hr><p>Thank you for reading this week's brief.</p><p>Whenever you're ready, there are three ways I can help you:</p><ul><li>Get your cybersecurity product in front of 15,000 cybersecurity professionals on CybersecTools. <a href="https://cybersectools.com/submit?ref=mandos.io" rel="noopener">Submit Your Product</a></li><li>Position your product to sell to CISOs correctly. <a href="https://cybersectools.com/ciso-lens?ref=mandos.io" rel="noopener">CISO Lens</a></li><li>Analyze entire cyebrsceurity market with AI. <a href="https://cybersectools.com/mcp-access?ref=mandos.io" rel="noreferrer">Access CybersecTools MCP server</a></li></ul><p>Talk to you in the next one.</p><p>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #147: Trivy CanisterWorm, Stryker Wiper Attack, XBOW Hits $1B ]]></title>
        <description><![CDATA[ Happy Sunday!

In this week&#39;s brief:

 * Trivy CanisterWorm Supply Chain Attack: A self-spreading worm infected 47 npm packages using blockchain-based C2, harvesting developer tokens to automatically compromise entire package ecosystems. Time to audit those postinstall hooks.
 * Stryker Wiper Attack: Iran-linked Handala group destroyed thousands of devices across 79 ]]></description>
        <link>https://mandos.io/newsletter/brief-147-trivy-canisterworm-stryker-wiper-attack-xbow-hits-1b/</link>
        <guid isPermaLink="false">69be7287ef7f23a4d99928ed</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 22 Mar 2026 17:00:25 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/03/12-1.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>Trivy CanisterWorm Supply Chain Attack:</strong> A self-spreading worm infected 47 npm packages using blockchain-based C2, harvesting developer tokens to automatically compromise entire package ecosystems. Time to audit those postinstall hooks.</li><li><strong>Stryker Wiper Attack:</strong> Iran-linked Handala group destroyed thousands of devices across 79 country offices, exfiltrating 50TB before detonation. When geopolitics meets inadequate segmentation, the result is total environment destruction.</li><li><strong>XBOW Reaches Unicorn Status:</strong> The autonomous hacker that hit #1 on HackerOne raised $120M at $1B+ valuation, backed by the creator of GitHub Copilot. Manual-only pentesting firms should be paying attention.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Industry-News-1.png" style="background-image: url(https://mandos.io/content/images/2024/09/Industry-News-1.png)"><h2 class="kg-header-card-header" id="threats"><span style="white-space: pre-wrap;">Threats</span></h2></div><h3 id="trivy-supply-chain-attack-triggers-self-spreading-canisterworm-across-47-npm-packages"><a href="https://thehackernews.com/2026/03/trivy-supply-chain-attack-triggers-self.html?ref=mandos.io" rel="noopener">Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages</a></h3><ul><li>Threat actors exploited the <strong>Trivy</strong> security scanner supply chain compromise to deploy <strong>CanisterWorm</strong>, a self-propagating malware that infected <strong>47 npm packages</strong> across multiple scopes, using Internet Computer blockchain canisters as command-and-control dead drop resolvers.</li><li>The worm harvests <strong>npm tokens</strong> from developer machines and automatically publishes malicious versions of packages via a self-spreading "deploy.js" script, meaning a single infected developer can compromise their entire organization's package ecosystem.</li><li>Audit npm dependencies for unexpected postinstall hooks, rotate all npm tokens that may have been exposed, and monitor for systemd services masquerading as PostgreSQL tooling ("pgmon").</li></ul><h3 id="critical-98-cvss-flaw-exposes-oracle-identity-manager-to-full-remote-takeover"><a href="https://www.darkreading.com/vulnerabilities-threats/patch-oracle-fusion-middleware-rce-flaw?ref=mandos.io" rel="noopener">Critical 9.8 CVSS Flaw Exposes Oracle Identity Manager to Full Remote Takeover</a></h3><ul><li><strong>Oracle</strong> issued an emergency security alert for <strong>CVE-2026-21992</strong>, a CVSS 9.8 unauthenticated remote code execution flaw in <strong>Oracle Identity Manager</strong> and <strong>Web Services Manager</strong> (versions 12.2.1.4.0 and 14.1.2.1.0) that allows complete system takeover via HTTP with no credentials required.</li><li>Because Oracle Identity Manager controls user provisioning, role assignments, and access governance across the enterprise, a compromised instance gives attackers the ability to create admin accounts, modify access policies, and pivot into every connected system.</li><li>Apply Oracle's emergency patches immediately, prioritize any internet-facing Identity Manager deployments, and audit identity infrastructure logs for unauthorized administrative actions or unusual REST API calls.</li></ul><h3 id="iran-linked-handala-group-wipes-thousands-of-stryker-devices-79-country-offices-offline-for-over-a-week"><a href="https://techcrunch.com/2026/03/17/stryker-says-its-restoring-systems-after-pro-iran-hackers-wiped-thousands-of-employee-devices/?ref=mandos.io" rel="noopener">Iran-Linked Handala Group Wipes Thousands of Stryker Devices, 79 Country Offices Offline for Over a Week</a></h3><ul><li>Pro-Iranian hacktivist collective <strong>Handala</strong> launched a destructive <strong>wiper attack</strong> against medical device giant <strong>Stryker</strong>, taking down the company's global Microsoft environment, forcing <strong>79 country offices</strong> offline, halting production lines, and leaving thousands of employees unable to work for over a week.</li><li>Unlike ransomware, wiper attacks destroy data with no option for recovery or negotiation, and Handala claims to have exfiltrated roughly <strong>50 terabytes</strong> of corporate data before detonating the wiper, making this one of the largest geopolitically motivated attacks against a U.S. healthcare company.</li><li>Organizations in sectors likely to face geopolitical targeting should validate offline backup integrity, segment critical manufacturing systems from corporate IT infrastructure, and pressure-test incident response plans that assume complete environment destruction rather than partial compromise.</li></ul><!--members-only--><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Leadership-Insights.png" style="background-image: url(https://mandos.io/content/images/2024/09/Leadership-Insights.png)"><h2 class="kg-header-card-header" id="ciso-lens"><span style="white-space: pre-wrap;">CISO Lens</span></h2></div><h3 id="pentera-study-67-of-cisos-have-limited-ai-visibility-only-11-deploy-ai-specific-security-tools"><a href="https://thehackernews.com/2026/03/ai-is-everywhere-but-cisos-are-still.html?ref=mandos.io" rel="noopener">Pentera Study: 67% of CISOs Have Limited AI Visibility, Only 11% Deploy AI-Specific Security Tools</a></h3><ul><li><strong>Pentera's</strong> 2026 AI and Adversarial Testing Benchmark surveyed <strong>300 U.S. CISOs</strong> and found that <strong>67%</strong> have limited visibility into AI usage across their organization, with zero respondents reporting full visibility, while <strong>75%</strong> still rely on legacy security controls not designed for AI environments.</li><li>The core problem is not awareness or budget; <strong>50%</strong> cited lack of internal expertise as the top obstacle, and only <strong>11%</strong> have deployed AI-specific security tools, meaning most organizations are flying blind on AI risk even as deployment accelerates across every business unit.</li><li>Start with a centralized AI inventory that maps every AI system, its data access, and its behavior patterns before investing in new tooling, since you cannot secure what you cannot see.</li></ul><h3 id="russia-linked-hacktivists-shift-from-ddos-to-credential-based-ot-intrusions-ics-attacks-nearly-double"><a href="https://cyble.com/blog/russia-credential-based-intrusions-cisos/?ref=mandos.io" rel="noopener">Russia-Linked Hacktivists Shift From DDoS to Credential-Based OT Intrusions, ICS Attacks Nearly Double</a></h3><ul><li><strong>Cyble</strong> research shows Russian-linked hacktivist groups like <strong>Cyber Army of Russia Reborn</strong>, <strong>Z-Pentest</strong>, and <strong>Sector16</strong> have shifted from disruption-focused DDoS campaigns to credential-based intrusions targeting industrial control systems, with ICS-related attacks comprising <strong>25%</strong> of all hacktivist operations, nearly doubling from the previous quarter.</li><li>The techniques are disturbingly simple: password spraying, default credential exploitation, and reuse of leaked credentials from unrelated breaches to access exposed <strong>VNC services</strong> on ports 5900-5910, meaning sophisticated zero-days are not required to compromise critical infrastructure.</li><li>Eliminate any VNC or remote access services exposed to the public internet, enforce strong authentication on all OT operator accounts, and segment IT/OT networks so that a compromised corporate credential cannot provide a path into industrial control environments.</li></ul><h3 id="uks-15b-pound-jaguar-land-rover-cyber-bailout-sparks-debate-on-government-as-insurer-of-last-resort"><a href="https://www.cio.com/article/4148261/are-nations-ready-to-be-the-cybersecurity-insurers-of-last-resort.html?ref=mandos.io" rel="noopener">UK's 1.5B Pound Jaguar Land Rover Cyber Bailout Sparks Debate on Government as Insurer of Last Resort</a></h3><ul><li>The UK government issued a <strong>1.5 billion pound</strong> loan guarantee to <strong>Jaguar Land Rover</strong> after a major cyberattack, prompting <strong>Ciaran Martin</strong>, former NCSC CEO and chair of the UK Cyber Monitoring Center, to warn this sets a dangerous precedent without clear criteria for when governments should intervene.</li><li>Security experts argue that government bailouts create a "too important to fail" dynamic that could actually increase targeting by threat actors, while enabling underinvestment in security by organizations that assume the state will absorb catastrophic cyber losses.</li><li>Security leaders should use this precedent to strengthen their board-level risk conversations: if your organization's cyber posture is weak enough to require a government bailout, the real failure happened long before the breach, and compulsory cyber insurance with minimum security standards may become the regulatory response.</li></ul><hr>
<!--kg-card-begin: html-->
<style>
  .mfb-card * { margin: 0; padding: 0; box-sizing: border-box; }
  .mfb-card { font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', sans-serif; width: 100%; max-width: 480px; background: linear-gradient(135deg, #0a2e1a 0%, #0c3d22 50%, #0a2e1a 100%); border: 1px solid rgba(20, 184, 112, 0.25); border-radius: 12px; padding: 28px 24px; text-align: center; margin: 24px auto; color: #e4e4e7; }
  .mfb-title { font-size: 15px; font-weight: 500; color: #b0e8cf; margin-bottom: 16px; letter-spacing: 0.01em; }
  .mfb-stars { display: flex; justify-content: center; gap: 8px; margin-bottom: 6px; }
  .mfb-star { background: rgba(0, 0, 0, 0.3); border: 2px solid rgba(20, 184, 112, 0.3); border-radius: 10px; width: 52px; height: 52px; cursor: pointer; display: flex; align-items: center; justify-content: center; font-size: 18px; font-weight: 600; color: rgba(20, 184, 112, 0.6); transition: all 0.2s ease; font-family: inherit; }
  .mfb-star:hover { border-color: #14b870; background: rgba(20, 184, 112, 0.15); transform: translateY(-2px); color: #14b870; }
  .mfb-star.selected { border-color: #14b870; background: rgba(20, 184, 112, 0.2); color: #fff; box-shadow: 0 0 12px rgba(20, 184, 112, 0.3); }
  .mfb-labels { display: flex; justify-content: space-between; padding: 0 4px; }
  .mfb-labels span { font-size: 11px; color: rgba(20, 184, 112, 0.5); }
  .mfb-comment { max-height: 0; overflow: hidden; opacity: 0; transition: max-height 0.4s ease, opacity 0.3s ease, margin 0.3s ease; margin-top: 0; }
  .mfb-comment.visible { max-height: 200px; opacity: 1; margin-top: 20px; }
  .mfb-textarea { width: 100%; background: rgba(0, 0, 0, 0.4); border: 1px solid rgba(20, 184, 112, 0.25); border-radius: 8px; padding: 12px 14px; color: #e4e4e7; font-family: inherit; font-size: 14px; resize: none; height: 64px; outline: none; transition: border-color 0.2s; }
  .mfb-textarea::placeholder { color: rgba(176, 232, 207, 0.4); }
  .mfb-textarea:focus { border-color: #14b870; }
  .mfb-btn { margin-top: 10px; width: 100%; background: #14b870; color: #0a2e1a; border: none; border-radius: 8px; padding: 10px 0; font-family: inherit; font-size: 14px; font-weight: 600; cursor: pointer; transition: background 0.2s, transform 0.1s; }
  .mfb-btn:hover { background: #17d483; }
  .mfb-btn:active { transform: scale(0.98); }
  .mfb-btn:disabled { background: rgba(20, 184, 112, 0.3); color: rgba(10, 46, 26, 0.6); cursor: not-allowed; }
  .mfb-thanks { display: none; padding: 20px 0 4px; text-align: center; }
  .mfb-check { width: 40px; height: 40px; background: rgba(20, 184, 112, 0.2); border-radius: 50%; display: inline-flex; align-items: center; justify-content: center; margin-bottom: 12px; }
  .mfb-check svg { width: 20px; height: 20px; stroke: #14b870; fill: none; stroke-width: 2.5; stroke-linecap: round; stroke-linejoin: round; }
  .mfb-thanks h3 { font-size: 16px; font-weight: 600; color: #e4e4e7; margin-bottom: 4px; }
  .mfb-thanks p { font-size: 13px; color: #b0e8cf; }
  .mfb-error { font-size: 12px; color: #ef4444; margin-top: 8px; display: none; }
  .mfb-spinner { display: none; width: 16px; height: 16px; border: 2px solid transparent; border-top-color: #0a2e1a; border-radius: 50%; animation: mfbSpin 0.6s linear infinite; margin: 0 auto; }
  @keyframes mfbSpin { to { transform: rotate(360deg); } }
</style>
<div class="mfb-card">
  <div id="mfbStep">
    <div class="mfb-title">How was this week's brief?</div>
    <div class="mfb-stars">
      <button class="mfb-star" data-r="1">1</button>
      <button class="mfb-star" data-r="2">2</button>
      <button class="mfb-star" data-r="3">3</button>
      <button class="mfb-star" data-r="4">4</button>
      <button class="mfb-star" data-r="5">5</button>
    </div>
    <div class="mfb-labels"><span>Not useful</span><span>Very useful</span></div>
    <div class="mfb-comment" id="mfbComment">
      <textarea class="mfb-textarea" id="mfbText" placeholder="Any thoughts? (optional)" maxlength="500"></textarea>
      <button class="mfb-btn" id="mfbBtn" onclick="mfbSubmit()">
        <span id="mfbBtnT">Send feedback</span>
        <div class="mfb-spinner" id="mfbSpin"></div>
      </button>
      <div class="mfb-error" id="mfbErr">Something went wrong. Try again.</div>
    </div>
  </div>
  <div class="mfb-thanks" id="mfbThanks">
    <div class="mfb-check"><svg viewBox="0 0 24 24"><polyline points="20 6 9 17 4 12"/></svg></div>
    <h3>Thanks for the feedback</h3>
    <p>It helps shape next week's brief.</p>
  </div>
</div>
<script>
(function(){
  var WEBHOOK='https://builder.mandos.io/webhook/a1a78ac7-9ff1-4aa7-8bd2-3cb8294134df';
  var APIKEY='w3pA6KvoyNgG67VBLwkdAUNpPWkuJ8CmeyETLW3KacKXFcshVMZbMWd3iohxx9m3';
  var TITLE='Mandos Brief';
  try{var pageTitle=document.title||'';var match=pageTitle.match(/Brief\s*#\d+/i);if(match){TITLE=match[0];}else{var h1=document.querySelector('.gh-article-title, .post-full-title, h1');if(h1){var h1match=h1.textContent.match(/Brief\s*#\d+/i);if(h1match)TITLE=h1match[0];}}}catch(e){}
  var rating=null,entryId=null;
  document.querySelectorAll('.mfb-star').forEach(function(btn){btn.addEventListener('click',function(){rating=parseInt(this.dataset.r);document.querySelectorAll('.mfb-star').forEach(function(b){b.classList.remove('selected');});this.classList.add('selected');document.getElementById('mfbComment').classList.add('visible');fetch(WEBHOOK,{method:'POST',headers:{'Content-Type':'application/json','Authorization':APIKEY},body:JSON.stringify({pageTitle:TITLE,rating:rating,comment:'',timestamp:new Date().toISOString()})}).then(function(r){return r.json();}).then(function(d){if(d.id)entryId=d.id;}).catch(function(){});});});
  window.mfbSubmit=function(){var comment=document.getElementById('mfbText').value.trim();var btn=document.getElementById('mfbBtn');var btnT=document.getElementById('mfbBtnT');var spin=document.getElementById('mfbSpin');var err=document.getElementById('mfbErr');btn.disabled=true;btnT.style.display='none';spin.style.display='block';err.style.display='none';var payload={pageTitle:TITLE,rating:rating,comment:comment,timestamp:new Date().toISOString()};if(entryId)payload.id=entryId;fetch(WEBHOOK,{method:'POST',headers:{'Content-Type':'application/json','Authorization':APIKEY},body:JSON.stringify(payload)}).then(function(r){if(r.ok){document.getElementById('mfbStep').style.display='none';document.getElementById('mfbThanks').style.display='block';}else throw new Error();}).catch(function(){err.style.display='block';btn.disabled=false;btnT.style.display='inline';spin.style.display='none';});};
})();
</script>
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/AI---Security.png" style="background-image: url(https://mandos.io/content/images/2024/09/AI---Security.png)"><h2 class="kg-header-card-header" id="ai-amp-security"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2></div><h3 id="qualys-warns-mcp-servers-are-the-new-shadow-it-53-run-on-static-secrets-with-zero-visibility"><a href="https://blog.qualys.com/product-tech/2026/03/19/mcp-servers-shadow-it-ai-qualys-totalai-2026?ref=mandos.io" rel="noopener">Qualys Warns: MCP Servers Are the New Shadow IT, 53% Run on Static Secrets With Zero Visibility</a></h3><ul><li><strong>Qualys</strong> published research arguing that <strong>MCP servers</strong> have become a new shadow IT layer, with over <strong>10,000 active public servers</strong> deployed in under a year and most organizations having zero visibility into where they run, what enterprise data they expose, or how AI agents can abuse them.</li><li>Unlike traditional APIs, MCP servers sit at the intersection of natural-language reasoning and privileged execution, where capabilities are discovered dynamically and invoked autonomously by AI agents; <strong>53%</strong> of servers rely on static secrets, creating widespread credential exposure across environments.</li><li>Treat MCP servers as AI-driven control planes, not standard API layers: inventory all deployments across network and host levels, separate discovery privileges from invocation capabilities, and log all tool invocations with anomaly monitoring.</li></ul><h3 id="ai-agent-hacks-mckinseys-lilli-chatbot-in-under-2-hours-exposes-465-million-chat-messages"><a href="https://outpost24.com/blog/ai-agent-hacked-mckinsey-ai-platform/?ref=mandos.io" rel="noopener">AI Agent Hacks McKinsey's Lilli Chatbot in Under 2 Hours, Exposes 46.5 Million Chat Messages</a></h3><ul><li><strong>CodeWall's</strong> autonomous AI security agent breached <strong>McKinsey's</strong> internal AI chatbot <strong>Lilli</strong> in under two hours by discovering publicly accessible API documentation with over <strong>200 endpoints</strong>, 22 of which had no authentication, then executing a SQL injection to gain full system access.</li><li>The exposed data included <strong>46.5 million chat messages</strong> containing strategy discussions and client data, <strong>728,000 files</strong>, <strong>57,000 user accounts</strong>, and <strong>384,000 AI assistant configurations</strong>, from a platform used by over <strong>70%</strong> of McKinsey's 23,000+ workforce processing 500,000+ monthly prompts.</li><li>Every organization deploying internal AI chatbots should audit API endpoint exposure, ensure no documentation is publicly accessible, and apply the same authentication and authorization controls to AI platforms that they would to any system handling their most sensitive data.</li></ul><h3 id="scan-of-1808-mcp-servers-finds-66-have-security-flaws-843-contain-toxic-data-flow-chains"><a href="https://agentseal.org/blog/mcp-server-security-findings?ref=mandos.io" rel="noopener">Scan of 1,808 MCP Servers Finds 66% Have Security Flaws, 843 Contain Toxic Data Flow Chains</a></h3><ul><li><strong>AgentSeal</strong> scanned <strong>1,808 MCP servers</strong> across GitHub, npm, and PyPI and found that <strong>66%</strong> had at least one security finding, with <strong>427 critical</strong> and <strong>1,841 high severity</strong> issues identified across <strong>16,840 tools</strong> analyzed.</li><li>The most alarming category is <strong>toxic data flows</strong> (37.2% of critical/high findings), where individually safe servers create dangerous attack chains when combined; for example, a server that reads Slack messages piped to a server that writes files creates a data exfiltration path even when neither server is malicious on its own.</li><li>Before connecting MCP servers to AI agents in production, map the full capability graph of tool inputs and outputs across all connected servers to identify toxic combinations that create unintended data movement paths.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Market-Analysis.png" style="background-image: url(https://mandos.io/content/images/2024/09/Market-Analysis.png)"><h2 class="kg-header-card-header" id="market-intelligence"><span style="white-space: pre-wrap;">Market Intelligence</span></h2></div><h3 id="aws-security-veterans-launch-native-with-42m-to-build-cloud-security-control-plane"><a href="https://www.geekwire.com/2026/cybersecurity-startup-native-led-by-aws-vets-with-roots-in-seattle-comes-out-of-stealth-with-42m/?ref=mandos.io" rel="noopener">AWS Security Veterans Launch Native With $42M to Build Cloud Security Control Plane</a></h3><ul><li><strong>Native</strong> emerged from stealth with <strong>$42 million</strong> in funding led by <strong>Ballistic Ventures</strong> with participation from <strong>General Catalyst</strong> and <strong>YL Ventures</strong>, founded by the team that built <strong>Amazon GuardDuty</strong> and <strong>AWS Security Hub</strong>, with former <strong>Google Cloud</strong> CISO <strong>Phil Venables</strong> joining the board.</li><li>Instead of layering on more monitoring tools, Native translates security policies into provider-specific controls enforced through native mechanisms already built into <strong>AWS</strong>, <strong>Azure</strong>, <strong>Google Cloud</strong>, and <strong>Oracle Cloud</strong>, addressing the gap between security intent and actual enforcement across multi-cloud environments.</li><li>The founding team's pedigree signals that the next wave of cloud security will focus on policy enforcement through existing cloud primitives rather than adding more detection layers on top.</li></ul><h3 id="xbow-hits-unicorn-status-with-120m-series-c-for-autonomous-offensive-security"><a href="https://xbow.com/news/xbow-raises-120m-to-scale?ref=mandos.io" rel="noopener">XBOW Hits Unicorn Status With $120M Series C for Autonomous Offensive Security</a></h3><ul><li><strong>XBOW</strong> raised <strong>$120 million</strong> in Series C funding led by <strong>DFJ Growth</strong> and <strong>Northzone</strong>, pushing its valuation past <strong>$1 billion</strong> and bringing total funding to over <strong>$235 million</strong>, with backing from <strong>Sequoia Capital</strong>, <strong>Altimeter</strong>, and <strong>Alkeon Capital</strong>.</li><li>Founded by <strong>Oege de Moor</strong>, creator of <strong>GitHub Copilot</strong> and <strong>GitHub Advanced Security</strong>, XBOW became the first autonomous system to hit <strong>#1 on the HackerOne leaderboard</strong>, proving its AI can find and exploit vulnerabilities faster than top human researchers, with over <strong>100 companies</strong> including <strong>Moderna</strong> and <strong>Samsung</strong> already using the platform.</li><li>The autonomous pentesting category is now officially validated at unicorn scale, signaling that AI-driven offensive security is moving from research novelty to enterprise standard, and manual-only penetration testing firms face existential pressure to adapt.</li></ul><h3 id="oasis-security-raises-120m-series-b-for-agentic-access-management-arr-grows-5x"><a href="https://siliconangle.com/2026/03/19/oasis-security-raises-120m-secure-non-human-identities-across-ai-cloud-environments/?ref=mandos.io" rel="noopener">Oasis Security Raises $120M Series B for Agentic Access Management, ARR Grows 5x</a></h3><ul><li><strong>Oasis Security</strong> closed a <strong>$120 million</strong> Series B led by <strong>Craft Ventures</strong> with participation from <strong>Sequoia Capital</strong>, <strong>Accel</strong>, and <strong>Cyberstarts</strong>, bringing total funding to <strong>$195 million</strong> as the company positions itself as the first platform purpose-built for <strong>Agentic Access Management</strong>.</li><li>New ARR grew <strong>5x year over year</strong> with the majority of clients coming from the <strong>Fortune 500</strong>, validating that managing nonhuman identities and AI agent access is becoming a board-level priority as enterprises scale agentic deployments across their infrastructure.</li><li>The size of this round confirms that identity and access management for AI agents is emerging as a standalone category, distinct from traditional IAM, and security teams deploying agentic systems need dedicated controls for how agents authenticate, authorize, and interact with enterprise resources.</li></ul><hr><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/TOOLS.png" style="background-image: url(https://mandos.io/content/images/2024/09/TOOLS.png)"><h2 class="kg-header-card-header" id="security-stack"><span style="white-space: pre-wrap;">Security Stack</span></h2></div><p><strong>Socket</strong></p><p>Software supply chain security platform that proactively detects malicious npm, PyPI, and Go packages before they enter your codebase. Directly relevant this week as the CanisterWorm supply chain attack spread through 47 npm packages via compromised postinstall hooks. <a href="https://cybersectools.com/tools/socket?ref=mandos.io" rel="noopener">View on CybersecTools</a></p><p><strong>Claroty xDome Network Protection</strong></p><p>OT/ICS network visibility and protection platform for industrial control systems and critical infrastructure. Relevant this week as Cyble research showed Russian-linked hacktivists are shifting to credential-based intrusions targeting exposed VNC services on industrial systems. <a href="https://cybersectools.com/tools/claroty-xdome-network-protection?ref=mandos.io" rel="noopener">View on CybersecTools</a></p><p><strong>Oasis Agentic Access Management</strong></p><p>Purpose-built identity governance platform for managing nonhuman identities and AI agent access across enterprise environments. Directly tied to this week's AI security theme, with MCP server shadow IT, McKinsey's AI chatbot breach, and Oasis's own $120M raise all highlighting the urgency of controlling what AI agents can access. <a href="https://cybersectools.com/tools/oasis-agentic-access-management?ref=mandos.io" rel="noopener">View on CybersecTools</a></p><hr><p>Thank you for reading this week's brief.</p><p>Whenever you're ready, there are three ways I can help you:</p><ul><li>Get your cybersecurity product in front of 15,000 cybersecurity professionals on CybersecTools. <a href="https://cybersectools.com/submit?ref=mandos.io" rel="noopener">Submit Your Product</a></li><li>Position your product to sell to CISOs correctly. <a href="https://cybersectools.com/ciso-lens?ref=mandos.io" rel="noopener">CISO Lens</a></li><li>Get deep market intelligence on your company, competitors and the whole industry. <a href="https://cybersecradars.com/?ref=mandos.io" rel="noopener">Sign Up for Waitlist</a></li></ul><p>Talk to you in the next one.</p><p>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #146: InstallFix Targets Claude Code Users, CrackArmor Hits 12.6M Linux Servers, Armadin Launches With $190M ]]></title>
        <description><![CDATA[ Happy Thursday!

In this week&#39;s brief:

 * CrackArmor Linux Apocalypse: Nine vulnerabilities in AppArmor, hiding since 2017, let any unprivileged user escalate to root on 12.6 million enterprise Linux servers. Patch now.
 * AI Malware Is Real: IBM X-Force caught ransomware group Hive0163 deploying AI-generated malware in a live ]]></description>
        <link>https://mandos.io/newsletter/brief-146-installfix-targets-claude-code-users-crackarmor-hits-12-6m-linux-servers-armadin-launches-with-190m/</link>
        <guid isPermaLink="false">69b40e7bef7f23a4d9991cfe</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 15 Mar 2026 17:00:54 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/03/11.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Thursday!</p><p>In this week's brief:</p><ul><li><strong>CrackArmor Linux Apocalypse:</strong> Nine vulnerabilities in AppArmor, hiding since 2017, let any unprivileged user escalate to root on 12.6 million enterprise Linux servers. Patch now.</li><li><strong>AI Malware Is Real:</strong> IBM X-Force caught ransomware group Hive0163 deploying AI-generated malware in a live attack, while CrowdStrike reports 82% of detections are now malware-free.</li><li><strong>Google's $32B Wiz Bet:</strong> The largest deal in Google's history closed this week, alongside $500M+ in stealth launches from Armadin, Kai, Jazz, and Bold. The next generation of security infrastructure is being built right now.</li></ul><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Industry-News-1.png" style="background-image: url(https://mandos.io/content/images/2024/09/Industry-News-1.png)"><h2 class="kg-header-card-header" id="threats"><span style="white-space: pre-wrap;">Threats</span></h2></div><h3 id="push-security-finds-cybercriminals-launch-installfix-attacks-against-claude-code-users"><a href="https://hubs.li/Q046sj-Y0?ref=mandos.io">Push Security Finds Cybercriminals Launch InstallFix Attacks Against Claude Code Users</a></h3><ul><li>Threat actors are cloning legitimate CLI tool installation pages and distributing them through <strong>malvertising</strong> on Google Search, targeting users searching for tools like Claude Code with pixel-perfect fake websites containing malicious install commands.</li><li>The attack leverages the widespread developer practice of running "curl to bash" one-liners by presenting victims with familiar-looking installation commands that actually download <strong>Amatera Stealer</strong> malware instead of legitimate software.</li><li>Push Security researchers identified multiple campaigns using this technique across popular developer tools, with attackers abusing legitimate hosting services like Cloudflare Pages and <strong>Squarespace</strong> to host cloned sites and evade <strong>detection</strong>.</li></ul><h3 id="ai-generated-malware-slopoly-signals-new-era-of-low-effort-high-impact-threats"><a href="https://thehackernews.com/?ref=mandos.io">AI-Generated Malware "Slopoly" Signals New Era of Low-Effort, High-Impact Threats</a></h3><ul><li><strong>IBM X-Force</strong> identified a new malware framework called <strong>Slopoly</strong>, suspected to be AI-generated and deployed by financially motivated threat actor <strong>Hive0163</strong> during ransomware post-exploitation to maintain persistent server access for over a week.</li><li>The malware demonstrates how AI tools allow threat actors to develop functional malware frameworks in a fraction of the traditional development time, lowering the barrier to entry for creating custom post-exploitation tooling.</li><li>Security teams should update detection signatures for AI-generated code patterns and ensure post-exploitation monitoring covers persistence mechanisms on servers, not just initial access vectors.</li></ul><h3 id="nine-crackarmor-flaws-in-linux-apparmor-expose-126-million-servers-to-root-takeover"><a href="https://thehackernews.com/2026/03/nine-crackarmor-flaws-in-linux-apparmor.html?ref=mandos.io">Nine CrackArmor Flaws in Linux AppArmor Expose 12.6 Million Servers to Root Takeover</a></h3><ul><li><strong>Qualys TRU</strong> disclosed nine confused deputy vulnerabilities in <strong>AppArmor</strong>, the default mandatory access control module for <strong>Ubuntu</strong>, <strong>Debian</strong>, and <strong>SUSE</strong>, that have existed since 2017 (kernel v4.11) and allow unprivileged users to escalate to root, break container isolation, and trigger kernel panics.</li><li>The flaws let attackers manipulate AppArmor profiles through trusted tools like <strong>Sudo</strong> and <strong>Postfix</strong> without needing admin credentials, meaning any local access foothold on an affected system is enough to compromise the entire host, including <strong>Kubernetes</strong> nodes and cloud instances.</li><li>Apply vendor kernel patches immediately for all AppArmor-enabled distributions, scan infrastructure with <strong>Qualys QID 386714</strong>, and monitor <code>/sys/kernel/security/apparmor/</code> for unauthorized profile modifications that may signal active exploitation.</li></ul><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Leadership-Insights.png" style="background-image: url(https://mandos.io/content/images/2024/09/Leadership-Insights.png)"><h2 class="kg-header-card-header" id="ciso-lens"><span style="white-space: pre-wrap;">CISO Lens</span></h2></div><h3 id="ibm-x-force-2026-public-facing-app-exploitation-up-44-supply-chain-attacks-quadrupled"><a href="https://www.ibm.com/think/x-force/threat-intelligence-index-2026-securing-identities-ai-detection-risk-management?ref=mandos.io">IBM X-Force 2026: Public-Facing App Exploitation Up 44%, Supply Chain Attacks Quadrupled</a></h3><ul><li>The <strong>IBM X-Force Threat Intelligence Index 2026</strong> found that exploitation of public-facing applications surged 44% year-over-year to become the most common initial access vector, driven by expanding vulnerability surfaces and configuration errors in complex application stacks.</li><li>Major supply chain and third-party breaches quadrupled over five years, with attackers systematically targeting the development pipeline and management-plane tools that organizations consistently under-patch relative to production infrastructure.</li><li>The report reinforces that advanced AI-driven protections offer minimal benefit when foundational controls remain weak. Security leaders should prioritize patch cadence for public-facing apps, harden CI/CD pipelines, and treat identity as critical infrastructure with centralized governance.</li></ul><h3 id="crowdstrike-2026-threat-report-29-second-breakout-time-82-of-detections-malware-free"><a href="https://www.crowdstrike.com/en-us/global-threat-report/?ref=mandos.io">CrowdStrike 2026 Threat Report: 29-Second Breakout Time, 82% of Detections Malware-Free</a></h3><ul><li>The <strong>CrowdStrike 2026 Global Threat Report</strong> recorded the fastest eCrime breakout time at just 29 seconds, a 65% acceleration from 2024, while 82% of all detections in 2025 were malware-free as adversaries shift to identity-based and living-off-the-land techniques.</li><li>AI-enabled adversary activity increased 89%, with over 90 organizations having legitimate AI tools exploited to generate malicious commands and exfiltrate sensitive data, and <strong>ChatGPT</strong> mentioned in criminal forums 550% more than any other model.</li><li>Detection strategies built around malware signatures alone are now fundamentally insufficient. Security teams need cross-domain visibility spanning identity, cloud, and endpoint telemetry with automated response capabilities measured in seconds, not minutes.</li></ul><h3 id="wallarm-report-97-of-api-vulnerabilities-exploitable-with-a-single-request-cisos-racing-to-secure-ai-at-scale"><a href="https://securityboulevard.com/2026/03/the-cisos-dilemma-how-to-scale-ai-securely/?ref=mandos.io">Wallarm Report: 97% of API Vulnerabilities Exploitable With a Single Request, CISOs Racing to Secure AI at Scale</a></h3><ul><li><strong>Wallarm's</strong> 2026 API ThreatStats analysis found that <strong>17%</strong> of all 67,058 published vulnerabilities in 2025 were API-related, and <strong>43%</strong> of CISA's Known Exploited Vulnerabilities additions were API-focused, with <strong>97%</strong> of those exploitable through a single well-formed request.</li><li>As every AI application and agent interaction runs through APIs, the rapid deployment of <strong>agentic AI</strong> is massively expanding the API attack surface, and traditional WAFs built for web application era pattern-matching cannot catch the business logic flaws that attackers now target.</li><li>Security teams deploying AI should prioritize API discovery and runtime protection as foundational controls, not afterthoughts, and evaluate platforms that handle both API and AI security without adding more tool sprawl to the stack.</li></ul>
<!--kg-card-begin: html-->
<style>
  .mfb-card * { margin: 0; padding: 0; box-sizing: border-box; }
  .mfb-card {
    font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', sans-serif;
    width: 100%;
    max-width: 480px;
    background: linear-gradient(135deg, #0a2e1a 0%, #0c3d22 50%, #0a2e1a 100%);
    border: 1px solid rgba(20, 184, 112, 0.25);
    border-radius: 12px;
    padding: 28px 24px;
    text-align: center;
    margin: 24px auto;
    color: #e4e4e7;
  }
  .mfb-title {
    font-size: 15px;
    font-weight: 500;
    color: #b0e8cf;
    margin-bottom: 16px;
    letter-spacing: 0.01em;
  }
  .mfb-stars {
    display: flex;
    justify-content: center;
    gap: 8px;
    margin-bottom: 6px;
  }
  .mfb-star {
    background: rgba(0, 0, 0, 0.3);
    border: 2px solid rgba(20, 184, 112, 0.3);
    border-radius: 10px;
    width: 52px;
    height: 52px;
    cursor: pointer;
    display: flex;
    align-items: center;
    justify-content: center;
    font-size: 18px;
    font-weight: 600;
    color: rgba(20, 184, 112, 0.6);
    transition: all 0.2s ease;
    font-family: inherit;
  }
  .mfb-star:hover {
    border-color: #14b870;
    background: rgba(20, 184, 112, 0.15);
    transform: translateY(-2px);
    color: #14b870;
  }
  .mfb-star.selected {
    border-color: #14b870;
    background: rgba(20, 184, 112, 0.2);
    color: #fff;
    box-shadow: 0 0 12px rgba(20, 184, 112, 0.3);
  }
  .mfb-labels {
    display: flex;
    justify-content: space-between;
    padding: 0 4px;
  }
  .mfb-labels span {
    font-size: 11px;
    color: rgba(20, 184, 112, 0.5);
  }
  .mfb-comment {
    max-height: 0;
    overflow: hidden;
    opacity: 0;
    transition: max-height 0.4s ease, opacity 0.3s ease, margin 0.3s ease;
    margin-top: 0;
  }
  .mfb-comment.visible {
    max-height: 200px;
    opacity: 1;
    margin-top: 20px;
  }
  .mfb-textarea {
    width: 100%;
    background: rgba(0, 0, 0, 0.4);
    border: 1px solid rgba(20, 184, 112, 0.25);
    border-radius: 8px;
    padding: 12px 14px;
    color: #e4e4e7;
    font-family: inherit;
    font-size: 14px;
    resize: none;
    height: 64px;
    outline: none;
    transition: border-color 0.2s;
  }
  .mfb-textarea::placeholder { color: rgba(176, 232, 207, 0.4); }
  .mfb-textarea:focus { border-color: #14b870; }
  .mfb-btn {
    margin-top: 10px;
    width: 100%;
    background: #14b870;
    color: #0a2e1a;
    border: none;
    border-radius: 8px;
    padding: 10px 0;
    font-family: inherit;
    font-size: 14px;
    font-weight: 600;
    cursor: pointer;
    transition: background 0.2s, transform 0.1s;
  }
  .mfb-btn:hover { background: #17d483; }
  .mfb-btn:active { transform: scale(0.98); }
  .mfb-btn:disabled { background: rgba(20, 184, 112, 0.3); color: rgba(10, 46, 26, 0.6); cursor: not-allowed; }
  .mfb-thanks {
    display: none;
    padding: 20px 0 4px;
    text-align: center;
  }
  .mfb-check {
    width: 40px;
    height: 40px;
    background: rgba(20, 184, 112, 0.2);
    border-radius: 50%;
    display: inline-flex;
    align-items: center;
    justify-content: center;
    margin-bottom: 12px;
  }
  .mfb-check svg { width: 20px; height: 20px; stroke: #14b870; fill: none; stroke-width: 2.5; stroke-linecap: round; stroke-linejoin: round; }
  .mfb-thanks h3 { font-size: 16px; font-weight: 600; color: #e4e4e7; margin-bottom: 4px; }
  .mfb-thanks p { font-size: 13px; color: #b0e8cf; }
  .mfb-error { font-size: 12px; color: #ef4444; margin-top: 8px; display: none; }
  .mfb-spinner { display: none; width: 16px; height: 16px; border: 2px solid transparent; border-top-color: #0a2e1a; border-radius: 50%; animation: mfbSpin 0.6s linear infinite; margin: 0 auto; }
  @keyframes mfbSpin { to { transform: rotate(360deg); } }
</style>

<div class="mfb-card">
  <div id="mfbStep">
    <div class="mfb-title">How was this week's brief?</div>
    <div class="mfb-stars">
      <button class="mfb-star" data-r="1">1</button>
      <button class="mfb-star" data-r="2">2</button>
      <button class="mfb-star" data-r="3">3</button>
      <button class="mfb-star" data-r="4">4</button>
      <button class="mfb-star" data-r="5">5</button>
    </div>
    <div class="mfb-labels"><span>Not useful</span><span>Very useful</span></div>
    <div class="mfb-comment" id="mfbComment">
      <textarea class="mfb-textarea" id="mfbText" placeholder="Any thoughts? (optional)" maxlength="500"></textarea>
      <button class="mfb-btn" id="mfbBtn" onclick="mfbSubmit()">
        <span id="mfbBtnT">Send feedback</span>
        <div class="mfb-spinner" id="mfbSpin"></div>
      </button>
      <div class="mfb-error" id="mfbErr">Something went wrong. Try again.</div>
    </div>
  </div>
  <div class="mfb-thanks" id="mfbThanks">
    <div class="mfb-check"><svg viewBox="0 0 24 24"><polyline points="20 6 9 17 4 12"/></svg></div>
    <h3>Thanks for the feedback</h3>
    <p>It helps shape next week's brief.</p>
  </div>
</div>

<script>
(function(){
  var WEBHOOK = 'https://builder.mandos.io/webhook/a1a78ac7-9ff1-4aa7-8bd2-3cb8294134df';
  var APIKEY = 'w3pA6KvoyNgG67VBLwkdAUNpPWkuJ8CmeyETLW3KacKXFcshVMZbMWd3iohxx9m3';

  // Auto-detect Brief title from page
  var TITLE = 'Mandos Brief';
  try {
    var pageTitle = document.title || '';
    var match = pageTitle.match(/Brief\s*#\d+/i);
    if (match) { TITLE = match[0]; }
    else {
      var h1 = document.querySelector('.gh-article-title, .post-full-title, h1');
      if (h1) {
        var h1match = h1.textContent.match(/Brief\s*#\d+/i);
        if (h1match) TITLE = h1match[0];
      }
    }
  } catch(e) {}

  var rating = null, entryId = null;

  document.querySelectorAll('.mfb-star').forEach(function(btn){
    btn.addEventListener('click', function(){
      rating = parseInt(this.dataset.r);
      document.querySelectorAll('.mfb-star').forEach(function(b){ b.classList.remove('selected'); });
      this.classList.add('selected');
      document.getElementById('mfbComment').classList.add('visible');
      fetch(WEBHOOK, {
        method: 'POST',
        headers: { 'Content-Type': 'application/json', 'Authorization': APIKEY },
        body: JSON.stringify({ pageTitle: TITLE, rating: rating, comment: '', timestamp: new Date().toISOString() })
      }).then(function(r){ return r.json(); }).then(function(d){ if(d.id) entryId = d.id; }).catch(function(){});
    });
  });

  window.mfbSubmit = function(){
    var comment = document.getElementById('mfbText').value.trim();
    var btn = document.getElementById('mfbBtn');
    var btnT = document.getElementById('mfbBtnT');
    var spin = document.getElementById('mfbSpin');
    var err = document.getElementById('mfbErr');
    btn.disabled = true; btnT.style.display = 'none'; spin.style.display = 'block'; err.style.display = 'none';
    var payload = { pageTitle: TITLE, rating: rating, comment: comment, timestamp: new Date().toISOString() };
    if(entryId) payload.id = entryId;
    fetch(WEBHOOK, {
      method: 'POST',
      headers: { 'Content-Type': 'application/json', 'Authorization': APIKEY },
      body: JSON.stringify(payload)
    }).then(function(r){
      if(r.ok){ document.getElementById('mfbStep').style.display='none'; document.getElementById('mfbThanks').style.display='block'; }
      else throw new Error();
    }).catch(function(){ err.style.display='block'; btn.disabled=false; btnT.style.display='inline'; spin.style.display='none'; });
  };
})();
</script>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/AI---Security.png" style="background-image: url(https://mandos.io/content/images/2024/09/AI---Security.png)"><h2 class="kg-header-card-header" id="ai-amp-security"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2></div><h3 id="agentic-blabbering-attack-lets-malicious-sites-hijack-ai-browser-agents"><a href="https://thehackernews.com/?ref=mandos.io">"Agentic Blabbering" Attack Lets Malicious Sites Hijack AI Browser Agents</a></h3><ul><li><strong>Guardio</strong> disclosed a new attack technique called "Agentic Blabbering" that exploits the tendency of AI browser agents to narrate their reasoning and actions in real-time, allowing attackers to intercept the AI's decision-making process and manipulate its security guardrails.</li><li>The attack works by using the AI's own reasoning output against it: because AI browsers continuously describe what they see, what they plan to do, and what signals they consider safe, adversaries can craft web pages that feed the agent misleading context to lower its defenses.</li><li>As AI-powered browsing becomes more common in enterprise environments, security teams should evaluate the exposure of any browser agent deployments, restrict agent permissions to sensitive internal systems, and monitor for anomalous agent-initiated actions.</li></ul><h3 id="cloudflare-ai-security-for-apps-goes-ga-with-free-ai-discovery-ibm-and-wiz-partnerships"><a href="https://blog.cloudflare.com/ai-security-for-apps-ga/?ref=mandos.io">Cloudflare AI Security for Apps Goes GA With Free AI Discovery, IBM and Wiz Partnerships</a></h3><ul><li><strong>Cloudflare</strong> made its <strong>AI Security for Apps</strong> product generally available, offering automated discovery, detection, and mitigation of threats to LLM-powered applications, and is making <strong>AI endpoint discovery free</strong> for all Cloudflare customers including Free, Pro, and Business plans.</li><li>The product sits as a reverse proxy in front of AI applications to detect <strong>prompt injection</strong>, <strong>jailbreaking</strong>, and sensitive data leakage, while also announcing expanded partnerships with <strong>IBM</strong> (to deliver AI security to its cloud customers) and <strong>Wiz</strong> (for unified AI security posture visibility).</li><li>Organizations deploying AI-powered features should map all LLM endpoints across their web properties as a first step, since most security teams lack full visibility into where AI is actually running in production.</li></ul><h3 id="cisco-talos-warns-agentic-ai-security-is-a-threat-modeling-problem-organizations-already-know-how-to-solve"><a href="https://blog.talosintelligence.com/agentic-ai-security-why-you-need-to-know-about-autonomous-agents-now/?ref=mandos.io">Cisco Talos Warns: Agentic AI Security Is a Threat Modeling Problem Organizations Already Know How to Solve</a></h3><ul><li><strong>Cisco Talos</strong> published research framing agentic AI security as a risk management challenge, noting that autonomous agents operating in observe-orient-decide-act loops can execute unauthorized commands, exfiltrate data, and move laterally, while <strong>only 29%</strong> of organizations report being prepared to secure these deployments.</li><li>Researchers documented real-world attacks where compromised <strong>MCP servers</strong> allowed malicious GitHub issues to hijack agents and trigger data exfiltration from private repositories, and a fake npm package mimicking an email integration silently copied outbound messages to an attacker-controlled address.</li><li>Apply the same threat modeling and least-privilege principles used for human employees to AI agents: scope data access to each agent's specific role, implement runtime guardrails for agent actions, and monitor <strong>MCP</strong> communications for unauthorized tool calls or privilege escalation attempts.</li></ul><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Market-Analysis.png" style="background-image: url(https://mandos.io/content/images/2024/09/Market-Analysis.png)"><h2 class="kg-header-card-header" id="market-intelligence"><span style="white-space: pre-wrap;">Market Intelligence</span></h2></div><h3 id="kevin-mandias-armadin-launches-out-of-stealth-with-190-million-in-funding"><a href="https://www.securityweek.com/kevin-mandias-armadin-launches-with-189-9-million-in-funding/?ref=mandos.io">Kevin Mandia's Armadin Launches Out of Stealth With $190 Million in Funding</a></h3><ul><li><strong>Kevin Mandia</strong>, the former CEO of <strong>Mandiant</strong>, launched a new cybersecurity company called <strong>Armadin</strong> with <strong>$190 million</strong> in funding, signaling that one of the most recognizable names in incident response sees a major gap in the current market.</li><li>The launch follows a wave of stealth-to-launch announcements this week, with <strong>Bold Security</strong> ($40M), <strong>Onyx Security</strong> ($40M), <strong>Jazz</strong> ($61M for AI-powered DLP), and <strong>Kai</strong> ($125M for IT/OT security) all emerging in the same period, pointing to sustained investor appetite for cybersecurity.</li><li>When the person who built and sold Mandiant for $5.4B starts a new company with nearly $200M day one, it validates that the next generation of security infrastructure is being built right now, and the opportunity window for early-stage vendors is narrowing.</li></ul><h3 id="openai-acquires-ai-security-startup-promptfoo-to-bolster-agentic-ai-testing"><a href="https://www.securityweek.com/openai-to-acquire-ai-security-startup-promptfoo/?ref=mandos.io">OpenAI Acquires AI Security Startup Promptfoo to Bolster Agentic AI Testing</a></h3><ul><li><strong>OpenAI</strong> announced the acquisition of <strong>Promptfoo</strong>, an AI security startup focused on LLM evaluation and red-teaming, signaling that the largest AI model provider is taking security testing seriously as agentic AI deployments accelerate.</li><li>Promptfoo built open-source tooling for testing AI applications against prompt injection, jailbreaks, and other adversarial attacks, and its integration into OpenAI could mean native security testing becomes a built-in feature rather than an aftermarket add-on.</li><li>For cybersecurity founders building in the AI security space, this acquisition confirms that the testing and evaluation layer is becoming a must-have capability, and that major AI platforms will either build or buy their way into security tooling.</li></ul><h3 id="bold-emerges-from-stealth-with-40m-to-rethink-endpoint-security-with-edge-ai"><a href="https://fintech.global/2026/03/13/cybersecurity-company-bold-bags-40m-funding-round/?ref=mandos.io">Bold Emerges From Stealth With $40M to Rethink Endpoint Security With Edge AI</a></h3><ul><li><strong>Bold</strong>, a new enterprise endpoint security company, raised <strong>$40M</strong> from <strong>Bessemer Venture Partners</strong>, Picture Capital, and Red Dot Capital Partners to launch an AI-powered platform that processes user behavior data locally on each device rather than routing it to the cloud.</li><li>Early enterprise customers report alert volumes dropping by up to 90% after deployment, with the lightweight AI agent continuously analyzing user activity, application behavior, and data movement without cloud dependency, addressing growing concerns around privacy and data sovereignty.</li><li>The "last mile" endpoint protection approach signals growing investor conviction that the next generation of endpoint security needs to move beyond legacy DLP and insider risk tools toward real-time, on-device behavioral analysis.</li></ul><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/TOOLS.png" style="background-image: url(https://mandos.io/content/images/2024/09/TOOLS.png)"><h2 class="kg-header-card-header" id="security-stack"><span style="white-space: pre-wrap;">Security Stack</span></h2></div><h3 id="push-security-browser-extension"><a href="https://cybersectools.com/tools/push-security-browser-extension?ref=mandos.io">Push Security Browser Extension</a></h3><p>Browser-based security tool that detects phishing kits, cloned login pages, and credential theft in real time by inspecting page content directly in the browser. Directly relevant this week as Push Security researchers uncovered the InstallFix campaign targeting Claude Code users with pixel-perfect fake installation pages.</p><h3 id="42crunch-api-protection"><a href="https://cybersectools.com/tools/42crunch-api-protection?ref=mandos.io">42Crunch API Protection</a></h3><p>Runtime API security using a micro-firewall approach that enforces policies based on OpenAPI contracts. Relevant this week as Wallarm's report showed 97% of API vulnerabilities are exploitable with a single request.</p><h3 id="armo"><a href="https://cybersectools.com/tools/armo-platform?ref=mandos.io">ARMO</a></h3><p>Kubernetes-native cloud security platform using eBPF for runtime monitoring with CSPM and KSPM capabilities. Contextually relevant this week after CrackArmor vulnerabilities exposed 12.6 million Linux servers, many running Kubernetes workloads.</p><hr><p>Thank you for reading this week's brief.</p><p>Whenever you're ready, there are three ways I can help you:</p><ol><li>Get your cybersecurity product in front of 15,000 cybersecurity professionals on <a href="https://cybersectools.com/promote?ref=mandos.io">CybersecTools</a>.</li><li>Position your product to sell to CISOs correctly. <a href="https://cybersectools.com/advisory?ref=mandos.io">Positioning Advisory</a>.</li><li>Get deep market intelligence on your company, competitors and the whole industry. <a href="https://cybersecradars.com/?ref=mandos.io">Sign Up for Waitlist</a>.</li></ol><p>Talk to you in the next one.</p><p>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #145: CISO Liability Hits 78%, Trump Bans Anthropic, Check Point&#x27;s $150M AI Push ]]></title>
        <description><![CDATA[ Insider risk costs surge to $19.5M per org as shadow AI creates invisible data loss. CISA leadership in chaos during government shutdown. ]]></description>
        <link>https://mandos.io/newsletter/brief-145-ciso-liability-hits-78-trump-bans-anthropic-check-points-150m-ai-push/</link>
        <guid isPermaLink="false">69a30c2eef7f23a4d9990748</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 01 Mar 2026 17:00:37 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/02/9.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>Israel-Iran Cyber-Kinetic Operation:</strong>&nbsp;Israel dropped Iran's internet to 4% connectivity during a coordinated military-cyber strike, paralyzing government agencies and IRGC communications.</li><li><strong>Shadow AI Is Bleeding You Dry:</strong>&nbsp;Insider risk costs hit $19.5M per org, and 73% of companies say unauthorized AI use is creating invisible data loss paths while only 18% have governance in place.</li><li><strong>Check Point's $150M Israeli Acquisition Spree:</strong>&nbsp;Check Point picked up Cyclops and Cyata to build out agentic exposure management and unsupervised AI agent security.&nbsp;</li></ul><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Industry-News-1.png" style="background-image: url(https://mandos.io/content/images/2024/09/Industry-News-1.png)"><h2 class="kg-header-card-header" id="threats"><span style="white-space: pre-wrap;">Threats</span></h2></div><h3 id="israel-launches-largest-cyberattack-in-history-plunging-iran-to-4-internet-connectivity"><a href="https://www.jpost.com/israel-news/defense-news/article-888271?ref=mandos.io">Israel Launches Largest Cyberattack in History, Plunging Iran to 4% Internet Connectivity</a></h3>
<ul>
<li>A <strong>massive coordinated cyberattack</strong> accompanied Operation "Roar of the Lion," dropping Iran's internet connectivity to just 4% of normal levels according to <strong>NetBlocks</strong>, while paralyzing critical infrastructure, government news agencies including IRNA and Tasnim, and IRGC communications systems.</li>
<li>The operation combined <strong>electronic warfare</strong>, DDoS attacks, and deep intrusions into energy and aviation infrastructure, reportedly preventing Iranian forces from coordinating counterattacks and disrupting drone and ballistic missile launch capabilities.</li>
<li>Security teams should treat this as a case study in how <strong>cyber operations now run parallel to kinetic military strikes</strong>, reinforcing the need for resilient, air-gapped backup communications and incident response plans that assume total internet loss scenarios.</li>
</ul>
<h3 id="canadian-tire-data-breach-exposes-38-million-customer-accounts-across-multiple-retail-brands"><a href="https://www.securityweek.com/canadian-tire-data-breach-impacts-38-million-accounts/?ref=mandos.io">Canadian Tire Data Breach Exposes 38 Million Customer Accounts Across Multiple Retail Brands</a></h3>
<ul>
<li><strong>Canadian Tire Corporation</strong> confirmed that an October 2025 breach of its e-commerce database exposed 42 million records containing 38.3 million unique email addresses, names, phone numbers, physical addresses, and <strong>PBKDF2-hashed passwords</strong> across Canadian Tire, SportChek, Mark's, and Party City brands.</li>
<li>The dataset, now added to <strong>Have I Been Pwned</strong>, also included partial credit card data for a subset of users; 86% of the exposed emails were already present in HIBP from previous breaches, compounding credential stuffing and phishing risks.</li>
<li>Organizations running multi-brand e-commerce platforms should audit <strong>shared database architectures</strong> for lateral exposure risk, enforce credential rotation across all linked storefronts, and deploy monitoring for targeted phishing campaigns using the exposed personal data.</li>
</ul>
<h3 id="north-koreas-apt37-deploys-ruby-jumper-toolkit-to-breach-air-gapped-networks-via-usb"><a href="https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/?ref=mandos.io">North Korea's APT37 Deploys "Ruby Jumper" Toolkit to Breach Air-Gapped Networks via USB</a></h3>
<ul>
<li><strong>Zscaler ThreatLabz</strong> uncovered a five-tool malware toolkit (RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE) used by North Korean group <strong>APT37</strong> to bridge air-gapped systems by weaponizing removable USB drives, hiding files in fake Recycle Bin folders, and replacing legitimate files with malicious LNK shortcuts.</li>
<li>The campaign disguises a full <strong>Ruby 3.3.0 runtime</strong> as a USB utility (usbspeed.exe), hijacks RubyGems to auto-load malware every five minutes, and uses <strong>Zoho WorkDrive</strong> as command-and-control infrastructure, marking the first documented abuse of this cloud service by the group.</li>
<li>Organizations relying on air-gapped environments for critical infrastructure or classified operations should enforce strict <strong>removable media controls</strong>, monitor for unexpected LNK execution and hidden directories on USB drives, and block unauthorized Ruby runtimes on endpoints.</li>
</ul>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Leadership-Insights.png" style="background-image: url(https://mandos.io/content/images/2024/09/Leadership-Insights.png)"><h2 class="kg-header-card-header" id="ciso-lens"><span style="white-space: pre-wrap;">CISO Lens</span></h2></div><h3 id="splunk-report-78-of-cisos-now-concerned-about-personal-liability-for-security-incidents"><a href="https://www.helpnetsecurity.com/2026/02/27/splunk-ciso-liability-risk-report/?ref=mandos.io">Splunk Report: 78% of CISOs Now Concerned About Personal Liability for Security Incidents</a></h3>
<ul>
<li><strong>Splunk's 2026 CISO Report</strong> found that personal liability concerns jumped from 56% to 78% year over year, while nearly all respondents said <strong>AI governance</strong> and risk management now fall under their direct responsibility, expanding the role well beyond traditional detection and response.</li>
<li>85% of CISOs cited low <strong>cybersecurity fluency</strong> among non-technical executives as a collaboration obstacle, and 41% said they cannot directly correlate security ROI to risk mitigation, making budget justification and board communication persistently difficult.</li>
<li>Security leaders should formalize <strong>documentation practices</strong> around risk decisions, build structured board reporting frameworks that translate operational metrics into business language, and proactively define AI governance policies before oversight gaps become liability triggers.</li>
</ul>
<h3 id="cisa-leadership-shakeup-as-acting-director-removed-amid-government-shutdown-and-geopolitical-tensions"><a href="https://federalnewsnetwork.com/cybersecurity/2026/02/cisa-leadership-shakeup-comes-amid-pressure-moment-for-cyber-agency/?ref=mandos.io">CISA Leadership Shakeup as Acting Director Removed Amid Government Shutdown and Geopolitical Tensions</a></h3>
<ul>
<li><strong>CISA's acting director Madhu Gottumukkala</strong> was moved to a different DHS role after a tenure marked by failed polygraph tests, uploading sensitive documents to public ChatGPT, and attempted removal of the agency's CIO, with <strong>Nick Andersen</strong> (executive assistant director for cybersecurity) now serving as acting director.</li>
<li>The transition comes while <strong>two-thirds of CISA staff are furloughed</strong> during the DHS government shutdown, the nominated permanent director Sean Plankey remains stuck in Senate confirmation, and former officials warn that geopolitical tensions with Iran could trigger retaliation against U.S. infrastructure.</li>
<li>For security leaders dependent on federal threat intelligence and coordination, this signals a period where <strong>CISA's partnership capacity is diminished</strong>. Teams should diversify threat intel sources and stress-test incident response plans that don't assume timely federal support.</li>
</ul>
<h3 id="insider-risk-costs-hit-195m-per-organization-as-shadow-ai-creates-invisible-data-loss-paths"><a href="https://www.helpnetsecurity.com/2026/02/26/insider-risk-costs-2026/?ref=mandos.io">Insider Risk Costs Hit $19.5M Per Organization as Shadow AI Creates Invisible Data Loss Paths</a></h3>
<ul>
<li>The <strong>2026 Cost of Insider Risks Report</strong> from Ponemon Institute found that average annual insider incident costs reached $19.5 million per organization, up 20% since 2023, with negligent employee behavior driving $10.3 million of that total across an average of 14 incidents per company.</li>
<li><strong>73% of organizations</strong> say unauthorized AI use is creating invisible data exfiltration paths, yet only 18% have integrated AI governance into insider risk programs and just 13% have formally adopted AI into business strategy, leaving a massive visibility gap as employees routinely feed source code, legal documents, and architecture diagrams into public LLMs.</li>
<li>CISOs should classify <strong>AI agents as insider-equivalent identities</strong> with delegated authority and access, invest in behavioral intelligence and privileged access management (which delivers $6.1M in average cost savings), and close the governance gap before shadow AI normalizes unmonitored data flows across the organization.</li>
</ul>

<!--kg-card-begin: html-->
<style>
  .mfb-card * { margin: 0; padding: 0; box-sizing: border-box; }
  .mfb-card {
    font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', sans-serif;
    width: 100%;
    max-width: 480px;
    background: linear-gradient(135deg, #0a2e1a 0%, #0c3d22 50%, #0a2e1a 100%);
    border: 1px solid rgba(20, 184, 112, 0.25);
    border-radius: 12px;
    padding: 28px 24px;
    text-align: center;
    margin: 24px auto;
    color: #e4e4e7;
  }
  .mfb-title {
    font-size: 15px;
    font-weight: 500;
    color: #b0e8cf;
    margin-bottom: 16px;
    letter-spacing: 0.01em;
  }
  .mfb-stars {
    display: flex;
    justify-content: center;
    gap: 8px;
    margin-bottom: 6px;
  }
  .mfb-star {
    background: rgba(0, 0, 0, 0.3);
    border: 2px solid rgba(20, 184, 112, 0.3);
    border-radius: 10px;
    width: 52px;
    height: 52px;
    cursor: pointer;
    display: flex;
    align-items: center;
    justify-content: center;
    font-size: 18px;
    font-weight: 600;
    color: rgba(20, 184, 112, 0.6);
    transition: all 0.2s ease;
    font-family: inherit;
  }
  .mfb-star:hover {
    border-color: #14b870;
    background: rgba(20, 184, 112, 0.15);
    transform: translateY(-2px);
    color: #14b870;
  }
  .mfb-star.selected {
    border-color: #14b870;
    background: rgba(20, 184, 112, 0.2);
    color: #fff;
    box-shadow: 0 0 12px rgba(20, 184, 112, 0.3);
  }
  .mfb-labels {
    display: flex;
    justify-content: space-between;
    padding: 0 4px;
  }
  .mfb-labels span {
    font-size: 11px;
    color: rgba(20, 184, 112, 0.5);
  }
  .mfb-comment {
    max-height: 0;
    overflow: hidden;
    opacity: 0;
    transition: max-height 0.4s ease, opacity 0.3s ease, margin 0.3s ease;
    margin-top: 0;
  }
  .mfb-comment.visible {
    max-height: 200px;
    opacity: 1;
    margin-top: 20px;
  }
  .mfb-textarea {
    width: 100%;
    background: rgba(0, 0, 0, 0.4);
    border: 1px solid rgba(20, 184, 112, 0.25);
    border-radius: 8px;
    padding: 12px 14px;
    color: #e4e4e7;
    font-family: inherit;
    font-size: 14px;
    resize: none;
    height: 64px;
    outline: none;
    transition: border-color 0.2s;
  }
  .mfb-textarea::placeholder { color: rgba(176, 232, 207, 0.4); }
  .mfb-textarea:focus { border-color: #14b870; }
  .mfb-btn {
    margin-top: 10px;
    width: 100%;
    background: #14b870;
    color: #0a2e1a;
    border: none;
    border-radius: 8px;
    padding: 10px 0;
    font-family: inherit;
    font-size: 14px;
    font-weight: 600;
    cursor: pointer;
    transition: background 0.2s, transform 0.1s;
  }
  .mfb-btn:hover { background: #17d483; }
  .mfb-btn:active { transform: scale(0.98); }
  .mfb-btn:disabled { background: rgba(20, 184, 112, 0.3); color: rgba(10, 46, 26, 0.6); cursor: not-allowed; }
  .mfb-thanks {
    display: none;
    padding: 20px 0 4px;
    text-align: center;
  }
  .mfb-check {
    width: 40px;
    height: 40px;
    background: rgba(20, 184, 112, 0.2);
    border-radius: 50%;
    display: inline-flex;
    align-items: center;
    justify-content: center;
    margin-bottom: 12px;
  }
  .mfb-check svg { width: 20px; height: 20px; stroke: #14b870; fill: none; stroke-width: 2.5; stroke-linecap: round; stroke-linejoin: round; }
  .mfb-thanks h3 { font-size: 16px; font-weight: 600; color: #e4e4e7; margin-bottom: 4px; }
  .mfb-thanks p { font-size: 13px; color: #b0e8cf; }
  .mfb-error { font-size: 12px; color: #ef4444; margin-top: 8px; display: none; }
  .mfb-spinner { display: none; width: 16px; height: 16px; border: 2px solid transparent; border-top-color: #0a2e1a; border-radius: 50%; animation: mfbSpin 0.6s linear infinite; margin: 0 auto; }
  @keyframes mfbSpin { to { transform: rotate(360deg); } }
</style>

<div class="mfb-card">
  <div id="mfbStep">
    <div class="mfb-title">How was this week's brief?</div>
    <div class="mfb-stars">
      <button class="mfb-star" data-r="1">1</button>
      <button class="mfb-star" data-r="2">2</button>
      <button class="mfb-star" data-r="3">3</button>
      <button class="mfb-star" data-r="4">4</button>
      <button class="mfb-star" data-r="5">5</button>
    </div>
    <div class="mfb-labels"><span>Not useful</span><span>Very useful</span></div>
    <div class="mfb-comment" id="mfbComment">
      <textarea class="mfb-textarea" id="mfbText" placeholder="Any thoughts? (optional)" maxlength="500"></textarea>
      <button class="mfb-btn" id="mfbBtn" onclick="mfbSubmit()">
        <span id="mfbBtnT">Send feedback</span>
        <div class="mfb-spinner" id="mfbSpin"></div>
      </button>
      <div class="mfb-error" id="mfbErr">Something went wrong. Try again.</div>
    </div>
  </div>
  <div class="mfb-thanks" id="mfbThanks">
    <div class="mfb-check"><svg viewBox="0 0 24 24"><polyline points="20 6 9 17 4 12"/></svg></div>
    <h3>Thanks for the feedback</h3>
    <p>It helps shape next week's brief.</p>
  </div>
</div>

<script>
(function(){
  var WEBHOOK = 'https://builder.mandos.io/webhook/a1a78ac7-9ff1-4aa7-8bd2-3cb8294134df';
  var APIKEY = 'w3pA6KvoyNgG67VBLwkdAUNpPWkuJ8CmeyETLW3KacKXFcshVMZbMWd3iohxx9m3';

  // Auto-detect Brief title from page
  var TITLE = 'Mandos Brief';
  try {
    var pageTitle = document.title || '';
    var match = pageTitle.match(/Brief\s*#\d+/i);
    if (match) { TITLE = match[0]; }
    else {
      var h1 = document.querySelector('.gh-article-title, .post-full-title, h1');
      if (h1) {
        var h1match = h1.textContent.match(/Brief\s*#\d+/i);
        if (h1match) TITLE = h1match[0];
      }
    }
  } catch(e) {}

  var rating = null, entryId = null;

  document.querySelectorAll('.mfb-star').forEach(function(btn){
    btn.addEventListener('click', function(){
      rating = parseInt(this.dataset.r);
      document.querySelectorAll('.mfb-star').forEach(function(b){ b.classList.remove('selected'); });
      this.classList.add('selected');
      document.getElementById('mfbComment').classList.add('visible');
      fetch(WEBHOOK, {
        method: 'POST',
        headers: { 'Content-Type': 'application/json', 'Authorization': APIKEY },
        body: JSON.stringify({ pageTitle: TITLE, rating: rating, comment: '', timestamp: new Date().toISOString() })
      }).then(function(r){ return r.json(); }).then(function(d){ if(d.id) entryId = d.id; }).catch(function(){});
    });
  });

  window.mfbSubmit = function(){
    var comment = document.getElementById('mfbText').value.trim();
    var btn = document.getElementById('mfbBtn');
    var btnT = document.getElementById('mfbBtnT');
    var spin = document.getElementById('mfbSpin');
    var err = document.getElementById('mfbErr');
    btn.disabled = true; btnT.style.display = 'none'; spin.style.display = 'block'; err.style.display = 'none';
    var payload = { pageTitle: TITLE, rating: rating, comment: comment, timestamp: new Date().toISOString() };
    if(entryId) payload.id = entryId;
    fetch(WEBHOOK, {
      method: 'POST',
      headers: { 'Content-Type': 'application/json', 'Authorization': APIKEY },
      body: JSON.stringify(payload)
    }).then(function(r){
      if(r.ok){ document.getElementById('mfbStep').style.display='none'; document.getElementById('mfbThanks').style.display='block'; }
      else throw new Error();
    }).catch(function(){ err.style.display='block'; btn.disabled=false; btnT.style.display='inline'; spin.style.display='none'; });
  };
})();
</script>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/AI---Security.png" style="background-image: url(https://mandos.io/content/images/2024/09/AI---Security.png)"><h2 class="kg-header-card-header" id="ai-amp-security"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2></div><h3 id="trump-orders-federal-ban-on-anthropic-as-pentagon-designates-ai-company-a-supply-chain-risk"><a href="https://www.npr.org/2026/02/27/nx-s1-5729118/trump-anthropic-pentagon-openai-ai-weapons-ban?ref=mandos.io">Trump Orders Federal Ban on Anthropic as Pentagon Designates AI Company a Supply Chain Risk</a></h3>
<ul>
<li>President Trump ordered <strong>all federal agencies to immediately cease using Anthropic's technology</strong> after the company refused Pentagon demands to remove contractual restrictions on using Claude for autonomous weapons and mass domestic surveillance, escalating a months-long dispute over a $200 million classified network contract.</li>
<li>Defense Secretary Hegseth designated <strong>Anthropic a "Supply-Chain Risk to National Security"</strong>, a classification typically reserved for foreign adversaries, which could force any Pentagon contractor to prove they don't use Anthropic products, potentially threatening the company's broader enterprise customer base despite its $380 billion valuation.</li>
<li>The immediate security implication: organizations with federal contracts should <strong>audit their AI toolchain dependencies</strong> for Anthropic exposure, while all enterprises should treat this as a case study in vendor concentration risk when building critical workflows on any single AI provider.</li>
</ul>
<h3 id="north-korean-contagious-interview-campaign-evolves-with-custom-bytecode-vm-github-gists-and-akira-stealer-delivery-via-vscode"><a href="https://www.abstract.security/blog/contagious-interview-evolution-of-vscode-and-cursor-tasks-infection-chains?ref=mandos.io">North Korean Contagious Interview Campaign Evolves with Custom Bytecode VM, GitHub Gists, and Akira Stealer Delivery via VSCode</a></h3>
<ul>
<li><strong>Abstract Security's ASTRO team</strong> documented new payload staging infrastructure in the DPRK-linked Contagious Interview campaign, now abusing GitHub Gists, Google Drive, short URL services, and custom domains alongside the established VSCode/Cursor tasks.json auto-execution vector that fires malware when developers open malicious repositories.</li>
<li>A newly observed loader uses a <strong>custom stack-based bytecode virtual machine</strong> to execute obfuscated payloads, while one infection chain delivers PyArmor-protected Python that drops Akira Stealer, a commodity infostealer targeting browser credentials, crypto wallets, and chat applications, complicating attribution beyond typical DPRK tooling.</li>
<li>Development teams should <strong>disable automatic task execution</strong> in VSCode and Cursor, enforce mandatory code review of .vscode/tasks.json before granting workspace trust, and treat any repository received through recruitment channels as hostile until verified by security.</li>
</ul>
<h3 id="owasp-releases-ai-red-teaming-vendor-evaluation-criteria-for-genai-systems"><a href="https://drive.google.com/file/d/1fRT9_hvm0BVA_tqM86VDfsbXe6MINU6Y/view?usp=share_link&ref=mandos.io">OWASP Releases AI Red Teaming Vendor Evaluation Criteria for GenAI Systems</a></h3>
<ul>
<li>OWASP published comprehensive vendor evaluation criteria to help organizations assess <strong>AI red teaming</strong> providers and automated tools, addressing both simple chatbots and advanced multi-agent systems with tool-calling capabilities.</li>
<li>The guide identifies critical <strong>red flags</strong> including vendors using stock jailbreak libraries, lack of multi-turn testing capabilities, and inability to evaluate stateful systems with memory and cross-session behavior analysis.</li>
<li>Organizations should prioritize vendors demonstrating <strong>green flags</strong> such as reproducible adversarial evaluations, custom testing with novel findings, human verification of critical results, and actionable <strong>remediation</strong> guidance mapped to business impact.</li>
</ul>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Market-Analysis.png" style="background-image: url(https://mandos.io/content/images/2024/09/Market-Analysis.png)"><h2 class="kg-header-card-header" id="market-intelligence"><span style="white-space: pre-wrap;">Market Intelligence</span></h2></div><h3 id="levelblue-acquires-fortras-alert-logic-mdr-business-to-strengthen-global-mdr-position"><a href="https://www.levelblue.com/newsroom/press-releases/levelblue-and-fortra-launch-strategic-managed-services-partnership-to-accelerate-cybersecurity-innovation?ref=mandos.io">LevelBlue Acquires Fortra's Alert Logic MDR Business to Strengthen Global MDR Position</a></h3>
<ul>
<li>
<p>LevelBlue, the world's largest pure-play <strong>MSSP</strong>, acquired the managed services division of Fortra's Alert Logic MDR, XDR, and WAF solutions as part of a broader strategic <strong>partnership</strong>.</p>
</li>
<li>
<p>The <strong>acquisition</strong> expands LevelBlue's global footprint and provides Alert Logic clients with access to broader threat telemetry and accelerated detection and response capabilities across complex environments.</p>
</li>
<li>
<p>Fortra will become a leading technology partner for LevelBlue, making its offensive and defensive security solutions available to LevelBlue's global client base while strengthening both companies' market positions.</p>
</li>
</ul>
<h3 id="westcon-comstor-acquires-real-security-to-enter-balkans-market"><a href="https://www.westconcomstor.com/global/en/news/announcements/2026/acquisition-of-specialist-distributor-real-security.html?ref=mandos.io">Westcon-Comstor Acquires REAL Security to Enter Balkans Market</a></h3>
<ul>
<li>
<p>Global technology <strong>distributor</strong> Westcon-Comstor expanded into the Balkans region by acquiring Slovenia-based REAL Security, a value-added cybersecurity distributor operating across eight countries since 2002.</p>
</li>
<li>
<p>REAL Security has built market-leading <strong>cybersecurity</strong> expertise in Slovenia, Croatia, Bosnia and Herzegovina, Serbia, Kosovo, Montenegro, Albania and North Macedonia, connecting major vendors with resellers and managed service providers.</p>
</li>
<li>
<p>The <strong>acquisition</strong> provides Westcon-Comstor with proven local capability and represents their first deal since acquiring AWS consultancy Rebura in January 2024, strengthening their European cybersecurity <strong>portfolio</strong>.</p>
</li>
</ul>
<h3 id="check-point-acquires-cyclops-and-cyata-for-150-million-in-strategic-israeli-cyber-push"><a href="https://www.calcalistech.com/ctechnews/article/rjnbhfipwl?ref=mandos.io">Check Point Acquires Cyclops and Cyata for $150 Million in Strategic Israeli Cyber Push</a></h3>
<ul>
<li>
<p>Check Point is acquiring <strong>Cyclops</strong> Security (estimated $85 million) and <strong>Cyata</strong> ($8.5 million in previous funding) along with acqui-hiring Rotate's team, totaling approximately $150 million to expand its domestic Israeli cybersecurity capabilities.</p>
</li>
<li>
<p>Cyclops offers an <strong>agentic</strong> exposure management platform built on cybersecurity mesh architecture that allows security teams to query their environment using natural language for vulnerability and compliance insights.</p>
</li>
<li>
<p>Cyata specializes in securing unsupervised <strong>AI</strong> agents operating across enterprise environments, providing visibility and control over autonomous bots, copilots, and chatbots that can execute code and access sensitive data outside traditional identity frameworks.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/TOOLS.png" style="background-image: url(https://mandos.io/content/images/2024/09/TOOLS.png)"><h2 class="kg-header-card-header" id="security-stack"><span style="white-space: pre-wrap;">Security Stack</span></h2></div><h3 id="allama-open-source-ai-security-automation-platform"><a href="https://github.com/digitranslab/allama?ref=mandos.io">Allama: Open-Source AI Security Automation Platform</a></h3>
<p>Open-source <strong>SOAR alternative</strong> with 80+ integrations across SIEMs, EDR, identity providers, and ticketing systems, using AI agents (supports external and self-hosted LLMs via Ollama) to enrich, triage, and act on alerts through visual drag-and-drop workflows.</p>
<h3 id="openclaw-scanner-detect-autonomous-ai-agents-across-your-environment"><a href="https://www.helpnetsecurity.com/2026/02/12/openclaw-scanner-open-source-tool-detects-autonomous-ai-agents/?ref=mandos.io">OpenClaw Scanner: Detect Autonomous AI Agents Across Your Environment</a></h3>
<p>Free open-source scanner that identifies instances of <strong>OpenClaw (MoltBot)</strong> autonomous AI agents operating across corporate environments, including agents that can execute tasks, access local files, and authenticate to internal systems without centralized oversight.</p>
<h3 id="brutus-multi-protocol-credential-testing-tool-in-pure-go"><a href="https://www.helpnetsecurity.com/2026/02/13/brutus-open-source-credential-testing-tool-offensive-security/?ref=mandos.io">Brutus: Multi-Protocol Credential Testing Tool in Pure Go</a></h3>
<p>Open-source credential testing tool written in <strong>pure Go</strong> that ships as a single binary with zero external dependencies, replacing legacy brute-force tools plagued by dependency conflicts and integration gaps.</p>
<hr><p>Thank you for reading this week's brief.</p><p>Whenever you're ready, there are three ways I can help you:</p><ol><li>Get your cybersecurity product in front of 15,000 cybersecurity professionals on <a href="https://cybersectools.com/promote?ref=mandos.io">CybersecTools</a>.</li><li>Position your product to sell to CISOs correctly. <a href="https://cybersectools.com/advisory?ref=mandos.io">Positioning Advisory</a>.</li><li>Get deep market intelligence on your company, competitors and the whole industry. <a href="https://cybersecradars.com/?ref=mandos.io">Sign Up for Waitlist</a>.</li></ol><p>Talk to you in the next one.</p><p>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #144: FortiGate AI Attack Hits 55 Countries, Password Manager Vaults Exposed, Zscaler Acquires SquareX ]]></title>
        <description><![CDATA[ WEF reports 87% of leaders flag AI as fastest-growing risk. Claroty raises $150M at $3B valuation with 2027 IPO planned. ]]></description>
        <link>https://mandos.io/newsletter/brief-144-fortigate-ai-attack-hits-55-countries-password-manager-vaults-exposed-zscaler-acquires-squarex/</link>
        <guid isPermaLink="false">699ae7f6ef7f23a4d998f77a</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 22 Feb 2026 17:00:56 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/02/8.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>AI-powered FortiGate campaign hits 600+ devices in 55 countries</strong> - No zero-days required; commercial AI services automated lateral movement and attack planning at industrial scale</li><li><strong>WEF report exposes CEO-CISO risk priority gap</strong> - CEOs worry about fraud, CISOs worry about ransomware, and 87% of leaders flag AI vulnerabilities as the fastest-growing risk</li><li><strong>Claroty raises $150M at $3B valuation, eyes 2027 IPO</strong> - OT security gets a massive vote of confidence as the company enters final IPO preparation stages</li></ul><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Industry-News-1.png" style="background-image: url(https://mandos.io/content/images/2024/09/Industry-News-1.png)"><h2 class="kg-header-card-header" id="threats"><span style="white-space: pre-wrap;">Threats</span></h2></div><h3 id="ai-assisted-hacker-breaches-600-fortigate-firewalls-across-55-countries-in-5-weeks"><a href="https://thehackernews.com/2026/02/ai-assisted-threat-actor-compromises.html?ref=mandos.io">AI-Assisted Hacker Breaches 600+ FortiGate Firewalls Across 55 Countries in 5 Weeks</a></h3>
<ul>
<li>Amazon Threat Intelligence revealed a <strong>Russian-speaking</strong> threat actor used commercial AI services including DeepSeek and Claude to compromise over 600 <strong>FortiGate</strong> devices between January 11 and February 18, exploiting exposed management interfaces and weak credentials rather than zero-day vulnerabilities.</li>
<li>The attacker fed stolen network topologies directly into LLMs for step-by-step <strong>lateral movement</strong> guidance, deployed Mimikatz for DCSync attacks against domain controllers, and used an automated system called <strong>ARXON</strong> to generate structured attack plans, turning AI into what Amazon called an "assembly line for cybercrime."</li>
<li>Security teams should immediately audit FortiGate management interface exposure, enforce <strong>MFA</strong> on all VPN and admin access, rotate SSL-VPN credentials, and monitor for anomalous Active Directory replication events (Event ID 4662) as indicators of DCSync activity.</li>
</ul>
<hr>
<h3 id="starkiller-phishing-as-a-service-proxies-real-login-pages-and-bypasses-mfa-in-real-time"><a href="https://krebsonsecurity.com/2026/02/starkiller-phishing-service-proxies-real-login-pages-mfa/?ref=mandos.io">Starkiller Phishing-as-a-Service Proxies Real Login Pages and Bypasses MFA in Real Time</a></h3>
<ul>
<li>A new phishing platform called <strong>Starkiller</strong>, sold as a SaaS subscription by threat group Jinkusu, spins up Docker containers with headless Chrome instances that load real login pages from brands like <strong>Google</strong>, Microsoft, Apple, and PayPal, then act as reverse proxies to relay credentials and MFA tokens in real time.</li>
<li>Unlike traditional phishing kits that use static page clones, Starkiller leaves no template files for security tools to fingerprint or blocklist, while offering operators a full dashboard with <strong>session monitoring</strong>, keystroke logging, cookie theft, geo-tracking, and conversion analytics identical to legitimate SaaS platforms.</li>
<li>Static page analysis and URL reputation filtering are ineffective against this approach; detection needs to shift toward <strong>behavioral signals</strong> like anomalous login patterns, session token reuse from unexpected locations, and impossible travel indicators, even when MFA was technically completed.</li>
</ul>
<hr>
<h3 id="single-threat-actor-dominates-ivanti-rce-attacks-with-83-of-activity"><a href="https://www.bleepingcomputer.com/news/security/one-threat-actor-responsible-for-83-percent-of-recent-ivanti-rce-attacks/?ref=mandos.io">Single Threat Actor Dominates Ivanti RCE Attacks With 83% of Activity</a></h3>
<ul>
<li>A single threat actor operating from IP 193.24.123.42 on <strong>bulletproof</strong> infrastructure accounts for 83% of exploitation attempts targeting critical Ivanti EPMM vulnerabilities <strong>CVE-2026-21962</strong> and <strong>CVE-2026-24061</strong>.</li>
<li>GreyNoise observed 417 exploitation sessions between February 1-9, with a massive spike of 269 sessions on February 8 alone, indicating <strong>automated</strong> attacks using DNS callbacks to verify command execution capabilities.</li>
<li>The same actor simultaneously exploits multiple products including Oracle WebLogic, GNU Inetutils Telnetd, and GLPI, suggesting <strong>initial access broker</strong> activity targeting various enterprise systems for potential resale.</li>
</ul>

<!--kg-card-begin: html-->
<div data-gh-paywall=""></div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Leadership-Insights.png" style="background-image: url(https://mandos.io/content/images/2024/09/Leadership-Insights.png)"><h2 class="kg-header-card-header" id="ciso-lens"><span style="white-space: pre-wrap;">CISO Lens</span></h2></div><h3 id="eth-zurich-study-uncovers-25-attacks-in-major-cloud-password-managers"><a href="https://thehackernews.com/2026/02/study-uncovers-25-password-recovery.html?ref=mandos.io">ETH Zurich Study Uncovers 25 Attacks in Major Cloud Password Managers</a></h3>
<ul>
<li>Researchers from <strong>ETH Zurich</strong> found 25 distinct attack vectors in Bitwarden (12), LastPass (7), and Dashlane (6) that can bypass "zero-knowledge encryption" claims, ranging from integrity violations to complete vault compromise across organizations serving over <strong>60 million users</strong> and 125,000 businesses.</li>
<li>Attacks exploit flawed key escrow recovery mechanisms, unauthenticated public keys, item-level encryption weaknesses, and legacy AES-CBC support that enables <strong>KDF downgrade</strong> attacks accelerating brute-force by up to 300,000x.</li>
<li>Security leaders should audit enterprise password manager deployments against the four recommended mitigations (authenticated encryption, full key separation, public key authentication, ciphertext signing), ensure clients are updated, and evaluate whether vendor "zero-knowledge" promises hold up under a <strong>malicious server threat model</strong>.</li>
</ul>
<hr>
<h3 id="radware-report-ddos-attacks-jump-168-with-peak-volumes-reaching-30-tbps"><a href="https://www.infosecurity-magazine.com/news/ddos-escalation-frequency-power/?ref=mandos.io">Radware Report: DDoS Attacks Jump 168% With Peak Volumes Reaching 30 Tbps</a></h3>
<ul>
<li>Radware's 2026 Global Threat Analysis Report reveals network-layer DDoS attacks increased <strong>168%</strong> year-over-year in 2025, with peak volumes reaching nearly <strong>30 Tbps</strong> and the average customer facing 25,351 attacks (139 per day), while web application DDoS attacks climbed 101%.</li>
<li>The most impactful web DDoS attacks now last <strong>less than 60 seconds</strong>, making manual mitigation and human-in-the-loop defenses ineffective; the technology sector alone represented 45% of all network-layer attacks, up from under 9% in 2024.</li>
<li>Hacktivist group <strong>NoName057(16)</strong> claimed a record 4,693 attacks, with Europe absorbing 48% of all claimed activity; security leaders need to shift from reactive to proactive DDoS defense with automated, AI-aware detection that can respond before sub-minute attacks complete.</li>
</ul>
<hr>
<h3 id="wef-global-cybersecurity-outlook-2026-ceo-and-ciso-risk-priorities-diverge-as-ai-threats-rise"><a href="https://reports.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2026.pdf?ref=mandos.io">WEF Global Cybersecurity Outlook 2026: CEO and CISO Risk Priorities Diverge as AI Threats Rise</a></h3>
<ul>
<li>CEO priorities shifted significantly in 2026, with <strong>cyber-enabled fraud</strong> and phishing replacing ransomware as the top concern, while AI vulnerabilities emerged second; CISOs maintained focus on <strong>ransomware</strong> (#1) and supply chain disruption (#2), revealing a growing perception gap between business leaders and security teams.</li>
<li>Among highly resilient organizations, CEOs rank <strong>AI vulnerabilities</strong> as their top risk, while CEOs of insufficiently resilient organizations remain focused on fraud, suggesting that security maturity directly shapes how leadership perceives emerging threats.</li>
<li>The report highlights a widening <strong>cyber equity gap</strong> between organizations that are resilient and those that are not, with 87% of respondents identifying AI-related vulnerabilities as the fastest-growing risk category across the global threat landscape.</li>
</ul>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/AI---Security.png" style="background-image: url(https://mandos.io/content/images/2024/09/AI---Security.png)"><h2 class="kg-header-card-header" id="ai-amp-security"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2></div><h3 id="ai-agents-solve-9-of-10-web-hacking-challenges-but-struggle-with-broad-scope-testing"><a href="https://www.wiz.io/blog/ai-agents-vs-humans-who-wins-at-web-hacking-in-2026?ref=mandos.io">AI Agents Solve 9 of 10 Web Hacking Challenges but Struggle with Broad Scope Testing</a></h3>
<ul>
<li><strong>Claude Sonnet</strong> 4.5, GPT-5, and Gemini 2.5 Pro successfully exploited vulnerabilities including authentication bypass, <strong>SSRF</strong>, stored <strong>XSS</strong>, and S3 bucket takeovers with costs under $10 per successful attack when given specific targets.</li>
<li>The AI models failed to solve challenges requiring <strong>enumeration</strong> tools or creative pivoting, such as finding exposed secrets in GitHub repositories, demonstrating limitations in strategic thinking compared to human testers.</li>
<li>Performance degraded significantly in <strong>broad scope</strong> scenarios where agents had to independently prioritize targets, with costs increasing 2-2.5 times and fewer challenges solved due to inefficient resource allocation across multiple attack surfaces.</li>
</ul>
<hr>
<h3 id="175000-ollama-hosts-form-unmanaged-ai-network-exposing-tool-calling-capabilities"><a href="https://www.sentinelone.com/labs/silent-brothers-ollama-hosts-form-anonymous-ai-network-beyond-platform-guardrails/?ref=mandos.io">175,000 Ollama Hosts Form Unmanaged AI Network Exposing Tool-Calling Capabilities</a></h3>
<ul>
<li>SentinelLABS and Censys discovered 175,000 publicly accessible <strong>Ollama</strong> hosts across 130 countries operating outside traditional AI governance frameworks, with nearly half configured for <strong>tool-calling</strong> capabilities that enable code execution and API access.</li>
<li>The infrastructure spans residential networks (56% of hosts) and cloud environments, creating attribution challenges where 16-19% of hosts resist clean identification, while a persistent backbone of 23,000 hosts generates 76% of all activity using identical <strong>quantized</strong> models.</li>
<li>Security risks include resource hijacking for malicious workloads, <strong>prompt injection</strong> attacks against tool-enabled systems with retrieval capabilities, and systemic vulnerability due to ecosystem-wide convergence on the same model families and compression formats.</li>
</ul>
<hr>
<h3 id="group-ib-report-weaponized-ai-fuels-fifth-wave-of-cybercrime"><a href="https://drive.google.com/file/d/1ntuB2jMxaM0vD28PfcI4cER9aOyR3f-S/view?usp=share_link&ref=mandos.io">Group-IB Report: Weaponized AI Fuels Fifth Wave of Cybercrime</a></h3>
<ul>
<li>The fifth wave of cybercrime is driven by <strong>weaponized AI</strong> that transforms once human-driven skills like persuasion and coding into scalable services accessible for as little as $30 per month, enabling even novice threat actors to launch sophisticated attacks.</li>
<li>Dark web discussions about AI abuse increased by <strong>371%</strong> between 2019 and 2025, with underground marketplaces now offering subscription-based services including DarkLLMs, deepfake-as-a-service, and AI-powered <strong>phishing</strong> automation tools that mimic legitimate SaaS business models.</li>
<li>Criminal ecosystems have evolved to include AI-enhanced <strong>malware</strong>, synthetic identity creation, and autonomous attack workflows that compress the entire attack lifecycle from reconnaissance to persistence, making cybercrime cheaper, faster, and harder to trace than ever before.</li>
</ul>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Market-Analysis.png" style="background-image: url(https://mandos.io/content/images/2024/09/Market-Analysis.png)"><h2 class="kg-header-card-header" id="market-intelligence"><span style="white-space: pre-wrap;">Market Intelligence</span></h2></div><h3 id="claroty-raises-150-million-in-series-f-funding-at-3-billion-valuation"><a href="https://www.securityweek.com/claroty-raises-150-million-in-series-f-funding/?ref=mandos.io">Claroty Raises $150 Million in Series F Funding at $3 Billion Valuation</a></h3>
<ul>
<li>The cyber-physical systems security company secured <strong>$150 million</strong> in Series F funding led by Golub Growth, bringing total funding to approximately $900 million with an estimated valuation of $3 billion.</li>
<li>Claroty provides comprehensive security for <strong>xIoT</strong> systems including operational technology, ICS, IoT, and IIoT with capabilities spanning asset visibility, exposure management, network protection, and threat detection.</li>
<li>The company is positioning for a potential <strong>IPO</strong> as early as 2027, with CEO Yaniv Vardi indicating they have entered final preparation stages with recent leadership hires and projected path to profitability.</li>
</ul>
<hr>
<h3 id="zscaler-acquires-squarex-to-advance-zero-trust-browser-security"><a href="https://www.zscaler.com/press/zscaler-acquires-squarex?ref=mandos.io">Zscaler Acquires SquareX to Advance Zero Trust Browser Security</a></h3>
<ul>
<li>Zscaler acquired SquareX to extend zero trust capabilities into standard browsers like Chrome and Edge through lightweight <strong>extensions</strong>, eliminating the need for third-party enterprise browsers or full agents on unmanaged devices.</li>
<li>The <strong>acquisition</strong> addresses the security gaps left by legacy VPN and VDI solutions by enabling organizations to secure SaaS and private applications across any device without compromising productivity or requiring expensive infrastructure changes.</li>
<li>SquareX's technology will integrate with Zscaler's Zero Trust Exchange Platform to provide precise zero trust policies that protect data and <strong>AI</strong> interactions based on each organization's specific risk profile, particularly for BYOD environments.</li>
</ul>
<hr>
<h3 id="proofpoint-acquires-acuvity-to-deliver-ai-security-and-governance-across-the-agentic-workspace"><a href="https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-acquires-acuvity-deliver-ai-security-and-governance-across?ref=mandos.io">Proofpoint Acquires Acuvity to Deliver AI Security and Governance Across the Agentic Workspace</a></h3>
<ul>
<li>Proofpoint acquired <strong>Acuvity</strong>, a pioneer in AI enterprise security and governance, to strengthen its platform with AI-native visibility, governance, and runtime protection for AI and agent-driven workflows.</li>
<li>The <strong>acquisition</strong> positions Proofpoint as the first cybersecurity platform to comprehensively address agentic workspace protection at the intersections of humans, data, and AI agents working collaboratively.</li>
<li>Acuvity brings new control points and detection models purpose-built for the AI era, delivering comprehensive visibility and enforcement across AI usage from endpoints and web browsers to emerging <strong>AI infrastructure</strong> such as Model Context Protocol servers.</li>
</ul>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/TOOLS.png" style="background-image: url(https://mandos.io/content/images/2024/09/TOOLS.png)"><h2 class="kg-header-card-header" id="security-stack"><span style="white-space: pre-wrap;">Security Stack</span></h2></div><h3 id="whiteswan-platform"><a href="https://cybersectools.com/tools/whiteswan-platform?ref=mandos.io">Whiteswan Platform</a></h3>
<p>Identity-first security platform that consolidates PAM, ZTNA, and ITDR under Zero Trust principles with just-in-time access controls. Also secures AI agents and non-human identities through an MCP gateway, bridging traditional IAM with the emerging agentic AI access challenge highlighted by this week's Proofpoint-Acuvity and Check Point-Cyata acquisitions.</p>
<h3 id="saidot-ai-governance-platform"><a href="https://cybersectools.com/tools/saidot-ai-governance-platform?ref=mandos.io">Saidot AI Governance Platform</a></h3>
<p>SaaS governance platform for managing AI system risk, compliance, and EU AI Act requirements using a knowledge graph that connects risks, policies, models, and evaluations. Features an Agent Catalogue for governing AI agents deployed across organizations, directly relevant as the WEF report flags 87% of leaders identifying AI vulnerabilities as the fastest-growing risk.</p>
<h3 id="mcp-gateway"><a href="https://cybersectools.com/tools/mcp-gateway?ref=mandos.io">MCP Gateway</a></h3>
<p>NeuralTrust's security layer between AI agents and the tools they access, enforcing role-based access controls, tracking which LLMs invoke which tools, and preventing unauthorized tool use at sub-10ms latency. Relevant as Model Context Protocol adoption accelerates and organizations scramble to govern agentic AI infrastructure.</p>
<hr><p>Thank you for reading this week's brief.</p><p>Whenever you're ready, there are three ways I can help you:</p><p>Get your cybersecurity product in front of 15,000 cybersecurity professionals on <a href="https://cybersectools.com/promote?ref=mandos.io">CybersecTools</a>.</p><p>Position your product to sell to CISOs correctly. <a href="https://cybersectools.com/advisory?ref=mandos.io">Positioning Advisory</a>.</p><p>Get deep market intelligence on your company, competitors and the whole industry. <a href="https://cybersecradars.com/?ref=mandos.io">Sign Up for Waitlist</a>.</p><p>Talk to you in the next one.</p><p>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #143: Check Point Spends $340M on Four Acquisitions in 60 Days ]]></title>
        <description><![CDATA[ Check Point just dropped $150 million on three Israeli startups in a single earnings call. That&#39;s on top of the $190 million Lakera AI deal two months ago. ]]></description>
        <link>https://mandos.io/newsletter/brief-143-check-point-spends-340m-on-four-acquisitions-in-60-days/</link>
        <guid isPermaLink="false">6991b14f223edc0914a846de</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 15 Feb 2026 17:00:31 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/02/7.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Check Point just dropped $150 million on three Israeli startups in a single earnings call. That's on top of the $190 million Lakera AI deal two months ago. Four acquisitions, $340 million, and a clear signal: the legacy firewall giant is trying to buy its way into the AI security and exposure management categories before the window closes.</p><p>Meanwhile, Proofpoint, Zscaler, and CrowdStrike all made AI-adjacent acquisitions this same week. The land grab for agentic AI security is on.</p><p><strong>Top 3 This Week</strong></p><ul><li><strong>BeyondTrust CVSS 9.9 flaw exploited within 24 hours of PoC release</strong> - One threat actor is behind 83% of attacks, and CISA added it to the KEV catalog on the same day</li><li><strong>Claude Opus 4.6 discovers 500+ zero-day vulnerabilities in open source projects</strong> - Anthropic's newest model found high-severity bugs in codebases that survived decades of automated testing, forcing a rethink of disclosure timelines</li><li><strong>Check Point spends $340M on four acquisitions in 60 days</strong> - AI security, exposure management, and MSP workspace all targeted as the legacy firewall giant tries to buy its next chapter</li></ul><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Industry-News-1.png" style="background-image: url(https://mandos.io/content/images/2024/09/Industry-News-1.png)"><h2 class="kg-header-card-header" id="threats"><span style="white-space: pre-wrap;">Threats</span></h2></div><h3 id="beyondtrust-vulnerability-exploited-within-24-hours-of-poc-release"><a href="https://www.securityweek.com/beyondtrust-vulnerability-targeted-by-hackers-within-24-hours-of-poc-release/?ref=mandos.io">BeyondTrust Vulnerability Exploited Within 24 Hours of PoC Release</a></h3>
<ul>
<li>Attackers began exploiting <strong>CVE-2026-1731</strong>, a critical CVSS 9.9 vulnerability in BeyondTrust Remote Support and Privileged Remote Access, within hours of a proof-of-concept becoming available.</li>
<li>A single threat actor is responsible for <strong>83%</strong> of all observed exploitation attempts against recent Ivanti and BeyondTrust vulnerabilities, suggesting a highly organized operation focused on remote access infrastructure.</li>
<li><strong>CISA</strong> added the flaw to its Known Exploited Vulnerabilities catalog on the same day, requiring federal agencies to patch immediately.</li>
</ul>
<p><strong>Why this matters:</strong><br>
Remote access tools sit at the trust boundary of enterprise networks. When a CVSS 9.9 goes from PoC to active exploitation in under 24 hours, your patch SLA is the only thing between you and compromise. If your remote access infrastructure isn't on a 24-hour emergency patch cycle, it should be.</p>
<hr>
<h3 id="300-malicious-chrome-extensions-caught-stealing-data-from-37-million-users"><a href="https://www.securityweek.com/over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data/?ref=mandos.io">300+ Malicious Chrome Extensions Caught Stealing Data from 37 Million Users</a></h3>
<ul>
<li>Researchers identified over <strong>300 malicious Chrome extensions</strong> with a combined 37 million installations that disguised themselves as AI assistants, ad blockers, and productivity tools while harvesting browsing history, credentials, and session tokens.</li>
<li>The extensions used <strong>injected iframes</strong> and background scripts to hijack accounts on platforms including VKontakte, steal API keys from emails, and exfiltrate business data, with some specifically targeting enterprise users.</li>
<li>Google has begun removing the extensions from the Chrome Web Store, but the scale of the campaign, spanning at least <strong>30 distinct malware families</strong>, points to a coordinated ecosystem rather than isolated incidents.</li>
</ul>
<p><strong>Why this matters:</strong><br>
Browser extensions operate with broad permissions that most users never review. For security teams, this is a reminder that extension governance belongs in your endpoint policy, not just your IT hygiene checklist. Block unsigned extensions, whitelist what you need, and audit the rest.</p>
<hr>
<h3 id="dutch-carrier-odido-discloses-data-breach-impacting-62-million-customers"><a href="https://www.securityweek.com/dutch-carrier-odido-discloses-data-breach-impacting-6-million/?ref=mandos.io">Dutch Carrier Odido Discloses Data Breach Impacting 6.2 Million Customers</a></h3>
<ul>
<li>Netherlands-based telecom provider <strong>Odido</strong> (formerly T-Mobile Netherlands) confirmed a breach of its contact management system exposing personal data of 6.2 million customers, including names, addresses, phone numbers, and dates of birth.</li>
<li>The breach did not involve financial data or passwords, but the volume of exposed <strong>PII</strong> creates significant phishing and social engineering risk for affected customers across the Netherlands.</li>
<li>Dutch regulators are investigating. Odido has notified affected customers and implemented additional access controls on the compromised system.</li>
</ul>
<p><strong>Why this matters:</strong><br>
6.2 million records in a country of 17 million means roughly one in three Dutch residents is affected. For CISOs operating in the EU, this is another data point for board conversations about the real cost of contact system security and GDPR exposure.</p>

<!--kg-card-begin: html-->
<div data-gh-paywall=""></div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Leadership-Insights.png" style="background-image: url(https://mandos.io/content/images/2024/09/Leadership-Insights.png)"><h2 class="kg-header-card-header" id="ciso-lens"><span style="white-space: pre-wrap;">CISO Lens</span></h2></div><h3 id="cisa-set-to-furlough-most-of-its-workforce-under-dhs-shutdown"><a href="https://www.nextgov.com/cybersecurity/2026/02/cisa-furlough-most-its-workforce-under-impending-dhs-shutdown/411424/?ref=mandos.io">CISA Set to Furlough Most of Its Workforce Under DHS Shutdown</a></h3>
<ul>
<li>The Cybersecurity and Infrastructure Security Agency is preparing to <strong>furlough the majority</strong> of its staff if the Department of Homeland Security faces a government shutdown, leaving critical cybersecurity coordination functions severely understaffed.</li>
<li>Essential functions like active incident response and critical infrastructure protection would continue with a skeleton crew, but proactive programs including <strong>vulnerability disclosure</strong>, threat intelligence sharing, and security assessments would halt.</li>
<li>The timing is particularly concerning given active exploitation of multiple critical vulnerabilities and ongoing <strong>nation-state</strong> campaigns targeting federal and critical infrastructure networks.</li>
</ul>
<p><strong>What this means:</strong><br>
Whether or not the shutdown happens, the fact that federal cybersecurity coordination hinges on funding negotiations should concern every CISO in critical infrastructure. If you rely on CISA advisories, KEV catalog updates, or their incident coordination, have a backup plan. Diversify your threat intelligence sources now, not when the lights go off.</p>
<hr>
<h3 id="munich-security-conference-cyber-threats-lead-g7-risk-index"><a href="https://www.infosecurity-magazine.com/news/munich-security-index-cyberattacks/?ref=mandos.io">Munich Security Conference: Cyber Threats Lead G7 Risk Index</a></h3>
<ul>
<li>The 2026 Munich Security Index ranks <strong>cyberattacks as the top risk</strong> across all G7 nations, overtaking traditional geopolitical threats for the first time in the index's history.</li>
<li>The report highlights that <strong>state-backed actors</strong> from China, Iran, Russia, and North Korea are running coordinated operations against defense industrial base targets, with Google's threat intelligence group documenting linked campaigns across multiple sectors.</li>
<li>EU officials used the conference to warn that adversaries are rehearsing <strong>digital sieges</strong> against critical infrastructure, with Taiwan specifically flagging Chinese rehearsal operations.</li>
</ul>
<p><strong>What this means:</strong><br>
Cyber risk at the top of the G7 index isn't just an academic ranking. It changes how boards think about security investment. If your executive team still treats cybersecurity as an IT cost center, this is the external validation to reframe it as enterprise risk management.</p>
<hr>
<h3 id="cyberark-survey-reveals-75-of-organizations-overconfident-in-privilege-management"><a href="https://drive.google.com/file/d/1gYGGs9_0-y2Tz-sKDdgJgGYjsEMnNNB9/view?usp=share_link&ref=mandos.io">CyberArk Survey Reveals 75% of Organizations Overconfident in Privilege Management</a></h3>
<ul>
<li>75% of organizations believe they're <strong>future-ready</strong> but continue relying on outdated privilege models, with 91% still using standing privileged access and 99% failing to eliminate it entirely.</li>
<li><strong>Shadow privilege</strong> remains a persistent problem with 54% of organizations discovering unmanaged privileged accounts weekly, while 88% use multiple identity platforms creating operational blind spots.</li>
<li>Only 33% of organizations have established policies for <strong>AI identities</strong> or AI agent access, highlighting a critical governance gap as artificial intelligence adoption accelerates across enterprises.</li>
</ul>
<p><strong>What this means:</strong><br>
The gap between confidence and reality in privilege management is a red flag for every security program. Standing access is the gift that keeps giving to attackers, and the AI identity gap is about to get worse. If your PAM strategy doesn't account for non-human identities and AI agents, you're building your access model on assumptions that expired six months ago.</p>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/AI---Security.png" style="background-image: url(https://mandos.io/content/images/2024/09/AI---Security.png)"><h2 class="kg-header-card-header" id="ai-amp-security"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2></div><h3 id="claude-opus-46-discovers-500-zero-day-vulnerabilities-in-open-source-projects"><a href="https://red.anthropic.com/2026/zero-days/?ref=mandos.io">Claude Opus 4.6 Discovers 500+ Zero-Day Vulnerabilities in Open Source Projects</a></h3>
<ul>
<li>Anthropic's new <strong>Claude Opus 4.6</strong> model found over 500 high-severity vulnerabilities in well-tested open source codebases without specialized tooling, using human-like reasoning to analyze Git commit histories and identify patterns rather than traditional <strong>fuzzing</strong> methods.</li>
<li>The AI model successfully discovered <strong>zero-day</strong> vulnerabilities in projects like GhostScript, OpenSC, and CGIF that had remained undetected for decades despite millions of hours of automated testing, demonstrating superior analysis capabilities for complex <strong>memory corruption</strong> issues.</li>
<li>Anthropic has implemented new cyber-specific detection probes and enforcement workflows to prevent misuse while contributing validated patches to maintainers, warning that existing 90-day disclosure windows may need adjustment for the speed and volume of AI-discovered bugs.</li>
</ul>
<p><strong>The implication:</strong><br>
The offensive-defensive balance just shifted. If one AI model can find 500+ zero-days in mature codebases, the question isn't whether attackers will use similar capabilities. They already are. The 90-day disclosure window was designed for human researchers finding bugs one at a time. When AI finds them by the hundreds, the entire coordinated disclosure framework needs rethinking.</p>
<hr>
<h3 id="claude-ai-artifacts-abused-to-push-mac-infostealers-via-clickfix-attacks"><a href="https://www.bleepingcomputer.com/news/security/claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack/?ref=mandos.io">Claude AI Artifacts Abused to Push Mac Infostealers via ClickFix Attacks</a></h3>
<ul>
<li>Threat actors are using <strong>Anthropic's Claude</strong> to generate malicious web pages through the Artifacts feature, then promoting these pages via Google Ads to target macOS users with infostealer malware.</li>
<li>The attack chain uses <strong>ClickFix</strong> social engineering, tricking users into copying and executing terminal commands that download and install credential-stealing malware on their machines.</li>
<li>This represents a new abuse vector where legitimate <strong>AI coding tools</strong> are weaponized to rapidly generate convincing phishing infrastructure at scale, lowering the barrier for creating targeted attack campaigns.</li>
</ul>
<p><strong>The implication:</strong><br>
AI tools are becoming infrastructure for attackers, not just targets. The speed at which threat actors can generate convincing malicious pages using legitimate AI platforms means traditional URL reputation and blocklist approaches will fall further behind. Behavioral detection at the endpoint is becoming the critical last line.</p>
<hr>
<h3 id="ai-agents-solve-9-of-10-web-hacking-challenges-but-struggle-with-broad-scope-testing"><a href="https://www.wiz.io/blog/ai-agents-vs-humans-who-wins-at-web-hacking-in-2026?ref=mandos.io">AI Agents Solve 9 of 10 Web Hacking Challenges but Struggle with Broad Scope Testing</a></h3>
<ul>
<li><strong>Claude Sonnet</strong> 4.5, GPT-5, and Gemini 2.5 Pro successfully exploited vulnerabilities including authentication bypass, <strong>SSRF</strong>, stored <strong>XSS</strong>, and S3 bucket takeovers with costs under $10 per successful attack when given specific targets.</li>
<li>The AI models failed to solve challenges requiring <strong>enumeration</strong> tools or creative pivoting, such as finding exposed secrets in GitHub repositories, demonstrating limitations in strategic thinking compared to human testers.</li>
<li>Performance degraded significantly in <strong>broad scope</strong> scenarios where agents had to independently prioritize targets, with costs increasing 2-2.5 times and fewer challenges solved due to inefficient resource allocation across multiple attack surfaces.</li>
</ul>
<p><strong>The implication:</strong><br>
AI agents are already effective at targeted exploitation but can't replace human pentesters for strategic thinking. The cost curve is what matters here: under $10 per successful exploit means automated vulnerability scanning at scale is becoming trivially cheap. Security teams should assume that every known vulnerability class will be tested against their infrastructure continuously and affordably.</p>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/Market-Analysis.png" style="background-image: url(https://mandos.io/content/images/2024/09/Market-Analysis.png)"><h2 class="kg-header-card-header" id="market-intelligence"><span style="white-space: pre-wrap;">Market Intelligence</span></h2></div><h3 id="check-point-acquires-three-israeli-startups-for-150m-alongside-strong-earnings"><a href="https://www.securityweek.com/check-point-announces-trio-of-acquisitions-amid-solid-2025-earnings-beat/?ref=mandos.io">Check Point Acquires Three Israeli Startups for $150M Alongside Strong Earnings</a></h3>
<ul>
<li><strong>Check Point</strong> acquired Cyata (AI agent security), Cyclops (exposure management, $85M), and Rotate (MSP workspace) for a combined ~$150 million, adding to the $190 million Lakera AI acquisition from Q4 2025.</li>
<li>Q4 2025 results showed <strong>$745 million</strong> in revenue (up 6% YoY), with security subscription revenue growing 11% to $325 million and non-GAAP EPS beating estimates at $3.40 versus $2.77 consensus.</li>
<li>CEO Nadav Zafrir outlined four strategic pillars for 2026: hybrid mesh, workspace, <strong>exposure management</strong>, and AI security, with the acquisitions expected to cause ~0.5 points of operating margin dilution.</li>
</ul>
<p><strong>The signal:</strong><br>
Four acquisitions totaling $340M in 60 days tells you where Check Point thinks the growth is: AI security and CTEM. The Cyclops deal at $85M for a company with ~$6.4M in funding is a 13x return for early investors. For cybersecurity startups in exposure management or AI governance, the acquisition market is hot. For Check Point investors, the question is whether buying growth works when organic revenue growth is only 6%.</p>
<hr>
<h3 id="zscaler-acquires-squarex-for-browser-native-zero-trust-security"><a href="https://www.securityweek.com/zscaler-acquires-browser-security-firm-squarex/amp/?ref=mandos.io">Zscaler Acquires SquareX for Browser-Native Zero Trust Security</a></h3>
<ul>
<li><strong>Zscaler</strong> acquired browser security firm SquareX to extend Zero Trust protection directly into standard browsers like Chrome and Edge, eliminating the need for third-party enterprise browsers.</li>
<li>SquareX's "Browser Detection and Response" technology runs as a lightweight extension that detects malicious extensions, enforces <strong>least-privilege</strong> application access, and prevents data leakage from generative AI tools.</li>
<li>The deal comes days after <strong>CrowdStrike</strong> announced its acquisition of Seraphic for similar browser security capabilities, signaling a competitive rush into the secure browser category.</li>
</ul>
<p><strong>The signal:</strong><br>
Gartner projects 25% of enterprises will use secure enterprise browsers by 2028. But the market is splitting: standalone browser companies like Island versus platform players like Zscaler and CrowdStrike acquiring their way in. Platform integration usually wins in enterprise. The standalone browser companies need to move fast or get absorbed.</p>
<hr>
<h3 id="proofpoint-acquires-acuvity-to-secure-the-agentic-workspace"><a href="https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-acquires-acuvity-deliver-ai-security-and-governance-across?ref=mandos.io">Proofpoint Acquires Acuvity to Secure the Agentic Workspace</a></h3>
<ul>
<li><strong>Proofpoint</strong> acquired Acuvity, an AI security startup focused on visibility and governance for enterprise AI usage, including monitoring how employees and autonomous agents interact with external AI services and internal models.</li>
<li>Acuvity's platform covers the full range of AI infrastructure from endpoints and browsers to <strong>Model Context Protocol (MCP)</strong> servers and locally installed AI tools, providing detection models that understand context and intent rather than just pattern matching.</li>
<li>Proofpoint's CSO Ryan Kalember framed the shift clearly: CISOs have moved from worrying about prompt injection to needing to understand <strong>what AI agents are actually doing</strong> across the organization.</li>
</ul>
<p><strong>The signal:</strong><br>
This is the third major AI security acquisition this week alongside Check Point's Cyata deal and Zscaler's SquareX buy. The message from enterprise security platforms is clear: AI governance is no longer a feature request, it's an acquisition target. The shadow AI problem just became a board-level priority, and the startups building visibility into agentic behavior are getting acquired before they can scale independently.</p>
<div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-image" data-kg-background-image="https://mandos.io/content/images/2024/09/TOOLS.png" style="background-image: url(https://mandos.io/content/images/2024/09/TOOLS.png)"><h2 class="kg-header-card-header" id="security-stack"><span style="white-space: pre-wrap;">Security Stack</span></h2></div><h3 id="squarex-browser-detection-and-response"><a href="https://cybersectools.com/tools/squarex-browser-detection-and-response-bdr?ref=mandos.io">SquareX Browser Detection and Response</a></h3>
<p>Browser-native security extension that detects malicious extensions, prevents AI data leakage, and enforces Zero Trust policies directly in Chrome and Edge. Relevant this week as Zscaler acquired SquareX to extend its platform into browser security.</p>
<h3 id="menlo-security-secure-enterprise-browser"><a href="https://cybersectools.com/tools/admin-menlo-security-secure-enterprise-browser?ref=mandos.io">Menlo Security Secure Enterprise Browser</a></h3>
<p>Cloud-based secure browser platform that isolates web content and applies DLP controls. With Zscaler and CrowdStrike both acquiring browser security companies this week, the secure browser category is consolidating fast.</p>
<h3 id="testsavant-ai-security-assurance-platform"><a href="https://cybersectools.com/tools/testsavant-ai-security-assurance-platform?ref=mandos.io">TestSavant AI Security Assurance Platform</a></h3>
<p>AI model testing and security assurance platform for organizations deploying machine learning in production. Relevant as Proofpoint's Acuvity acquisition and Check Point's Cyata deal signal growing enterprise demand for AI governance tooling.</p>
<hr><p>The M&amp;A pace in cybersecurity is accelerating, and the categories getting acquired tell you where the market is heading: AI security, browser security, and exposure management. If you're building in or buying from these categories, the landscape is shifting under your feet.</p><p>For cybersecurity companies: track your competitive landscape across 10,000+ products on <a href="https://cybersectools.com/?ref=mandos.io">CybersecTools</a>.</p><p>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #142: VMware ESXi Ransomware Exploit, GPT-4o Prompt Injection, Mesh Security&#x27;s $12M Raise ]]></title>
        <description><![CDATA[ 77% of advanced email threats bypass Microsoft E3/E5 defenses. LLMjacking marketplace sells stolen AI access at 60% discount. ]]></description>
        <link>https://mandos.io/newsletter/brief-142-vmware-esxi-ransomware-exploit-gpt-4o-prompt-injection-mesh-securitys-12m-raise/</link>
        <guid isPermaLink="false">698893d6223edc0914a838c4</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 08 Feb 2026 17:00:39 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/02/6.png" medium="image"/>
        <content:encoded><![CDATA[ <p><strong>Welcome to the Mandos Brief: Strategic insights to help you stay ahead of threats and the market.</strong></p><p>In this week's analysis:</p><ul><li><strong>VMware ESXi Ransomware Exploitation:</strong>&nbsp;CISA confirmed ransomware gangs are actively exploiting a high-severity ESXi sandbox escape flaw that's been a zero-day since at least February 2024.&nbsp;<strong>Action</strong>: If you haven't patched CVE-2025-22225 across ESXi, Fusion, and Cloud Foundation, treat this as your top priority this week - attackers already have a head start.</li><li><strong>Near-Perfect Prompt Injection Attacks on LLMs:</strong>&nbsp;Researchers showed that black-box prompt injection can achieve near-100% malicious content retrieval across major embedding models, coercing GPT-4o into exfiltrating SSH keys for as little as $0.21 per query.&nbsp;<strong>So What</strong>: If you're deploying RAG or multi-agent systems in production, existing defenses are not enough - start evaluating retrieval-layer controls and assume this attack surface will only grow.</li><li><strong>Indurex Launches for Cyber-Physical Security:</strong>&nbsp;A new startup from the former Applied Risk founder emerged from stealth with a platform unifying cyber, process, and safety context for industrial environments.&nbsp;<strong>Strategy</strong>: For security vendors eyeing OT and critical infrastructure, this signals growing demand for converged visibility platforms - fragmented tooling in these environments is becoming a real market gap to fill.</li></ul><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="threats" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Threats</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisa-confirms-vmware-esxi-vulnerability-exploited-in-ransomware-attacks"><a href="https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/?ref=mandos.io">CISA Confirms VMware ESXi Vulnerability Exploited In Ransomware Attacks</a></h3>
<ul>
<li>
<p>I've confirmed that <strong>ransomware</strong> gangs are now actively exploiting CVE-2025-22225, a high-severity VMware ESXi <strong>sandbox</strong> escape vulnerability that has been used in zero-day attacks since at least February 2024.</p>
</li>
<li>
<p>The vulnerability allows attackers with privileged access to trigger an arbitrary kernel write leading to sandbox escape, affecting multiple VMware products including ESXi, Fusion, Cloud Foundation, and <strong>vSphere</strong>.</p>
</li>
<li>
<p><strong>CISA</strong> has updated its Known Exploited Vulnerabilities catalog to specifically flag this flaw as being used in ransomware campaigns, though federal agencies were already required to patch by March 25, 2025 under BOD 22-01.</p>
</li>
</ul>
<h3 id="openclaw-integrates-virustotal-scanning-to-detect-malicious-clawhub-skills"><a href="https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html?ref=mandos.io">OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills</a></h3>
<ul>
<li>
<p>OpenClaw has partnered with Google-owned <strong>VirusTotal</strong> to scan all skills uploaded to ClawHub marketplace using SHA-256 hashes and Code Insight capability, automatically approving benign skills while flagging suspicious ones and blocking malicious content.</p>
</li>
<li>
<p>Recent security research has uncovered hundreds of <strong>malicious</strong> skills on ClawHub that masquerade as legitimate tools but harbor functionality to exfiltrate data, inject backdoors, or install stealer malware through cleverly concealed prompt injection payloads.</p>
</li>
<li>
<p>The platform faces significant security challenges including cleartext credential storage, ineffective guardrails against <strong>prompt</strong> injection attacks, and over 30,000 exposed instances accessible over the internet, prompting China's Ministry of Industry and Information Technology to issue security warnings.</p>
</li>
</ul>
<h3 id="rapid7-discovers-chrysalis-backdoor-used-by-lotus-blossom-apt"><a href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/?ref=mandos.io">Rapid7 Discovers Chrysalis Backdoor Used by Lotus Blossom APT</a></h3>
<ul>
<li>
<p>Rapid7 uncovered a sophisticated campaign by Chinese <strong>APT</strong> group Lotus Blossom that compromised Notepad++ infrastructure to deliver a previously unknown custom backdoor called Chrysalis, which features extensive command and control capabilities including file transfer, remote shell access, and comprehensive system reconnaissance.</p>
</li>
<li>
<p>The attack chain leverages <strong>DLL sideloading</strong> using a renamed Bitdefender Submission Wizard to load malicious log.dll, which then decrypts and executes shellcode that deploys the main Chrysalis backdoor with <strong>RC4</strong> encryption and custom API hashing to evade detection.</p>
</li>
<li>
<p>Additional forensic analysis revealed the threat actors also deployed <strong>Cobalt Strike</strong> beacons through multiple loader variants, including one that abuses Microsoft Warbird code protection framework via undocumented <strong>NtQuerySystemInformation</strong> system calls for stealthy shellcode execution.</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="action1-releases-2025-2026-education-cybersecurity-report-showing-declining-confidence-despite-increased-investment"><a href="https://drive.google.com/file/d/1YkY430s8LKUIlK8Vdcee7zechI-XMNDH/view?usp=drivesdk&ref=mandos.io">Action1 Releases 2025-2026 Education Cybersecurity Report Showing Declining Confidence Despite Increased Investment</a></h3>
<ul>
<li>
<p>School IT leaders are reassessing their cybersecurity readiness more realistically, with 66% rating their maturity as moderate while confidence in being highly prepared dropped from 30% to 18%, reflecting better understanding of today's complex <strong>threat</strong> landscape.</p>
</li>
<li>
<p>Nearly 89% of schools experienced at least one cyber incident in the past year, with <strong>phishing</strong> attacks being the most common (84%), followed by malware infections (22%) and unauthorized access (15%), while only 3% reported <strong>ransomware</strong> incidents.</p>
</li>
<li>
<p>Despite 38% of schools increasing cybersecurity budgets and more allocating 21-30% of IT spending to security, 74% still operate without a dedicated cybersecurity specialist and 92% expect <strong>AI-powered</strong> phishing to be the most dangerous threat in the coming year.</p>
</li>
</ul>
<h3 id="strongestlayer-report-shows-2042-advanced-email-threats-bypassed-microsoft-e3e5-and-leading-segs"><a href="https://drive.google.com/file/d/1QVqbFCNaOOIvRCTlOtkvxDBw4ieuP1Ox/view?usp=drivesdk&ref=mandos.io">StrongestLayer Report Shows 2,042 Advanced Email Threats Bypassed Microsoft E3/E5 and Leading SEGs</a></h3>
<ul>
<li>
<p>Analysis of Q3-Q4 2025 threats reveals that 77% of attacks <strong>impersonated</strong> business-critical brands like DocuSign, Microsoft, and Google Calendar, exploiting platforms too operationally critical to block without halting business operations.</p>
</li>
<li>
<p>Despite 77% of attacks having failed <strong>authentication</strong> (SPF/DKIM/DMARC), they still reached inboxes due to DMARC enforcement gaps, while 17 attacks that passed all authentication checks prove that validation confirms infrastructure origin, not malicious intent.</p>
</li>
<li>
<p>Approximately 45% of sophisticated attacks showed <strong>AI-assistance</strong> markers with projections reaching 75-95% within 18 months, creating unique variants that share only 12-18% similarity and bypass traditional <strong>pattern-matching</strong> detection methods.</p>
</li>
</ul>
<h3 id="netskope-cloud-and-threat-report-2026-reveals-major-cybersecurity-trends"><a href="https://www.netskope.com/resources/cloud-and-threat-reports/cloud-and-threat-report-2026?ref=mandos.io">Netskope Cloud and Threat Report: 2026 Reveals Major Cybersecurity Trends</a></h3>
<ul>
<li>
<p>The report reveals a massive surge in <strong>generative AI</strong> usage, with the number of users tripling and data prompts to AI apps increasing sixfold, while data policy violations doubled to an average of 223 incidents per month as employees send sensitive source code, regulated data, and intellectual property to AI platforms.</p>
</li>
<li>
<p><strong>Personal cloud apps</strong> continue to pose significant insider threat risks, with 60% of insider threat incidents involving personal app instances and 31% of users uploading data to these platforms monthly, representing more than double the number interacting with AI apps.</p>
</li>
<li>
<p>Despite improvements in user awareness, <strong>phishing</strong> remains persistent with 87 out of every 10,000 users clicking malicious links monthly, while attackers increasingly abuse trusted channels like GitHub, OneDrive, and Google Drive to distribute <strong>malware</strong> to organizations.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="researchers-develop-black-box-attack-method-that-achieves-near-perfect-retrieval-of-malicious-content-in-llm-systems"><a href="https://drive.google.com/file/d/15jSV_R9T-UWh87dRde7jAy3KO6DT2i9Y/view?usp=share_link&ref=mandos.io">Researchers Develop Black-Box Attack Method That Achieves Near-Perfect Retrieval of Malicious Content in LLM Systems</a></h3>
<ul>
<li>
<p>Researchers demonstrated that <strong>indirect prompt injection</strong> attacks can achieve near-100% retrieval rates across 11 benchmarks and 8 embedding models by decomposing malicious content into trigger and attack fragments, with a single poisoned email successfully coercing <strong>GPT-4o</strong> into exfiltrating SSH keys in over 80% of trials.</p>
</li>
<li>
<p>The attack uses a <strong>black-box</strong> optimization algorithm requiring only API access to embedding models, costs as little as $0.21 per target query on OpenAI's embedding models, and works across both <strong>RAG</strong> and multi-agent systems without requiring knowledge of corpus contents or model parameters.</p>
</li>
<li>
<p>Evaluation of existing defenses found them insufficient to prevent retrieval of malicious text, with the vulnerability persisting across different model architectures, parameter scales, and proprietary services, establishing retrieval as a critical open <strong>vulnerability</strong> in LLM systems.</p>
</li>
</ul>
<h3 id="moltbot-ai-agent-raises-security-concerns-with-plain-text-storage-and-unrestricted-access"><a href="https://1password.com/blog/its-moltbot?ref=mandos.io">MoltBot AI Agent Raises Security Concerns With Plain Text Storage and Unrestricted Access</a></h3>
<ul>
<li>
<p>MoltBot, an open-source AI agent, stores sensitive data including <strong>API keys</strong>, memory files, and session logs in <strong>plain text</strong> files on local machines, making them easy targets for infostealers that scrape common directories.</p>
</li>
<li>
<p>The agent operates with deep system access and autonomous capabilities, creating security risks because traditional app security models break down when dealing with <strong>adaptive</strong> and non-deterministic AI behavior that changes over time.</p>
</li>
<li>
<p>1Password proposes a <strong>mediation</strong> layer approach where agents receive time-bound, revocable access through identity management rather than long-lived tokens, enabling continuous runtime access control and audit trails.</p>
</li>
</ul>
<h3 id="operation-bizarre-bazaar-first-attributed-llmjacking-campaign-with-commercial-marketplace-monetization"><a href="https://www.pillar.security/blog/operation-bizarre-bazaar-first-attributed-llmjacking-campaign-with-commercial-marketplace-monetization?ref=mandos.io">Operation Bizarre Bazaar: First Attributed LLMjacking Campaign with Commercial Marketplace Monetization</a></h3>
<ul>
<li>
<p>Pillar Security uncovered a systematic <strong>LLMjacking</strong> campaign targeting exposed AI infrastructure, capturing 35,000 attack sessions between December 2025 and January 2026 across three interconnected threat actors operating a complete criminal supply chain.</p>
</li>
<li>
<p>The operation involves a threat actor "Hecker" running silver.inc, a <strong>commercial marketplace</strong> that resells unauthorized access to 30+ LLM providers at 40-60% discounts while exploiting exposed Ollama instances, unauthenticated <strong>vLLM</strong> servers, and accessible MCP endpoints.</p>
</li>
<li>
<p>Organizations face risks beyond compute theft including <strong>data exfiltration</strong> from LLM context windows, lateral movement through compromised Model Context Protocol servers, and supply chain compromise affecting file systems, databases, and internal APIs.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-intelligence" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Intelligence</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="mesh-security-raises-12-million-for-csma-platform"><a href="https://www.securityweek.com/mesh-security-raises-12-million-for-csma-platform/?ref=mandos.io">Mesh Security Raises $12 Million for CSMA Platform</a></h3>
<ul>
<li>
<p>The <strong>Series A</strong> funding round was led by Lobby Capital, bringing Mesh Security's total funding to over $16 million since its 2022 founding.</p>
</li>
<li>
<p>Mesh's platform operationalizes <strong>CSMA</strong> by sitting above existing security stacks to unify fragmented tools into a single interoperable system without disrupting current investments.</p>
</li>
<li>
<p>The company will use the investment to advance <strong>autonomous</strong> agentic capabilities for cross-domain attack paths and scale sales and customer support operations.</p>
</li>
</ul>
<h3 id="aistrike-raises-7-million-in-seed-funding-for-ai-native-cyber-defense-platform"><a href="https://www.securityweek.com/aistrike-raises-7-million-in-seed-funding/?ref=mandos.io">AiStrike Raises $7 Million in Seed Funding for AI-Native Cyber Defense Platform</a></h3>
<ul>
<li>
<p>The <strong>startup</strong> secured $7 million in seed funding led by Blumberg Capital, with participation from Runtime Ventures, Oregon Venture Fund, and angel investors to scale its <strong>AI</strong>-native cyber defense platform.</p>
</li>
<li>
<p>AiStrike offers Agentic Cyber Defense-as-a-Service (ACDaaS) that unifies exposure analysis, <strong>threat</strong> intelligence, detection, investigation, and response using AI agents across the security operations lifecycle.</p>
</li>
<li>
<p>The platform uses a <strong>federated</strong> model designed to reduce latency and eliminate cost overhead while continuously hunting threats, analyzing risks, and driving preventive action before incidents occur.</p>
</li>
</ul>
<h3 id="indurex-emerges-from-stealth-to-close-security-gap-in-cyber-physical-systems"><a href="https://www.securityweek.com/indurex-emerges-from-stealth-to-close-security-gap-in-cyber-physical-systems/?ref=mandos.io">Indurex Emerges From Stealth to Close Security Gap in Cyber-Physical Systems</a></h3>
<ul>
<li>
<p>Netherlands-based startup Indurex has launched from stealth mode with an <strong>AI-powered</strong> platform that ingests and correlates data from multiple sources across the cyber-physical stack, focusing on industrial historians, instrumentation and asset management systems, and <strong>OT</strong> network data.</p>
</li>
<li>
<p>The company was founded by Jalal Bouhdada, former founder of industrial cybersecurity firm Applied Risk which was acquired by <strong>DNV</strong> in 2021, and is currently preparing a pre-seed <strong>funding</strong> round while remaining bootstrapped.</p>
</li>
<li>
<p>Indurex's platform unifies cyber, process, and safety context into a single operational view for <strong>utilities</strong>, energy operators, and data centers, using adaptive risk scoring to replace fragmented tools and reduce alert noise in critical infrastructure environments.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="security-stack" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Security Stack</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="onspring-omb-a-123-risk-controls-management"><a href="https://cybersectools.com/tools/onspring-omb-a-123-risk-and-controls-management?ref=mandos.io">Onspring OMB A-123 Risk &amp; Controls Management</a></h3>
<p>Federal agency GRC platform for OMB A-123 compliance and internal controls</p>
<h3 id="appomni-salesforce-security"><a href="https://cybersectools.com/tools/admin-appomni-salesforce-security?ref=mandos.io">AppOmni Salesforce Security</a></h3>
<p>SSPM solution for Salesforce security posture management and threat detection</p>
<h3 id="cayosoft-guardian-protector%E2%84%A2"><a href="https://cybersectools.com/tools/cayosoft-guardian-protectortm?ref=mandos.io">Cayosoft Guardian Protector™</a></h3>
<p>Hybrid AD and Entra ID mgmt, monitoring, and recovery platform</p>
<hr><p>Thank you for reading this week's brief.</p><p>If you found this brief valuable, please forward it to one peer who is currently building or securing a B2B startup.</p><p>I’m constantly refining this intelligence for you. Was this week's market analysis useful? </p><p>Just hit&nbsp;<strong>Reply</strong>&nbsp;and let me know, I read every message.</p><p><strong>P.S. Whenever you’re ready, there are two ways I can help you:</strong></p><ol><li><strong>Founders:</strong>&nbsp;Need a Fractional CISO to unblock enterprise deals or lead your cybersecurity maturity journey? <a href="https://cal.com/nikolozk/30min?ref=mandos.io" rel="noreferrer"><strong>Book a Discovery Call</strong></a></li><li><strong>Vendors:</strong>&nbsp;Want to get your product in front of 15k+ security researchers on CybersecTools?&nbsp;<a href="https://cybersectools.com/submit?ref=mandos.io" rel="noreferrer"><strong>Submit Your Product</strong></a></li></ol><p>Talk to you in the next one.</p><p><strong>Nikoloz</strong></p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #141: 65% Abandon Prevention Strategy, Gemini Calendar Injection, Nike Breach ]]></title>
        <description><![CDATA[ VS Code malware installs ScreenConnect RAT with Rust fallback mechanisms. AI cybercrime subscriptions start at $30/month enabling novice attackers. Automotive security market hits $28B by 2036. ]]></description>
        <link>https://mandos.io/newsletter/brief-141-65-abandon-prevention-strategy-gemini-calendar-injection-nike-breach/</link>
        <guid isPermaLink="false">697f2d7c4596a400010b604b</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 01 Feb 2026 15:00:48 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/02/5-1.png" medium="image"/>
        <content:encoded><![CDATA[ <p><strong>Welcome to the Mandos Brief: Strategic insights to help you stay ahead of threats and the market.</strong></p><p>In this week's analysis:</p><ul><li><strong>Phishing Gets Cloud-Native:</strong>&nbsp;Attackers are now using GitHub for scripts and Dropbox for malware delivery, making takedowns nearly impossible.&nbsp;<strong>Action</strong>: Enable Tamper Protection on all endpoints and monitor for suspicious PowerShell execution with GitHub/Dropbox traffic patterns.</li><li><strong>Prevention is Dead:</strong>&nbsp;65% of CISOs have shifted focus to cyber resilience as recovery strategies, with zero achieving same-day recovery from incidents.&nbsp;<strong>Strategy</strong>: Start building your incident response muscle memory now - downtime costs are becoming the primary business risk metric.</li><li><strong>$28B Automotive Security Gold Rush:</strong>&nbsp;UN regulations are forcing security into every vehicle layer, creating a massive market opportunity as cars become computers on wheels.&nbsp;<strong>Business Opportunity</strong>: Consider partnerships with established players like Infineon or VicOne who are consolidating this space through acquisitions.</li></ul><div class="kg-card kg-header-card kg-v2 kg-width-regular kg-style-accent" data-background-color="accent">
            
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="strategic-intelligence" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Strategic Intelligence</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="multi-stage-phishing-campaign-delivers-amnesia-rat-and-ransomware-via-github-and-dropbox"><a href="https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html?ref=mandos.io">Multi-Stage Phishing Campaign Delivers Amnesia RAT and Ransomware via GitHub and Dropbox</a></h3>
<ul>
<li>
<p>A sophisticated phishing campaign targeting Russian organizations leverages business-themed documents to deploy Amnesia RAT and ransomware while abusing <strong>defendnot</strong> to disable Microsoft Defender, and uses GitHub for script distribution and Dropbox for binary payloads to complicate takedown efforts and improve campaign resilience.</p>
</li>
<li>
<p>This attack demonstrates how adversaries achieve full system compromise without exploiting <strong>vulnerabilities</strong>, instead systematically abusing native Windows features, administrative tools, and policy enforcement mechanisms to disable endpoint defenses before deploying persistent surveillance tooling that steals credentials, cryptocurrency wallets, browser data, and enables remote control with real-time data exfiltration via Telegram.</p>
</li>
<li>
<p>Security teams should enable Tamper Protection on all endpoints to prevent unauthorized changes to Defender settings, monitor for suspicious Windows Security Center API calls and <strong>Registry</strong> modifications, implement application whitelisting to block unauthorized scripts, and establish detection rules for defendnot abuse patterns and unusual PowerShell execution with extended <strong>delays</strong> between stages.</p>
</li>
</ul>
<h3 id="fake-clawdbot-vs-code-extension-installs-screenconnect-rat"><a href="https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware?ref=mandos.io">Fake Clawdbot VS Code Extension Installs ScreenConnect RAT</a></h3>
<ul>
<li>
<p>Attackers published a malicious VS Code extension impersonating the popular Clawdbot AI assistant, automatically dropping weaponized <strong>ScreenConnect</strong> remote access software onto Windows machines every time VS Code starts.</p>
</li>
<li>
<p>The extension functions as a legitimate AI coding assistant while silently connecting infected machines to attacker-controlled infrastructure at meeting.bulletmailer[.]net:8041, using a <strong>trojan</strong> approach that avoids detection.</p>
</li>
<li>
<p>The attack includes multiple <strong>fallback</strong> mechanisms including a Rust-based DLL loader and Dropbox payload delivery, demonstrating sophisticated redundancy planning to ensure successful <strong>RAT</strong> deployment even if primary infrastructure fails.</p>
</li>
</ul>
<h3 id="nike-investigates-data-breach-after-extortion-gang-leaks-files"><a href="https://www.bleepingcomputer.com/news/security/nike-investigates-data-breach-after-extortion-gang-leaks-files/?ref=mandos.io">Nike Investigates Data Breach After Extortion Gang Leaks Files</a></h3>
<ul>
<li>
<p>Nike is investigating a potential <strong>data breach</strong> after an extortion group posted what appears to be stolen files from the company on their leak site.</p>
</li>
<li>
<p>The threat actors claimed to have accessed Nike's systems and are demanding payment to prevent further <strong>data leaks</strong> of sensitive corporate information.</p>
</li>
<li>
<p>Nike has not yet confirmed the authenticity of the leaked files or disclosed the full scope of the potential <strong>breach</strong>, while security researchers analyze the posted evidence.</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular kg-style-accent" data-background-color="accent">
            
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisos-shift-focus-from-prevention-to-cyber-resilience-as-downtime-costs-soar"><a href="https://drive.google.com/file/d/1q1Dm_LUKFNVILiwz9K-NNeWb6hQ77pdw/view?usp=drivesdk&ref=mandos.io">CISOs Shift Focus From Prevention to Cyber Resilience as Downtime Costs Soar</a></h3>
<ul>
<li>
<p>A survey of 750 <strong>CISOs</strong> reveals that 65% now prioritize cyber resilience over traditional prevention methods, with 72% confirming their role has evolved to include leading business continuity recovery following security incidents.</p>
</li>
<li>
<p>55% of organizations experienced a cyberattack or <strong>ransomware</strong> infection in the past 12 months that rendered endpoint devices inoperable, with not a single CISO able to achieve full recovery within one day.</p>
</li>
<li>
<p>The majority of CISOs (53%) expect their organizations to face significant and costly <strong>downtime</strong> in the next 12-18 months, with 59% expressing personal concern about job loss or legal liability from security incidents.</p>
</li>
</ul>
<h3 id="fastly-q3-2025-bot-traffic-report-reveals-financial-services-and-commerce-under-heavy-attack"><a href="https://drive.google.com/file/d/1_nh87IiTLqf_-llpGlRBb7QxPWbxKksv/view?usp=drivesdk&ref=mandos.io">Fastly Q3 2025 Bot Traffic Report Reveals Financial Services and Commerce Under Heavy Attack</a></h3>
<ul>
<li>
<p><strong>Headless bots</strong> heavily targeted transaction-heavy industries, with 89% of headless bot traffic focused on Financial Services (44%) and <strong>Commerce</strong> (45%) sectors, likely seeking to compromise accounts and scrape real-time pricing data.</p>
</li>
<li>
<p>Organizations are increasingly blocking <strong>AI crawlers</strong> and fetchers, with 4% of all wanted bot traffic being blocked as companies question whether these bots provide actual business value amid the shift from traditional SEO to generative engine optimization.</p>
</li>
<li>
<p><strong>Meta</strong> and ChatGPT dominate AI bot traffic, accounting for 60% of all AI crawler traffic and 68% of AI fetcher traffic respectively, while "Common Headless Automation" tools represent 94% of total headless bot activity across Fastly's 6.5 trillion monthly requests.</p>
</li>
</ul>
<h3 id="arkose-labs-q3-2025-threat-report-bot-attacks-surge-while-attack-automation-services-decline"><a href="https://drive.google.com/file/d/10NJkb8W3DCngfPxN4jY02OdpadlN2rfz/view?usp=drivesdk&ref=mandos.io">Arkose Labs Q3 2025 Threat Report: Bot Attacks Surge While Attack Automation Services Decline</a></h3>
<ul>
<li>
<p><strong>Bot</strong> attacks dominated Q3 with 79% of malicious traffic while <strong>fake account creation</strong> remained the leading attack type at 46% of all incidents, signaling a potential shift toward agentic AI deployment at scale.</p>
</li>
<li>
<p>Attack automation services declined 16% in volume but increased 6% in average attack size, while human-based <strong>fraud farm</strong> operations grew 24% quarter-over-quarter, indicating refined targeting strategies.</p>
</li>
<li>
<p><strong>Desktop</strong> devices continue to be preferred for attacks (68% vs 32% mobile) with 71% of attacks originating from <strong>Chrome</strong> browsers, while Brazil leads global attack origins excluding spoofed US traffic.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular kg-style-accent" data-background-color="accent">
            
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="researchers-exploit-google-gemini-using-calendar-invite-prompt-injection"><a href="https://www.miggo.io/post/weaponizing-calendar-invites-a-semantic-attack-on-google-gemini?ref=mandos.io">Researchers Exploit Google Gemini Using Calendar Invite Prompt Injection</a></h3>
<ul>
<li>
<p>Security researchers discovered a <strong>prompt injection</strong> vulnerability that allowed attackers to embed malicious instructions in calendar event descriptions, which Google Gemini would execute when users asked routine scheduling questions.</p>
</li>
<li>
<p>The attack chain involved creating a calendar invite with a hidden payload that instructed Gemini to summarize private meetings and <strong>exfiltrate</strong> this data by creating new calendar events visible to the attacker.</p>
</li>
<li>
<p>This vulnerability highlights a fundamental shift in application security where attacks are <strong>semantic</strong> rather than syntactic, making traditional pattern-based defenses ineffective against AI-powered <strong>authorization bypass</strong> exploits.</p>
</li>
</ul>
<h3 id="group-ib-report-reveals-ai-powered-cybercrime-economy-worth-millions"><a href="https://drive.google.com/file/d/1dN1vbP8N_LJnYNq2LQarycl6xf0O_9gy/view?usp=drivesdk&ref=mandos.io">Group-IB Report Reveals AI-Powered Cybercrime Economy Worth Millions</a></h3>
<ul>
<li>
<p>Dark web discussions about AI abuse have surged by <strong>371%</strong> between 2019-2025, with criminals now offering AI-powered tools like DarkLLMs and deepfake services for as little as $30 per month in subscription models that mirror legitimate SaaS businesses.</p>
</li>
<li>
<p>The report identifies cybercrime's "fifth wave" where AI has industrialized attacks by turning human skills like persuasion and coding into scalable services, enabling even <strong>novice</strong> actors to launch sophisticated campaigns that were previously limited to advanced threat groups.</p>
</li>
<li>
<p><strong>APT</strong> groups including APT28, APT35, and Lazarus are now integrating AI into their operations, while new attack vectors emerge including AI-generated synthetic identities that have infiltrated over 300 companies and caused $347 million in verified <strong>deepfake</strong> fraud losses.</p>
</li>
</ul>
<h3 id="multi-stage-phishing-campaign-targets-russia-with-amnesia-rat-and-ransomware"><a href="https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html?ref=mandos.io">Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware</a></h3>
<ul>
<li>
<p>A sophisticated <strong>phishing</strong> campaign is hitting Russian organizations with a multi-stage attack that deploys Amnesia RAT and ransomware, leveraging GitHub for scripts and Dropbox for binaries while abusing the defendnot tool to disable Microsoft Defender before deploying surveillance and destructive payloads.</p>
</li>
<li>
<p>This attack demonstrates how adversaries are weaponizing legitimate <strong>cloud services</strong> and open-source security tools to evade detection and complicate takedown efforts, with the campaign achieving full system compromise without exploiting any software vulnerabilities by systematically abusing native Windows features and policy enforcement mechanisms.</p>
</li>
<li>
<p>Security teams should enable <strong>Tamper Protection</strong> on endpoints to prevent unauthorized changes to Defender settings, monitor for suspicious API calls to Windows Security Center, implement application control policies to block unauthorized PowerShell execution, and establish behavioral detection rules for <strong>defendnot</strong> abuse and unusual GitHub/Dropbox traffic patterns from endpoints.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular kg-style-accent" data-background-color="accent">
            
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-intelligence" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Intelligence</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="automotive-cybersecurity-market-set-to-hit-28-billion-by-2036-as-regulators-and-sdvs-force-security-into-every-layer"><a href="https://finance.yahoo.com/news/automotive-cybersecurity-market-surpass-us-150400587.html?ref=mandos.io">Automotive Cybersecurity Market Set to Hit $28 Billion by 2036 as Regulators and SDVs Force Security Into Every Layer</a></h3>
<ul>
<li>
<p>The automotive cybersecurity market is projected to grow from $4.4 billion in 2026 to $28.1 billion by 2036 at a 20.4% CAGR, driven by <strong>mandatory</strong> UN R155/R156 regulations that transform vehicle security from optional to a type-approval requirement across Europe, Asia, and Latin America, while software-defined vehicles and OTA updates multiply attack surfaces across embedded ECUs, cloud platforms, and <strong>sensor</strong> fusion systems.</p>
</li>
<li>
<p>This isn't just about protecting cars anymore, it's about protecting entire ecosystems where tariffs are forcing localized secure hardware development in the US, high-profile cyber incidents are pushing adoption of in-vehicle and cloud-based SOCs, and OEMs must now secure everything from APIs to telematics as part of integrated <strong>defense</strong> strategies that cover the full vehicle lifecycle from design to decommissioning.</p>
</li>
<li>
<p>Consider evaluating partnerships with established players like Infineon, NXP, Argus, or VicOne who are actively consolidating the market through acquisitions and regional partnerships, assess whether your product roadmap addresses both <strong>regulatory</strong> compliance and the expanded attack surface of connected vehicles, and explore positioning around secure-by-design architectures that can serve both cost-conscious OEMs facing tariff pressures and premium manufacturers requiring end-to-end cybersecurity governance.</p>
</li>
</ul>
<h3 id="ex-palantir-engineer-raises-40m-for-cyber-startup-outtake-with-microsoft-ceo-backing"><a href="https://www.cnbc.com/2026/01/28/outtake-cyber-openai-ai-raise.html?ref=mandos.io">Ex-Palantir Engineer Raises $40M for Cyber Startup Outtake With Microsoft CEO Backing</a></h3>
<ul>
<li>
<p>Former <strong>Palantir</strong> engineer Alex Dhillon secured $40 million in Series B funding for Outtake, a cybersecurity startup that uses autonomous AI agents to detect and remove cyberthreats like <strong>phishing</strong> through email verification and other applications.</p>
</li>
<li>
<p>The funding round was led by <strong>Iconiq</strong> with participation from high-profile investors including Microsoft CEO Satya Nadella, Palo Alto Networks CEO Nikesh Arora, and Palantir CTO Shyam Sankar, demonstrating strong industry confidence in AI-driven cybersecurity solutions.</p>
</li>
<li>
<p>Outtake has achieved significant <strong>growth</strong> metrics including sixfold increase in annual recurring revenue year-over-year and scanning 20 million potential cyberattacks last year, with customers including OpenAI, AppLovin, and Bill Ackman's Pershing Square.</p>
</li>
</ul>
<h3 id="mesh-security-raises-12m-series-a-to-unify-fragmented-enterprise-cyber-tools"><a href="https://www.calcalistech.com/ctechnews/article/sjf1111sp8wx?ref=mandos.io">Mesh Security Raises $12M Series A to Unify Fragmented Enterprise Cyber Tools</a></h3>
<ul>
<li>
<p>Mesh Security secured <strong>$12 million</strong> in Series A funding led by Lobby Capital with participation from S Ventures (SentinelOne CVC) and Bright Pixel Capital, bringing total funding to $18 million since inception in 2022.</p>
</li>
<li>
<p>The platform addresses <strong>tool sprawl</strong> by unifying enterprise security tools across cloud, SaaS, and networks into a single operational system, eliminating fragmented security data and disjointed processes without vendor lock-in.</p>
</li>
<li>
<p>Founded by former offensive and defensive cloud security experts Netanel Azoulay (CEO) and Omri Haring (CTO), the company employs 25 people across <strong>Palo Alto</strong> headquarters and Israel R&amp;D center.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular kg-style-accent" data-background-color="accent">
            
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="security-stack" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Security Stack</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ionix-external-exposure-management"><a href="https://cybersectools.com/tools/ionix-external-exposure-management?ref=mandos.io">IONIX External Exposure Management</a></h3>
<p>External attack surface mgmt platform for discovering &amp; remediating exposures</p>
<h3 id="absolute-security-resilience"><a href="https://cybersectools.com/tools/absolute-security-resilience?ref=mandos.io">Absolute Security Resilience</a></h3>
<p>Firmware-embedded endpoint resilience platform for device recovery &amp; security</p>
<h3 id="vulnsign-dynamic-application-security-testing"><a href="https://cybersectools.com/tools/vulnsign-dynamic-application-security-testing?ref=mandos.io">VulnSign Dynamic Application Security Testing</a></h3>
<p>DAST tool for scanning web apps, microservices, and APIs for vulnerabilities</p>
<hr><p>Thank you for reading this week's brief.</p><p>If you found this brief valuable, please forward it to one peer who is currently building or securing a B2B startup.</p><p>I’m constantly refining this intelligence for you. Was this week's market analysis useful? </p><p>Just hit&nbsp;<strong>Reply</strong>&nbsp;and let me know, I read every message.</p><p><strong>P.S. Whenever you’re ready, there are two ways I can help you:</strong></p><ol><li><strong>Founders:</strong>&nbsp;Need a Fractional CISO to unblock enterprise deals or lead your cybersecurity maturity journey? <a href="https://cal.com/nikolozk/30min?ref=mandos.io" rel="noreferrer"><strong>Book a Discovery Call</strong></a></li><li><strong>Vendors:</strong>&nbsp;Want to get your product in front of 15k+ security researchers on CybersecTools?&nbsp;<a href="https://cybersectools.com/submit?ref=mandos.io" rel="noreferrer"><strong>Submit Your Product</strong></a></li></ol><p>Talk to you in the next one.</p><p><strong>Nikoloz</strong></p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #140: 6K Palo Alto Firewalls Exposed, $217K Email Breach Costs, Rapid7-ARMO Deal ]]></title>
        <description><![CDATA[ First AI-generated malware framework VoidLink built in under a week with rootkit capabilities. 50% of SMBs already breached while only 34% have incident response plans. FortiGate SSO exploits create persistence accounts. ]]></description>
        <link>https://mandos.io/newsletter/brief-140-6k-palo-alto-firewalls-exposed-217k-email-breach-costs-rapid7-armo-deal/</link>
        <guid isPermaLink="false">69760b3b6c4d970001d587e3</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 25 Jan 2026 15:00:02 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/01/4.png" medium="image"/>
        <content:encoded><![CDATA[ <p><strong>Welcome to the Mandos Brief: Strategic insights to help you stay ahead of threats and the market.</strong></p><p>In this week's brief:</p><ul><li><strong>Palo Alto Networks Emergency Patch:</strong>&nbsp;Critical DoS vulnerability allows attackers to force firewalls into maintenance mode, disabling protections entirely.&nbsp;<strong>Action</strong>: Patch immediately - 6,000 exposed systems are sitting ducks for coordinated attacks.</li><li><strong>Healthcare Email Certificate Crisis:</strong>&nbsp;4% of healthcare email connections use unverifiable certificates while cloud platforms prioritize delivery over security.&nbsp;<strong>Risk</strong>: Your PHI transmissions may be flying blind through compromised channels without you knowing it.</li><li><strong>Infoblox-Axur Acquisition:</strong>&nbsp;Security consolidation continues as network security meets external threat disruption.&nbsp;<strong>Strategy</strong>: The market is rewarding platform plays over point solutions - time to evaluate your integration roadmap.</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="strategic-intelligence" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Strategic Intelligence</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="palo-alto-networks-patches-high-severity-dos-bug-that-could-disable-firewall-protections"><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-dos-bug-letting-hackers-disable-firewalls/?ref=mandos.io">Palo Alto Networks Patches High-Severity DoS Bug That Could Disable Firewall Protections</a></h3>
<ul>
<li>
<p><strong>CVE-2026-0227</strong> allows unauthenticated attackers to trigger denial-of-service conditions that force next-generation firewalls running PAN-OS 10.1 or later into <strong>maintenance</strong> mode, effectively disabling firewall protections.</p>
</li>
<li>
<p>The vulnerability affects firewalls and <strong>Prisma</strong> Access configurations when GlobalProtect gateway or portal is enabled, with most cloud-based instances already patched and remaining customers scheduled for upgrades.</p>
</li>
<li>
<p>Security updates are available for all affected versions, while approximately <strong>6,000</strong> Palo Alto Networks firewalls remain exposed online according to Shadowserver tracking data.</p>
</li>
</ul>
<h3 id="healthcares-email-security-certificate-crisis-exposes-millions-of-phi-messages-to-risk"><a href="https://drive.google.com/file/d/16Hog2NaYYhj-XLQfUn2aEh9XY1dI4IOZ/view?usp=drivesdk&ref=mandos.io">Healthcare's Email Security Certificate Crisis Exposes Millions of PHI Messages to Risk</a></h3>
<ul>
<li>
<p>Paubox analysis of 803,378 healthcare email connections found that 4% went to servers with <strong>unverifiable</strong> certificates, including expired and self-signed certificates that cannot validate server identity.</p>
</li>
<li>
<p>Cloud email platforms like Microsoft 365 and Google Workspace prioritize <strong>deliverability</strong> over security by accepting invalid certificates and delivering messages anyway, creating hidden compliance gaps that organizations rarely detect.</p>
</li>
<li>
<p>Up to 19 million healthcare email addresses are at risk due to certificate failures across the vendor ecosystem, with <strong>business associates</strong> using outdated mail servers that present invalid certificates while handling <strong>PHI</strong> transmissions.</p>
</li>
</ul>
<h3 id="arctic-wolf-observes-malicious-configuration-changes-on-fortinet-fortigate-devices-via-sso-accounts"><a href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/?ref=mandos.io">Arctic Wolf Observes Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts</a></h3>
<ul>
<li>
<p>Arctic Wolf detected <strong>automated</strong> attacks starting January 15, 2026, where threat actors exploited SSO vulnerabilities to create persistence accounts, modify <strong>VPN</strong> configurations, and exfiltrate firewall configurations from FortiGate devices.</p>
</li>
<li>
<p>The attacks leverage malicious <strong>SSO</strong> logins using accounts like <a href="mailto:cloud-init@mail.io">cloud-init@mail.io</a> and <a href="mailto:cloud-noc@mail.io">cloud-noc@mail.io</a>, followed by immediate configuration downloads and creation of secondary admin accounts within seconds, indicating automated behavior.</p>
</li>
<li>
<p>This campaign appears related to the December 2025 <strong>FortiCloud</strong> SSO authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719), though it's unclear if current patches fully address this new threat activity.</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="guardz-2025-smb-cybersecurity-report-reveals-half-of-small-businesses-already-breached"><a href="https://drive.google.com/file/d/1cffBekCpLq0b9u8zFVfhxcdQS5OB_V4x/view?usp=drivesdk&ref=mandos.io">Guardz 2025 SMB Cybersecurity Report Reveals Half of Small Businesses Already Breached</a></h3>
<ul>
<li>
<p>Survey of 800 SMBs shows 50% have already experienced a <strong>cyber incident</strong>, with 61% believing future cyber risk will increase, while only 34% have a professionally built <strong>incident response</strong> plan in place.</p>
</li>
<li>
<p><strong>Human error</strong> remains the top vulnerability at 45% of identified weaknesses, followed by targeted cybercriminal attacks at 43% and outdated technologies at 42%, highlighting gaps that MSPs can address.</p>
</li>
<li>
<p>Organizations with formal incident response plans achieved an 80% success rate in avoiding major damage, demonstrating the critical value of preparation and creating opportunities for MSPs to provide <strong>AI-powered</strong> security services to overwhelmed SMBs.</p>
</li>
</ul>
<h3 id="barracuda-report-shows-78-of-organizations-experienced-email-security-breaches-in-past-year"><a href="https://drive.google.com/file/d/1gUJAKG5vL_E_xDKm-KVxBMVScKRxMIys/view?usp=drivesdk&ref=mandos.io">Barracuda Report Shows 78% of Organizations Experienced Email Security Breaches in Past Year</a></h3>
<ul>
<li>
<p><strong>Phishing</strong> attacks and business email compromise affected most victims, with 71% of email breach victims also experiencing <strong>ransomware</strong> attacks during the same period, highlighting the interconnected nature of email-based threats.</p>
</li>
<li>
<p>Organizations face average recovery costs of $217,068 per breach, with smaller companies (50-100 employees) paying disproportionately more at $1,946 per employee compared to $243 per employee for larger firms (1,000-2,000 employees).</p>
</li>
<li>
<p><strong>Advanced evasion techniques</strong> create the biggest obstacle to rapid incident response according to 47% of victims, while 44% cite lack of <strong>automated</strong> incident response capabilities as a major barrier to effective threat containment.</p>
</li>
</ul>
<h3 id="identity-security-outlook-2026-nhi-crisis-and-ai-adoption-gap"><a href="https://drive.google.com/file/d/1E7ZZwOeS7huFkneC8PxO7zZkzo-Z_qTH/view?usp=drivesdk&ref=mandos.io">Identity Security Outlook 2026: NHI Crisis and AI Adoption Gap</a></h3>
<ul>
<li>
<p>North American enterprises now manage <strong>machine-to-human</strong> identity ratios of at least 100:1, with some sectors reaching 500:1, while only 12% have automated lifecycle management creating a massive governance gap.</p>
</li>
<li>
<p>While 91% of organizations are piloting or using <strong>AI</strong> in IAM operations, only 7% have achieved organization-wide deployment, revealing a 22-point optimism gap between executive expectations and current outcomes.</p>
</li>
<li>
<p>76% of firms are consolidating or evaluating vendor unification to address <strong>fragmentation</strong> issues, with one in three organizations spending more time managing vendors than privileged users.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="1password-addresses-ai-development-security-risks-through-ide-integration"><a href="https://1password.com/blog/ai-is-changing-the-ide-with-1password-security-keeps-up?ref=mandos.io">1Password Addresses AI Development Security Risks Through IDE Integration</a></h3>
<ul>
<li>
<p>IDEsaster research identifies <strong>30+ vulnerabilities</strong> across AI-powered IDEs where <strong>prompt injection</strong> can manipulate agents to leak credentials through untrusted project content like documentation and configuration files.</p>
</li>
<li>
<p>AI-accelerated development creates expanded attack surfaces as <strong>credentials</strong> are often hardcoded into local files or exposed to language model context for convenience, turning speed gains into persistent security risks.</p>
</li>
<li>
<p>1Password's <strong>Cursor Hooks</strong> integration enforces just-in-time secret access where credentials remain in dedicated secret managers and are only injected at runtime after explicit user approval, maintaining developer velocity while preventing credential exposure.</p>
</li>
</ul>
<h3 id="google-gemini-prompt-injection-flaw-exposed-private-calendar-data-via-malicious-invites"><a href="https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html?m=1&ref=mandos.io">Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites</a></h3>
<ul>
<li>
<p>Researchers discovered a <strong>prompt injection</strong> vulnerability in Google Gemini that allowed attackers to bypass calendar privacy controls by embedding malicious natural language prompts within standard calendar invites.</p>
</li>
<li>
<p>When users asked Gemini innocuous questions about their schedule, the AI would parse the hidden prompt and create new calendar events containing <strong>exfiltrated</strong> private meeting data, which could then be accessed by attackers in enterprise environments.</p>
</li>
<li>
<p>The attack demonstrates how <strong>AI-native</strong> features can expand the attack surface, with vulnerabilities now existing in language and AI behavior rather than just traditional code, highlighting the need for organizations to audit AI workloads and <strong>authorization</strong> controls.</p>
</li>
</ul>
<h3 id="check-point-discovers-first-advanced-ai-generated-malware-framework-called-voidlink"><a href="https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/?ref=mandos.io">Check Point Discovers First Advanced AI-Generated Malware Framework Called VoidLink</a></h3>
<ul>
<li>
<p>Check Point Research documented VoidLink as the first evidence-based case of a sophisticated <strong>malware</strong> framework authored almost entirely by artificial intelligence, reaching functional status in under a week through <strong>Spec Driven Development</strong> methodology.</p>
</li>
<li>
<p>The framework employs advanced technologies including <strong>eBPF</strong> and LKM rootkits with dedicated modules for cloud enumeration and post-exploitation in container environments, demonstrating capabilities previously associated with well-resourced threat groups.</p>
</li>
<li>
<p><strong>OPSEC</strong> failures by the developer exposed development artifacts showing how a single individual used AI to plan, build, and iterate complex systems at unprecedented speed, normalizing high-complexity attacks that would typically require coordinated <strong>teams</strong>.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-intelligence" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Intelligence</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="rapid7-partners-with-armo-to-add-cloud-runtime-security-to-command-platform"><a href="https://www.globenewswire.com/news-release/2026/01/14/3218693/0/en/Rapid7-and-ARMO-Enable-Organizations-to-Stop-Cloud-Attacks-Earlier-with-Runtime-Security.html?ref=mandos.io">Rapid7 Partners with ARMO to Add Cloud Runtime Security to Command Platform</a></h3>
<ul>
<li>
<p>Rapid7 has announced a strategic partnership with ARMO to integrate <strong>Cloud Application Detection &amp; Response</strong> (CADR) capabilities into the Rapid7 Command Platform, providing real-time threat detection across cloud assets and workloads.</p>
</li>
<li>
<p>The integration enables security teams to detect active threats in real time, correlate <strong>runtime</strong> events with misconfigurations and vulnerabilities, and respond instantly by isolating compromised workloads or terminating malicious processes.</p>
</li>
<li>
<p>The new capability supports <strong>AWS</strong>, <strong>Azure</strong>, and multicloud environments as part of Exposure Command Ultimate, allowing organizations to move from reactive defense to preemptive response against modern cloud attacks.</p>
</li>
</ul>
<h3 id="infoblox-acquires-axur-to-expand-preemptive-security-against-external-threats"><a href="https://www.infoblox.com/news/news-events/press-releases/infoblox-expands-its-preemptive-security-offering-to-combat-brand-abuse-credential-exposure-and-external-threats-with-planned-acquisition-of-axur/?utm_medium=linkedin&utm_source=brandwatch">Infoblox Acquires Axur to Expand Preemptive Security Against External Threats</a></h3>
<ul>
<li>
<p>Infoblox plans to acquire Axur, a provider of <strong>AI-powered</strong> security solutions, to enhance its preemptive security capabilities against <strong>brand abuse</strong>, credential exposure, and external digital threats beyond traditional network perimeters.</p>
</li>
<li>
<p>Axur's automated threat detection platform can notify <strong>phishing</strong> detections for takedown in under four minutes and achieves nearly 99 percent takedown success rates, using AI to discover, validate, and remove malicious infrastructure before it can be weaponized.</p>
</li>
<li>
<p>The <strong>acquisition</strong> is expected to close in Spring 2026 subject to regulatory approvals, combining Infoblox's DNS-layer blocking capabilities with Axur's external threat disruption to reduce median attack uptime from days to hours.</p>
</li>
</ul>
<h3 id="monnai-raises-12-million-for-identity-and-risk-data-infrastructure"><a href="https://www.securityweek.com/monnai-raises-12-million-for-identity-and-risk-data-infrastructure/?ref=mandos.io">Monnai Raises $12 Million for Identity and Risk Data Infrastructure</a></h3>
<ul>
<li>
<p>California-based Monnai secured $12 million in <strong>funding</strong> led by Motive Partners, bringing total investment to $23 million for its AI-powered identity and risk data infrastructure that serves e-commerce, financial services, and fintech companies.</p>
</li>
<li>
<p>The company processes tens of millions of transactions monthly through ultra-low-latency risk signals that help organizations with <strong>fraud</strong> prevention, streamline customer onboarding, and enable real-time credit decisioning using AI-based models.</p>
</li>
<li>
<p>Monnai plans to use the investment to expand into <strong>Europe</strong> and Latin America while enhancing its core data infrastructure and growing its engineering and go-to-market teams to accelerate adoption among <strong>financial</strong> institutions and digital businesses.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="security-stack" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Security Stack</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="kiteworks-hipaa-compliance"><a href="https://cybersectools.com/tools/kiteworks-hipaa-compliance?ref=mandos.io">Kiteworks HIPAA Compliance</a></h3>
<p>HIPAA-compliant secure file sharing and collaboration platform for healthcare</p>
<h3 id="threatmon-ai"><a href="https://cybersectools.com/tools/threatmon-ai?ref=mandos.io">ThreatMon AI</a></h3>
<p>AI-powered threat intelligence platform with search, risk assessment &amp; alerts</p>
<h3 id="zerofox"><a href="https://cybersectools.com/tools/zerofox?ref=mandos.io">ZeroFox</a></h3>
<p>External threat intelligence platform for surface, deep, and dark web monitoring</p>
<hr><p>Thank you for reading this week's brief.</p><p>If you found this brief valuable, please forward it to one peer who is currently building or securing a B2B startup.</p><p>I’m constantly refining this intelligence for you. Was this week's market analysis useful? </p><p>Just hit&nbsp;<strong>Reply</strong>&nbsp;and let me know, I read every message.</p><p><strong>P.S. Whenever you’re ready, there are two ways I can help you:</strong></p><ol><li><strong>Founders:</strong>&nbsp;Need a Fractional CISO to unblock enterprise deals or lead your cybersecurity maturity journey? <a href="https://cal.com/nikolozk/30min?ref=mandos.io" rel="noreferrer"><strong>Book a Discovery Call</strong></a></li><li><strong>Vendors:</strong>&nbsp;Want to get your product in front of 15k+ security researchers on CybersecTools?&nbsp;<a href="https://cybersectools.com/submit?ref=mandos.io" rel="noreferrer"><strong>Submit Your Product</strong></a></li></ol><p>Talk to you in the next one.</p><p><strong>Nikoloz</strong></p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #139: AWS SDK Supply Chain Flaw, AI Cuts Breach Time to 25 Min, CrowdStrike Buys Seraphic ]]></title>
        <description><![CDATA[ Microsoft patches actively exploited Windows flaw enabling ransomware bypass. 99% of organizations running production AI experienced attacks. Change Healthcare breach cost $1.15B, exposed 190M records. ]]></description>
        <link>https://mandos.io/newsletter/brief-139-aws-sdk-supply-chain-flaw-ai-cuts-breach-time-to-25-min-crowdstrike-buys-seraphic/</link>
        <guid isPermaLink="false">696b4a5e27d2e7000179bce7</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 18 Jan 2026 12:00:09 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/01/3-1.png" medium="image"/>
        <content:encoded><![CDATA[ <p><strong>Welcome to the Mandos Brief: Strategic insights to help you stay ahead of threats and the market.</strong></p><p>In this week's analysis:</p><ul><li><strong>AWS SDK Supply Chain (CodeBreach):</strong>&nbsp;Researchers found a way to compromise the JavaScript SDK powering 66% of cloud environments.&nbsp;<strong>Action</strong>: Review your GitHub ACTOR_ID filters and regex patterns in CI/CD pipelines before someone else finds your gaps.</li><li><strong>AI Attack Explosion:</strong>&nbsp;Daily cyberattacks jumped from 2.3 million to 9 million in one year thanks to AI tools making attacks faster and easier.&nbsp;<strong>Reality Check</strong>: Your security team is now racing against AI-powered adversaries who can breach systems in 25 minutes instead of 44 days.</li><li><strong>CrowdStrike Buys Seraphic:</strong>&nbsp;The endpoint giant is moving into browser security, signaling the platform consolidation trend is accelerating.&nbsp;<strong>Strategic Insight</strong>: Security vendors who don't evolve into unified platforms will get squeezed out as customers demand fewer vendors, not more tools.</li></ul><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="strategic-intelligence" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Strategic Intelligence</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="wiz-research-discovers-codebreach-vulnerability-that-could-have-compromised-aws-javascript-sdk-supply-chain"><a href="https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild?ref=mandos.io">Wiz Research Discovers CodeBreach Vulnerability That Could Have Compromised AWS JavaScript SDK Supply Chain</a></h3>
<ul>
<li>
<p>A flaw in AWS CodeBuild authentication controls created <strong>systemic supply chain risk</strong>, where compromise of a single CI/CD pipeline could have cascaded into widespread customer impact through the AWS Console and SDKs used across the enterprise cloud ecosystem.</p>
</li>
<li>
<p>The vulnerability enabled <strong>unauthenticated privilege escalation</strong>, allowing attackers to steal GitHub credentials and potentially inject malicious code into trusted software dependencies, representing a high-impact scenario for software integrity, regulatory exposure, and customer trust.</p>
</li>
<li>
<p>The incident highlights the need for <strong>CISO oversight of CI/CD security governance</strong>, including third-party build systems, identity validation controls, and approval gates, as cloud-native development pipelines remain a prime target for nation-state and criminal actors.</p>
</li>
</ul>
<h3 id="microsoft-fixes-114-windows-flaws-in-january-2026-patch-one-actively-exploited"><a href="https://thehackernews.com/2026/01/microsoft-fixes-114-windows-flaws-in.html?ref=mandos.io">Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited</a></h3>
<ul>
<li>
<p>The volume and severity of vulnerabilities underscore <strong>persistent endpoint risk</strong> across enterprise Windows environments, reinforcing the importance of disciplined patch governance and executive visibility into remediation timelines.</p>
</li>
<li>
<p>The actively exploited Desktop Window Manager flaw demonstrates how <strong>low-level information disclosure</strong> can be weaponized to bypass modern defenses, increasing the likelihood of ransomware, espionage, or lateral movement attacks if left unpatched.</p>
</li>
<li>
<p>Secure Boot and driver-related fixes highlight <strong>firmware and trust-chain weaknesses</strong> that CISOs must factor into risk assessments, especially for regulated industries relying on device integrity assurances.</p>
</li>
</ul>
<h3 id="data-broker-exposes-45-million-french-records-in-aggregated-database"><a href="https://www.techradar.com/pro/security/massive-breach-leaks-45-million-french-records-demographic-healthcare-and-financial-data-all-leaked-heres-what-we-know?ref=mandos.io">Data Broker Exposes 45 Million French Records in Aggregated Database</a></h3>
<ul>
<li>
<p>The aggregation of multiple breach datasets into a single exposed repository illustrates the <strong>long-tail risk of third-party data brokers</strong>, where legacy incidents continue to amplify impact years after initial compromise.</p>
</li>
<li>
<p>The combination of healthcare, financial, and government registry data represents <strong>high regulatory and reputational risk</strong>, particularly under GDPR, with downstream consequences for organizations whose data feeds such ecosystems.</p>
</li>
<li>
<p>This incident reinforces the need for <strong>CISO-led data lifecycle and vendor risk management</strong>, including strict data minimization, contractual controls, and monitoring of how organizational data may be resold or recombined by external entities.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #138: 41% Hired AI Deepfake Candidates, Zestix Breaches 50+ Enterprises, CrowdStrike $740M Deal ]]></title>
        <description><![CDATA[ AI-generated code contains 1.7x more security vulnerabilities and 75% more logic errors than human-written code. Defense contractors leaked ITAR-controlled blueprints due to missing MFA enforcement. ]]></description>
        <link>https://mandos.io/newsletter/brief-138-41-hired-ai-deepfake-candidates-zestix-breaches-50-enterprises-crowdstrike-740m-deal/</link>
        <guid isPermaLink="false">696259219f8ba6000181e136</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 11 Jan 2026 17:00:58 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/01/2.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>Zestix threat actors compromised 50+ major enterprises</strong>&nbsp;using stolen credentials from old infostealer infections, highlighting how basic MFA gaps continue to enable massive breaches</li><li><strong>AI-generated code contains 1.7x more security vulnerabilities</strong>&nbsp;than human-written code, particularly struggling with error handling and password security implementations</li><li><strong>41% of large enterprises accidentally hired fake candidates</strong>&nbsp;created with AI deepfakes, with nearly all organizations experiencing some form of AI impersonation attempts</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->
<style>
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            padding: 24px;
            color: white;
            width: 100%;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
            box-sizing: border-box;
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 13px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
            text-align: center;
        }
        
        .sponsor-title {
            font-size: 28px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 16px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #ffffff; /* Changed from #1f2937 to white */
            text-decoration: none;
            padding: 12px 20px;
            border-radius: 6px;
            font-size: 16px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            padding: 16px 20px;
            width: 100%;
            margin-top: 20px;
            box-sizing: border-box;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>

<div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="zestix-threat-actor-breaches-50-companies-using-stolen-credentials-from-infostealer-infections"><a href="https://www.infostealers.com/article/dozens-of-global-companies-hacked-via-cloud-credentials-from-infostealer-infections-more-at-risk/?ref=mandos.io">Zestix Threat Actor Breaches 50+ Companies Using Stolen Credentials From Infostealer Infections</a></h3>
<ul>
<li>
<p>Threat actor <strong>Zestix</strong> (alias <strong>Sentap</strong>) has compromised approximately 50 major global enterprises by exploiting credentials harvested from infostealer malware infections on employee devices, targeting ShareFile, OwnCloud, and Nextcloud platforms across aviation, defense, healthcare, and government sectors.</p>
</li>
<li>
<p>The breaches occurred due to organizations failing to enforce <strong>Multi-Factor Authentication</strong> (MFA), allowing attackers to access corporate file-sharing portals using valid username and password combinations extracted from years-old infostealer logs without requiring sophisticated exploits or session hijacking techniques.</p>
</li>
<li>
<p>Notable victims include <strong>Iberia Airlines</strong> (77GB of aircraft maintenance data), <strong>Intecro</strong> Robotics (11.5GB of ITAR-controlled defense blueprints), <strong>Maida</strong> Health (2.3TB of Brazilian Military Police medical records), and Pickett &amp; Associates (139GB of critical <strong>utility</strong> infrastructure LiDAR files).</p>
</li>
</ul>
<h3 id="n8n-warns-of-critical-rce-vulnerability-with-cvss-100-score"><a href="https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html?m=1&ref=mandos.io">N8N Warns of Critical RCE Vulnerability with CVSS 10.0 Score</a></h3>
<ul>
<li>
<p>The <strong>CVE-2026-21877</strong> vulnerability affects both self-hosted and cloud versions of the n8n workflow automation platform, allowing authenticated users to execute untrusted code and potentially achieve full system compromise.</p>
</li>
<li>
<p>Impacted versions include n8n &gt;= 0.123.0 and &lt; 1.121.3, with the fix available in version 1.121.3 released in <strong>November</strong> 2025, discovered by security researcher Théo Lelasseux.</p>
</li>
<li>
<p>Administrators can mitigate the risk by disabling the <strong>Git</strong> node and restricting access for untrusted users if immediate patching to version 1.121.3 or later is not feasible.</p>
</li>
</ul>
<h3 id="bgp-route-leak-analysis-venezuela-isp-shows-pattern-of-routing-misconfigurations"><a href="https://blog.cloudflare.com/bgp-route-leak-venezuela/?ref=mandos.io">BGP Route Leak Analysis: Venezuela ISP Shows Pattern of Routing Misconfigurations</a></h3>
<ul>
<li>
<p>Cloudflare investigated a <strong>BGP route leak</strong> by Venezuelan ISP CANTV (AS8048) on January 2nd, finding it was likely caused by insufficient routing export policies rather than malicious intent, with the leaked routes being heavily <strong>prepended</strong> making them less attractive for traffic routing.</p>
</li>
<li>
<p>Analysis revealed CANTV has experienced eleven <strong>route leak</strong> events since December, all following the same pattern of redistributing customer routes to providers, indicating systemic configuration issues rather than targeted attacks despite speculation about government surveillance capabilities.</p>
</li>
<li>
<p>The incident highlights the need for better BGP security mechanisms like <strong>ASPA</strong> (Autonomous System Provider Authorization) and RFC9234 implementation, as traditional RPKI Route Origin Validation would not have prevented this path-based anomaly affecting Venezuelan telecom prefixes.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #137: Chrome Extension Supply Chain Attack, MCP Servers Expose AWS Keys, Record CVE Year ]]></title>
        <description><![CDATA[ 15.28% of employees run unverified MCP servers accessing credentials with zero visibility. Experienced CISSP holders apply to 100+ jobs for single interview as AI screening dominates. Manufacturing hit hardest by Google Cloud phishing at 19.6% of targets. ]]></description>
        <link>https://mandos.io/newsletter/brief-137-chrome-extension-supply-chain-attack-mcp-servers-expose-aws-keys-record-cve-year/</link>
        <guid isPermaLink="false">695a45bd2812a90001fb3a8a</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 04 Jan 2026 17:00:31 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2026/01/1.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy start of the year!</p><p>In this week's brief:</p><ul><li><strong>Trust Wallet's browser extension</strong>&nbsp;was compromised in another Shai-Hulud supply chain attack, draining $8.5 million from over 2,500 wallets and highlighting how even established crypto platforms remain vulnerable</li><li><strong>Human risk incidents jumped 90%</strong>&nbsp;according to KnowBe4's latest study, with AI applications now the second-fastest growing attack vector as employees struggle with unauthorized AI tool usage</li><li><strong>The job market reality check</strong>&nbsp;continues as a retired military professional with 12 years of experience and a CISSP can't land interviews, reflecting broader workforce challenges many of us are witnessing</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Business?</strong></b></u></p><p><span style="white-space: pre-wrap;">Need a security leader on your team but don't need a full-time hire? Let's talk.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="phishing-campaign-leverages-google-cloud-automation-to-evade-detection"><a href="https://blog.checkpoint.com/research/phishing-campaign-leverages-trusted-google-cloud-automation-capabilities-to-evade-detection/?ref=mandos.io">Phishing Campaign Leverages Google Cloud Automation to Evade Detection</a></h3>
<ul>
<li>
<p>Attackers sent 9,394 <strong>phishing</strong> emails from legitimate Google address by abusing Google Cloud's Application Integration Send Email task to impersonate routine enterprise notifications like voicemail alerts and file access requests.</p>
</li>
<li>
<p>The campaign used a multi-stage <strong>redirection</strong> flow starting with trusted storage.cloud.google.com links, then filtering through fake CAPTCHAs on googleusercontent.com, before ultimately directing victims to fake Microsoft login pages hosted on non-Microsoft domains.</p>
</li>
<li>
<p>Primary targets included <strong>manufacturing</strong> (19.6%), technology/SaaS (18.9%), and finance/banking/insurance (14.8%) organizations across the United States (48.6%), Asia-Pacific (20.7%), and Europe (19.8%), with the attack leveraging legitimate <strong>cloud</strong> infrastructure to bypass traditional sender reputation controls.</p>
</li>
</ul>
<h3 id="rondodox-botnet-weaponizes-react2shell-against-nextjs-applications"><a href="https://www.cloudsek.com/blog/rondodox-botnet-weaponizes-react2shell?ref=mandos.io">RondoDoX Botnet Weaponizes React2Shell Against Next.js Applications</a></h3>
<ul>
<li>
<p>CloudSEK researchers discovered a nine-month <strong>RondoDoX</strong> botnet campaign that recently shifted to exploiting a critical Next.js vulnerability, deploying malicious payloads including cryptominers and the "React2Shell" backdoor through six confirmed C2 servers.</p>
</li>
<li>
<p>The threat actors have conducted over 40 <strong>exploitation</strong> attempts within six days targeting Next.js Server Actions through prototype pollution attacks, while simultaneously maintaining automated campaigns against IoT devices including routers and cameras.</p>
</li>
<li>
<p>The campaign demonstrates three distinct phases from March to December 2025, with attackers deploying <strong>multi-architecture</strong> binaries across x86, ARM, and MIPS systems while implementing aggressive persistence mechanisms that terminate competing malware and establish cron-based backdoors.</p>
</li>
</ul>
<h3 id="trust-wallet-chrome-extension-compromised-through-shai-hulud-supply-chain-attack-85-million-stolen"><a href="https://trustwallet.com/blog/announcements/trust-wallet-browser-extension-v268-incident-community-update?ref=mandos.io">Trust Wallet Chrome Extension Compromised Through Shai-Hulud Supply Chain Attack, $8.5 Million Stolen</a></h3>
<ul>
<li>
<p>Trust Wallet's GitHub secrets were exposed during the second iteration of the <strong>Shai-Hulud</strong> supply chain attack, allowing threat actors to gain Chrome Web Store API access and push a malicious version 2.68 of their browser extension on December 24, 2025.</p>
</li>
<li>
<p>The trojanized extension contained a <strong>backdoor</strong> that harvested wallet mnemonic phrases from all configured wallets during every unlock attempt, exfiltrating the data to a domain hosted on bulletproof hosting provider Stark Industries Solutions.</p>
</li>
<li>
<p>The attack resulted in <strong>$8.5 million</strong> in cryptocurrency being drained from 2,520 wallet addresses, with Trust Wallet now processing reimbursement claims while implementing additional monitoring controls to prevent future <strong>supply chain</strong> compromises.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #136: Cisco Gateway Attacks Require Full Rebuild, 97% CISOs Adopt Hybrid, MongoDB Critical Patch ]]></title>
        <description><![CDATA[ Anthropic&#39;s Deputy CISO forces AI chatbot on community despite votes, causing mass exodus. Actor lands consultant role in 2 years, CompTIA certs beat traditional degrees. ]]></description>
        <link>https://mandos.io/newsletter/brief-136-cisco-gateway-attacks-require-full-rebuild-97-cisos-adopt-hybrid-mongodb-critical-patch/</link>
        <guid isPermaLink="false">6951a39a46ee990001f1b077</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 28 Dec 2025 23:10:36 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/12/52.png" medium="image"/>
        <content:encoded><![CDATA[ <p>🎉 Happy Sunday and a Happy New Year!</p><p>As we wrap up 2025, I want to thank you for sticking around for Mandos Brief and reflect on this year.</p><p>In August, I embarked on a solopreneur journey focusing on two things that I always wanted to work on: </p><p>1) Advisory - using my expertise to help organizations improve their security, resilience, and enable business growth</p><p>2) Building a product - building CybersecTools into the number 1 destinations for security teams to discover cybersecurity products</p><p>The journey is never smooth and full of ups and downs, but the truth is that I love every moment I spend on these two items, learning a lot about sales, marketing, accounting (yes, even that), coding, AI agents, and, of course, catching up with the cybersecurity industry through this Brief. </p><p>There is one additional product I am working on currently to truly bring clarity to this crazy, overloaded market of cybersecurity products. This time, helping cybersecurity companies win customers and crush competition through data-based decisions they can't get anywhere else. Coming in Q1 2026, if you work for a cybersecurity company and are interested, let me know.</p><p><strong><u>Wishing you and your loved ones a wonderful holiday season and all the best for 2026! 🥂</u></strong></p><p>And back to the newsletter... Here is what you can expect in this brief:</p><ul><li><strong>Cisco email security appliances</strong>&nbsp;are under active attack by UAT-9686 threat actors, with complete rebuilds being the only way to remove persistent backdoors from compromised systems</li><li><strong>NIST published its AI Cybersecurity Framework Profile</strong>&nbsp;for public comment, giving us the first structured approach to balance AI adoption with emerging security risks</li><li><strong>Nearly all CISOs now see hybrid infrastructure</strong>&nbsp;as their best bet for resilience, with 97% agreeing it beats putting all eggs in one cloud or on-premises basket</li></ul><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisco-confirms-active-cyberattacks-against-email-security-appliances"><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-attack-N9bf4?ref=mandos.io">Cisco Confirms Active Cyberattacks Against Email Security Appliances</a></h3>
<ul>
<li>
<p>The <strong>UAT-9686</strong> threat actor is actively exploiting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager appliances that have the Spam Quarantine feature exposed to the internet, allowing <strong>root</strong> privilege command execution.</p>
</li>
<li>
<p>Affected appliances show evidence of a <strong>persistence</strong> mechanism planted by attackers to maintain ongoing access, with Cisco recommending complete appliance rebuilding as the only viable option to eradicate the threat.</p>
</li>
<li>
<p>The attack specifically targets appliances with both the Spam Quarantine feature enabled and exposed to the internet, assigned <strong>CVE-2025-20393</strong> with Critical severity affecting all releases of Cisco AsyncOS Software.</p>
</li>
</ul>
<h3 id="mongodb-warns-admins-to-patch-severe-vulnerability-immediately"><a href="https://www.bleepingcomputer.com/news/security/mongodb-warns-admins-to-patch-severe-vulnerability-immediately/?ref=mandos.io">MongoDB Warns Admins to Patch Severe Vulnerability Immediately</a></h3>
<ul>
<li>
<p><strong>CVE-2025-14847</strong> is a high-severity memory-read vulnerability affecting multiple MongoDB versions that allows unauthenticated attackers to exploit the server's <strong>zlib</strong> implementation remotely without user interaction.</p>
</li>
<li>
<p>The flaw stems from improper handling of length parameter inconsistency in zlib compressed protocol headers, potentially allowing attackers to read uninitialized <strong>heap</strong> memory and gather sensitive information from targeted systems.</p>
</li>
<li>
<p>MongoDB strongly recommends immediately upgrading to patched versions (8.2.3, 8.0.17, 7.0.28, 6.0.27, 5.0.32, or 4.4.30) or disabling zlib <strong>compression</strong> on MongoDB servers as a temporary workaround until patches can be applied.</p>
</li>
</ul>
<h3 id="fortinet-warns-of-active-exploitation-of-cve-2020-12812-ldap-bypass-vulnerability"><a href="https://www.fortinet.com/blog/psirt-blogs/product-security-advisory-and-analysis-observed-abuse-of-fg-ir-19-283?ref=mandos.io">Fortinet Warns of Active Exploitation of CVE-2020-12812 LDAP Bypass Vulnerability</a></h3>
<ul>
<li>
<p>Fortinet has observed recent <strong>exploitation</strong> of CVE-2020-12812 (FG-IR-19-283) in FortiGate devices where attackers bypass two-factor authentication by exploiting case-sensitive username handling differences between FortiGate and <strong>LDAP</strong> directories.</p>
</li>
<li>
<p>The vulnerability allows attackers to authenticate using alternate case variations of usernames (e.g., "Jsmith" instead of "jsmith") which causes FortiGate to fail local user matching and fall back to <strong>LDAP</strong> group authentication, bypassing 2FA requirements entirely.</p>
</li>
<li>
<p>Organizations can mitigate this issue by upgrading to FortiOS 6.0.10, 6.2.4, or 6.4.1 and setting "username-case-sensitivity disable" on all local accounts, or removing unnecessary secondary LDAP group <strong>configurations</strong> that enable the authentication bypass.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #135: GitHub Enables Cross-Cloud Attacks, AI Agents Risk 76% of Orgs, Entry Salaries Drop 30% ]]></title>
        <description><![CDATA[ WhatsApp Silent Whisper flaw enables covert tracking with just phone numbers. Security incidents with $200K+ damages doubled to 13% as hybrid IT adoption hits 77%. ]]></description>
        <link>https://mandos.io/newsletter/brief-135-github-enables-cross-cloud-attacks-ai-agents-risk-76-of-orgs-entry-salaries-drop-30/</link>
        <guid isPermaLink="false">6947b536811de60001103f2c</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 21 Dec 2025 17:00:09 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/12/51.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Here is what went down this week:</p><ul><li><strong>GitHub token attacks</strong>&nbsp;are enabling attackers to move from compromised repositories directly into cloud environments, with most organizations storing cloud credentials in Action Secrets</li><li><strong>83% of enterprises use AI</strong>&nbsp;but nearly half have little visibility into how these systems access their data, creating significant governance blind spots</li><li><strong>Entry-level cybersecurity jobs</strong>&nbsp;have become brutally competitive with salaries dropping 20-30% and Security+ certs no longer enough to land most positions</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Business?</strong></b></u></p><p><span style="white-space: pre-wrap;">Need a security leader on your team but don't need a full-time hire? Let's talk.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="github-pat-attacks-enable-cross-cloud-lateral-movement"><a href="https://www.wiz.io/blog/github-attacks-pat-control-plane?ref=mandos.io">GitHub PAT Attacks Enable Cross-Cloud Lateral Movement</a></h3>
<ul>
<li>
<p>Attackers are leveraging compromised GitHub <strong>Personal Access Tokens</strong> to discover Action Secrets names through API code search, then creating malicious workflows to execute code and steal cloud credentials from organizations.</p>
</li>
<li>
<p>Threat actors bypass GitHub's secret masking by encoding stolen credentials twice with <strong>Base64</strong> or exfiltrating them to external webhook endpoints, allowing them to print raw secret values in Action logs for credential harvesting.</p>
</li>
<li>
<p>The attack enables <strong>lateral movement</strong> from GitHub repositories directly into victim cloud environments, with 73% of organizations storing CSP credentials in GitHub Action Secrets and 45% keeping plaintext cloud keys in private repositories.</p>
</li>
</ul>
<h3 id="amazon-confirms-5-year-russian-cyberattack-campaign-targeting-aws-infrastructure"><a href="https://www.forbes.com/sites/daveywinder/2025/12/19/warning-amazon-confirms-5-year-long-russian-cyberattack/?ref=mandos.io">Amazon Confirms 5-Year Russian Cyberattack Campaign Targeting AWS Infrastructure</a></h3>
<ul>
<li>
<p>Amazon threat intelligence has confirmed a <strong>Sandworm</strong>-linked Russian state-sponsored cyberattack campaign targeting AWS-hosted devices since 2021, focusing primarily on Western <strong>energy</strong> sector infrastructure in North America and Europe.</p>
</li>
<li>
<p>The attacks exploit <strong>misconfigured</strong> customer network edge devices rather than unpatched vulnerabilities, with threat actors taking advantage of exposed management interfaces and overly permissive identities to maintain persistent access.</p>
</li>
<li>
<p>Amazon's CSO separately disclosed blocking over 1,800 suspected North Korean IT workers since April 2024, who use stolen identities and <strong>laptop</strong> farms to secure remote positions and funnel earnings back to DPRK weapons programs.</p>
</li>
</ul>
<h3 id="silent-whisper-vulnerability-allows-covert-tracking-of-whatsapp-and-signal-users"><a href="https://www.techradar.com/pro/security/three-billion-whatsapp-users-are-at-risk-an-expert-has-developed-a-tool-that-could-spy-on-everyone-and-you-would-never-know-about-it?ref=mandos.io">Silent Whisper Vulnerability Allows Covert Tracking of WhatsApp and Signal Users</a></h3>
<ul>
<li>
<p>Researchers disclosed a <strong>tracking</strong> technique that exploits delivery acknowledgments in WhatsApp and Signal, allowing attackers to monitor devices silently using only a phone number without triggering visible messages or notifications.</p>
</li>
<li>
<p>The vulnerability causes significant <strong>battery</strong> drain during continuous probing, with test devices losing 14-18% battery per hour compared to normal 1% hourly consumption, while also consuming mobile data and disrupting bandwidth-heavy applications.</p>
</li>
<li>
<p>A publicly available proof-of-concept tool enables <strong>probing</strong> at 50ms intervals to reveal daily routines, sleep schedules, and travel patterns through response time analysis, with the vulnerability remaining exploitable as of December 2025.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #134: Google Drive Backdoor, AI Beats Human Pen Testers, Worst Job Market in 15 Years ]]></title>
        <description><![CDATA[ NANOREMOTE blends attacks through Google&#39;s API undetected. AI agents now surpass most human security testers in live enterprise assessments. ]]></description>
        <link>https://mandos.io/newsletter/brief-134-google-drive-backdoor-ai-beats-human-pen-testers-worst-job-market-in-15-years/</link>
        <guid isPermaLink="false">693e892c5d0fd20001c0118d</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 14 Dec 2025 17:00:32 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/12/50.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>NANOREMOTE backdoor</strong>&nbsp;is using Google Drive API for command and control, blending malicious traffic with legitimate cloud services in a way that's pretty clever</li><li><strong>Stanford researchers proved</strong>&nbsp;their AI agent outperformed 9 out of 10 human penetration testers in live enterprise testing, which should make us all think about where this industry is heading</li><li><strong>The cybersecurity job market</strong>&nbsp;has hit its worst point in 15 years, with seasoned professionals reporting they can't even get interviews despite strong credentials</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Business?</strong></b></u></p><p><span style="white-space: pre-wrap;">Need a security leader on your team but don't need a full-time hire? Let's talk.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="elastic-security-labs-discovers-nanoremote-windows-backdoor-using-google-drive-api"><a href="https://www.elastic.co/security-labs/nanoremote?ref=mandos.io">Elastic Security Labs Discovers NANOREMOTE Windows Backdoor Using Google Drive API</a></h3>
<ul>
<li>
<p>Elastic Security Labs identified a fully-featured Windows <strong>backdoor</strong> called NANOREMOTE that shares code similarities with FINALDRAFT and REF7707 malware, likely developed by the same <strong>espionage</strong> threat actor for reconnaissance and data theft operations.</p>
</li>
<li>
<p>The malware leverages the <strong>Google Drive API</strong> for command and control communications, enabling file transfers and payload staging through legitimate cloud services that blend with normal network traffic and evade traditional detection methods.</p>
</li>
<li>
<p>NANOREMOTE features 22 command handlers providing comprehensive capabilities including system <strong>enumeration</strong>, command execution, custom PE loading using libPeConv library, and task management for file operations with pause/resume functionality.</p>
</li>
</ul>
<h3 id="zscaler-threatlabz-analyzes-blackforce-phishing-kit"><a href="https://www.zscaler.com/blogs/security-research/technical-analysis-blackforce-phishing-kit?ref=mandos.io">Zscaler ThreatLabz Analyzes BlackForce Phishing Kit</a></h3>
<ul>
<li>
<p>BlackForce is a new <strong>phishing</strong> kit first observed in August 2025 with five distinct versions that enables Man-in-the-Browser attacks to steal credentials and bypass <strong>MFA</strong> through real-time operator interaction.</p>
</li>
<li>
<p>The kit has been used to impersonate over 11 brands including Disney, Netflix, DHL, and UPS, and is actively sold on <strong>Telegram</strong> forums for €200–€300 with sophisticated evasion techniques including ISP and security vendor blocklists.</p>
</li>
<li>
<p>BlackForce evolved from a stateless to stateful architecture across versions, implementing persistent session storage and dual-channel communication that separates phishing servers from Telegram data exfiltration to ensure <strong>resilience</strong>.</p>
</li>
</ul>
<h3 id="mitre-releases-2025s-top-25-most-dangerous-software-weaknesses"><a href="https://cwe.mitre.org/top25/archive/2025/2025_cwe_top25.html?ref=mandos.io">MITRE Releases 2025's Top 25 Most Dangerous Software Weaknesses</a></h3>
<ul>
<li>
<p>MITRE analyzed 39,080 <strong>CVE</strong> Records from June 2024 to June 2025, identifying the most critical software weaknesses that enable threat actors to compromise systems and steal data.</p>
</li>
<li>
<p>Cross-Site Scripting (<strong>XSS</strong>) retains the top spot while Missing Authorization, NULL Pointer Dereference, and Missing Authentication showed the biggest upward movement in rankings.</p>
</li>
<li>
<p>Six new entries joined the list including Classic <strong>Buffer</strong> Overflow, Stack-based Buffer Overflow, Heap-based Buffer Overflow, and Improper Access Control, highlighting evolving threat landscapes.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #133: Next.js RCE Affects 39% Cloud Environments, AI Agents Steal $4.6M, Supply Chain Breach Crisis ]]></title>
        <description><![CDATA[ ServiceNow acquires Veza for $1B+ to expand identity security. Security leaders face burnout managing cloud, AI, and compliance with understaffed teams and limited autonomy. ]]></description>
        <link>https://mandos.io/newsletter/brief-133-next-js-rce-affects-39-cloud-environments-ai-agents-steal-4-6m-supply-chain-breach-crisis/</link>
        <guid isPermaLink="false">69340bcae0730100015a71fc</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 07 Dec 2025 17:00:55 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/12/49.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>React and Next.js applications</strong>&nbsp;are facing immediate exploitation risk through newly discovered RCE vulnerabilities that affect default configurations and require urgent patching</li><li><strong>AI agents are now capable</strong>&nbsp;of autonomously exploiting smart contracts for millions in profit, with their success rate doubling every 1.3 months in recent research</li><li><strong>Supply chain security programs</strong>&nbsp;are failing spectacularly, with 97% of organizations experiencing breaches despite increased spending and established TPRM initiatives</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="critical-rce-vulnerabilities-discovered-in-react-and-nextjs-server-components"><a href="https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182?ref=mandos.io">Critical RCE Vulnerabilities Discovered in React and Next.js Server Components</a></h3>
<ul>
<li>
<p><strong>CVE-2025-55182</strong> (React) and <strong>CVE-2025-66478</strong> (Next.js) are critical unauthenticated <strong>remote code execution</strong> vulnerabilities affecting React Server Components through insecure <strong>deserialization</strong> in the RSC "Flight" protocol with near-100% exploitation reliability.</p>
</li>
<li>
<p>Default configurations of Next.js applications created with <code>create-next-app</code> are immediately vulnerable, requiring only a crafted <strong>HTTP request</strong> for exploitation without any developer code changes needed.</p>
</li>
<li>
<p>Wiz Research data reveals <strong>39% of cloud environments</strong> contain vulnerable instances, with patches now available for React versions 19.0-19.2 and Next.js versions 14.3.0-canary through 16.x requiring immediate updating.</p>
</li>
</ul>
<h3 id="attackers-abuse-oauth-flows-to-bypass-mfa-and-gain-persistence-in-azure-environments"><a href="https://www.wiz.io/blog/recent-oauth-attacks-detection-strategies?ref=mandos.io">Attackers Abuse OAuth Flows to Bypass MFA and Gain Persistence in Azure Environments</a></h3>
<ul>
<li>
<p>Threat actors are exploiting device code <strong>phishing</strong> to obtain access tokens while bypassing MFA checks, with less than 50% of customers implementing Conditional Access policies to block these flows.</p>
</li>
<li>
<p><strong>ROPC</strong> (Resource Owner Password Credentials) authentication is being weaponized for credential stuffing attacks, with only 0.2% of attempts blocked by CA rules despite being a legacy protocol that skips modern security controls.</p>
</li>
<li>
<p>Attackers chain successful token acquisition to register devices and configure <strong>Windows Hello for Business</strong>, creating 90-day persistence through Primary Refresh Tokens that satisfy high-assurance authentication requirements.</p>
</li>
</ul>
<h3 id="albiriox-rat-targets-global-financial-and-cryptocurrency-applications"><a href="https://www.cleafy.com/cleafy-labs/albiriox-rat-mobile-malware-targeting-global-finance-and-crypto-wallets?ref=mandos.io#6">Albiriox RAT Targets Global Financial and Cryptocurrency Applications</a></h3>
<ul>
<li>
<p>Researchers discovered Albiriox, a new <strong>Android</strong> malware family offered as Malware-as-a-Service for $650-720 monthly by Russian-speaking threat actors who use <strong>VNC-based</strong> remote access and overlay attacks for on-device fraud.</p>
</li>
<li>
<p>The malware targets over 400 <strong>financial</strong> applications including banks and cryptocurrency wallets through a two-stage deployment using dropper applications and <strong>social engineering</strong> lures that bypass static detection methods.</p>
</li>
<li>
<p>Albiriox enables complete device takeover through accessibility services that circumvent Android's FLAG_SECURE protections, allowing attackers to perform <strong>fraudulent</strong> transactions while displaying black screen overlays to hide malicious activity.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ How a vCISO Accelerates Enterprise Sales and Compliance: The Reality No One Talks About ]]></title>
        <description><![CDATA[ Stop losing million-euro enterprise deals: learn the brutal truth about how a vCISO rapidly accelerates sales and achieves ISO 27001 by focusing only on what truly closes deals. ]]></description>
        <link>https://mandos.io/blog/how-a-vciso-accelerates-enterprise-sales-and-compliance-the-reality-no-one-talks-about/</link>
        <guid isPermaLink="false">691d868e16c909000133f417</guid>
        <category><![CDATA[ Fractional CISO ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 04 Dec 2025 14:56:17 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/How-Mandos-vCISO-Accelerates-Enterprise-Sales-and-Compliance-to-achieve-best-results-for-b2b-companies-in-europe.jpg" medium="image"/>
        <content:encoded><![CDATA[ <p>In 13 years of building security programs for B2B companies and reviewing over 150 security setups, I’ve seen the same thing happen again and again: promising startups lose million-euro enterprise deals because they can’t answer basic security questions with confidence.The brutal truth? Your CTO juggling security between product sprints isn't fooling anyone. Enterprise buyers can smell the uncertainty from the first security review question.</p><h2 id="the-%E2%82%AC20m-problem-hiding-in-plain-sight">The €20M Problem Hiding in Plain Sight</h2><p>Last month, I met with a founder who had just lost a €2.4M deal to a competitor. It wasn’t because their product was worse; in fact, it was better. But when the enterprise buyer asked about their incident response plan, they were directed to AWS documentation. The competitor answered confidently and backed it up with evidence from their own security program in just five minutes.This isn't an edge case. It's the norm.I’ve looked at data from dozens of companies. Security reviews now block or delay 73% of enterprise deals over €500K. On average, deals are delayed by 10 to 12 weeks, costing about €200K per month in stalled pipeline.Still, most B2B companies treat security as just another box to check and plan to deal with it later.</p><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/Why-traditional-CISO-hiring-approaches-fail.png" class="kg-image" alt="Why traditional CISO hiring approaches fail. Instead hire fractional CISO or vCISO mandos.io" loading="lazy" width="1024" height="1536" srcset="https://mandos.io/content/images/size/w600/2025/11/Why-traditional-CISO-hiring-approaches-fail.png 600w, https://mandos.io/content/images/size/w1000/2025/11/Why-traditional-CISO-hiring-approaches-fail.png 1000w, https://mandos.io/content/images/2025/11/Why-traditional-CISO-hiring-approaches-fail.png 1024w" sizes="(min-width: 720px) 720px"></figure><h2 id="why-traditional-approaches-fail-spectacularly">Why Traditional Approaches Fail Spectacularly</h2><p>Here's what typically happens when companies try to solve this themselves:</p><p><strong>The Big 4 Consultant Route:</strong>&nbsp;€150K and 18 months later, you have enterprise-grade security perfect for a 1,000-person company. Meanwhile, your 50-person startup is drowning in processes that slow everything down. Three competitors won deals while you were writing policies.</p><p><strong>The Full-Time CISO Hire:</strong>&nbsp;Six-month search, €180K salary plus equity, and they want to build a security empire. Eighteen months later, they leave for a FAANG company. You're back to square one with even more complex systems no one understands.</p><p><strong>The DIY Approach:</strong>&nbsp;Your CTO reads ISO 27001 standards on weekends. The engineering team rebels against security controls they see as bureaucratic nonsense. Audit fails. Deals continue to die.</p><h2 id="the-vciso-advantage-speed-without-compromise">The vCISO Advantage: Speed Without Compromise</h2><p>A fractional vCISO can make a huge difference, but not in the way most people expect.It’s not just about having a security leader available. It’s about working with someone who has closed these kinds of deals more than 50 times and knows exactly what enterprise buyers really care about, not just what they say they care about.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Ready to Stop Losing Deals to Security Questions?</strong></b></p><p><span style="white-space: pre-wrap;">Your competitors aren't waiting. Neither should you. Book a 30-minute call to diagnose your security readiness</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h3 id="what-actually-moves-the-needle">What Actually Moves the Needle</h3><p>After supporting security discussions with Goldman Sachs, Commonwealth Bank, and dozens of Fortune 500 buyers, here's what really accelerates deals:</p><p><strong>1. Confidence Through Preparation:</strong>&nbsp;Enterprise buyers don’t expect you to be perfect. They want you to know your security posture inside and out. A vCISO ensures your sales team can answer the top 10 security questions without hesitation by preparing them with clear scripts and real evidence.</p><p><strong>2. The 6-Month ISO 27001 Sprint:</strong>&nbsp;Most people say ISO 27001 takes 18 months, but that’s not true. With someone who’s done it over 50 times, you can get audit-ready in 6 months by focusing on the 34 essential controls that matter, instead of all 114. You get the same certificate, three times faster, at half the cost.</p><p><strong>3. Risk-Based Prioritization:</strong>&nbsp;Not all security gaps are created equal. A vCISO knows which ones will kill deals and which ones nobody actually checks. We fix the deal-breakers first, park the nice-to-haves for later.</p><h3 id="the-compliance-acceleration-framework">The Compliance Acceleration Framework</h3><p>Traditional compliance treats every requirement the same, which is why it takes so long and becomes so expensive.</p><p>My approach, refined across 50+ implementations:</p><p><strong>Month 1-2:</strong>&nbsp;Implement only what auditors actually verify&nbsp;</p><p><strong>Month 3-4:</strong>&nbsp;Automate evidence collection (saving 80% of manual work)&nbsp;</p><p><strong>Month 5:</strong>&nbsp;Mock audit to catch gaps&nbsp;</p><p><strong>Month 6:</strong>&nbsp;External audit and certification</p><p>The result is that you’re competing for enterprise deals with a compliance certification that took your competitors three times as long to get.</p><h2 id="the-hidden-roi-most-miss">The Hidden ROI Most Miss</h2><p>Most people add up the obvious costs like consultant fees, audit expenses, and tools. But they often miss the bigger financial picture:</p><p><strong>Revenue Acceleration</strong></p><ul><li>Average enterprise deal blocked by security: €1.2M</li><li>Time to close without proper security: 14 weeks</li><li>Time to close with vCISO-built program: 6 weeks</li><li>Revenue pulled forward: €2.4M per quarter</li></ul><p><strong>Cost Avoidance</strong></p><ul><li>Big 4 consultant for 18 months: €180K</li><li>Full-time CISO (salary + benefits + equity): €250K/year</li><li>Fractional vCISO getting same results: €76K/year</li></ul><p>Here’s something people rarely mention: while your competitors are still working toward compliance, you’re already certified and winning their prospects.</p><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/what-you-need-to-pass-ISO-27001-contorl-audit.png" class="kg-image" alt="" loading="lazy" width="1024" height="1536" srcset="https://mandos.io/content/images/size/w600/2025/11/what-you-need-to-pass-ISO-27001-contorl-audit.png 600w, https://mandos.io/content/images/size/w1000/2025/11/what-you-need-to-pass-ISO-27001-contorl-audit.png 1000w, https://mandos.io/content/images/2025/11/what-you-need-to-pass-ISO-27001-contorl-audit.png 1024w" sizes="(min-width: 720px) 720px"></figure><p></p><h2 id="the-uncomfortable-truth-about-security-theater">The Uncomfortable Truth About Security Theater</h2><p>The security industry doesn’t usually admit this, but 80% of what consultants recommend is just security theater meant to justify their fees.</p><p><strong>You don't need:</strong></p><ul><li>All 114 ISO 27001 controls implemented</li><li>A 40-page incident response plan nobody will read</li><li>Monthly penetration tests</li><li>Three different SIEM tools</li></ul><p><strong>You need:</strong></p><ul><li>The 34 controls auditors actually check</li><li>A one-page incident response checklist people will actually use</li><li>Automated security testing in your CI/CD pipeline</li><li>One properly configured monitoring solution</li></ul><p>A good vCISO removes the unnecessary extras and focuses on what truly protects your business and helps you close deals.</p><h2 id="when-vciso-makes-sense-and-when-it-doesnt">When vCISO Makes Sense (And When It Doesn't)</h2><p><strong>Perfect fit if you're:</strong></p><ul><li>B2B SaaS between €5M-€50M ARR</li><li>Targeting enterprise customers</li><li>Losing deals to security questions</li><li>Under pressure for compliance certification</li><li>Growing 2x+ annually</li></ul><p><strong>Wrong fit if you're:</strong></p><ul><li>Consumer-focused business</li><li>Under €2M ARR (unless investor-mandated)</li><li>Already have a mature security program</li><li>Your industry regulations or contracts explicitly require a designated security executive</li></ul><h2 id="the-first-90-days">The First 90 Days</h2><p>When I begin working with a new client, the change happens right away:</p><p><strong>Week 1:</strong>&nbsp;Security posture assessment – know exactly where you stand&nbsp;</p><p><strong>Week 2-4:</strong>&nbsp;Fix the top 5 deal-breakers&nbsp;</p><p><strong>Month 2:</strong>Sales team trained and confident on security responses&nbsp;</p><p><strong>Month 3:</strong>&nbsp;Compliance automation running, evidence collection itself&nbsp;</p><p><strong>Day 91:</strong>&nbsp;First enterprise deal closed that would have stalled</p><p>No building unnecessary empires.&nbsp;No over-complicated systems.&nbsp;</p><p>Just practical security that helps your business grow.</p><h2 id="beyond-compliance">Beyond Compliance</h2><p>The best vCISOs do more than just check boxes. They become a strategic advantage for your business:</p><ul><li><strong>Board Readiness:</strong>&nbsp;Transform security from black box to business metrics</li><li><strong>M&amp;A Preparedness:</strong>&nbsp;Security due diligence ready before you need it</li><li><strong>Investor Confidence:</strong>&nbsp;Answer security questions in fundraising with authority</li><li><strong>Crisis Leadership:</strong>&nbsp;When incidents happen, experience matters more than plans</li></ul><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Stop Watching Deals Die in Security Reviews.</strong></b></p><p><span style="white-space: pre-wrap;">Your competitors are already moving. Time to accelerate. Let's build your enterprise-ready security program.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="faq">FAQ</h2><h3 id="q-how-is-a-vciso-different-from-a-security-consultant">Q: How is a vCISO different from a security consultant?</h3><p><strong>A:</strong>&nbsp;Consultants give you advice and then move on. A vCISO takes responsibility for results. They don’t just write reports about what you should do; they build your security program, train your team, and stand behind it when enterprise buyers have questions. If there’s an incident at 10 PM, you call them, not search for a consultant’s PDF.</p><h3 id="q-cant-we-just-hire-a-full-time-ciso">Q: Can't we just hire a full-time CISO?</h3><p><strong>A:</strong>&nbsp;You could spend six months searching, pay €180K plus equity, and hope the person stays. Or you could get someone with 13 years of experience to start next week at a third of the cost. Most companies with fewer than 200 employees don’t need a full-time CISO; they need security leadership for 2 or 3 days a week. That’s the best way to get expertise without extra overhead.</p><h3 id="q-how-quickly-can-we-get-iso-27001-certified">Q: How quickly can we get ISO 27001 certified?</h3><p><strong>A:</strong>&nbsp;6 months if your organization fully commits and has a dedicated project owner. I did it in 84 days when a massive deal was on the line. The companies taking 18-24 months are implementing unnecessary controls and treating it like an academic exercise. We focus on the 34 essential controls auditors actually verify, not all 114.</p><h3 id="q-what-if-we-already-have-some-security-measures-in-place">Q: What if we already have some security measures in place?</h3><p><strong>A:</strong>&nbsp;That’s great. Most companies already have 30 to 40 percent of what they need; they just don’t realize it. We’ll review what you have, identify key gaps, and build on your existing foundation. Often, just organizing and documenting what’s already there is half the work.</p><h3 id="q-how-do-you-work-with-our-existing-ctotechnical-team">Q: How do you work with our existing CTO/technical team?</h3><p><strong>A:</strong>&nbsp;Your CTO should focus on building a product, not learning security frameworks. vCISO handles security strategy and compliance, while your technical team maintains its focus on what it does best. We meet weekly and handle security decisions; they execute technical implementations. It's about multiplication, not replacement.</p><h3 id="q-what-about-when-we-grow-and-need-a-full-time-ciso">Q: What about when we grow and need a full-time CISO?</h3><p><strong>A:</strong>&nbsp;That's the goal. Typically, around 200-300 employees or €50M ARR, a full-time CISO makes sense. When you're ready, we will help you hire the right person and ensure a smooth transition.</p><h3 id="q-can-you-handle-security-incidents">Q: Can you handle security incidents?</h3><p><strong>A:</strong>&nbsp;Yes, with clear boundaries. During business hours, we respond within 2 hours. For after-hours emergencies (ransomware, active breach), we are available at a 2x rate. More importantly, we'll build your incident response capability so your team can handle 90% of issues without escalation.</p><h3 id="q-whats-the-typical-investment">Q: What's the typical investment?</h3><p><strong>A:</strong>&nbsp;Between €6,400-€19,200 per month, depending on engagement level (2-6 days/month). Compare that to a full-time CISO at €15K-20 per month plus equity, or Big 4 consultants at €180K for a compliance project. The ROI is typically 10x within the first year, driven solely by accelerated deals.</p><h3 id="q-how-do-we-know-if-vciso-is-right-for-us">Q: How do we know if vCISO is right for us?</h3><p><strong>A:</strong>&nbsp;Book a 30-minute call. I’ll ask you five questions about your sales pipeline, security setup, and growth plans. In ten minutes, we’ll both know if it’s a good fit. If not, I’ll tell you exactly what you should do instead. No sales pitch, just honest advice about what makes sense for you.</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #132: Microsoft Defender Bypass, Chinese AI Autonomous Hacking, Salaries Go Down ]]></title>
        <description><![CDATA[ Shai-Hulud 2.0 compromises 25,000+ npm repositories for credential harvesting. Early AI security adopters see 67% security posture improvement and 70% breach risk reduction. ]]></description>
        <link>https://mandos.io/newsletter/brief-132-microsoft-defender-bypass-chinese-ai-autonomous-hacking-salaries-go-down/</link>
        <guid isPermaLink="false">692b05e5d5500a00011b579e</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 30 Nov 2025 17:00:49 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/48.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>The Shai-Hulud 2.0 attack</strong>&nbsp;compromised over 25,000 npm repositories using sophisticated typosquatting to harvest developer credentials and secrets across multiple package ecosystems</li><li><strong>Chinese state actors are using Claude AI</strong>&nbsp;to autonomously execute 80-90% of their attack operations, from reconnaissance to exfiltration, with minimal human intervention</li><li><strong>Cybersecurity salaries are dropping</strong>&nbsp;by approximately $20k across roles as companies capitalize on increased competition from laid-off workers to reduce compensation</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="squarex-claims-comet-browser-vulnerability-perplexity-disputes-research"><a href="https://www.securityweek.com/squarex-and-perplexity-quarrel-over-alleged-comet-browser-vulnerability/?ref=mandos.io">SquareX Claims Comet Browser Vulnerability, Perplexity Disputes Research</a></h3>
<ul>
<li>
<p>SquareX discovered a potential <strong>vulnerability</strong> in Perplexity's Comet AI browser that could allow attackers to execute local commands through a Model Context Protocol API and two hidden extensions.</p>
</li>
<li>
<p>The attack requires compromising the <strong>agentic</strong> extension via XSS, MitM attacks, or gaining access to Perplexity systems, and SquareX demonstrated the exploit using an "extension stomping" technique to deploy <strong>ransomware</strong>.</p>
</li>
<li>
<p>Perplexity strongly disputes the findings, calling it "fake security research" and stating the scenario is contrived, though they implemented preventive measures out of caution and claim users must consent to <strong>MCP</strong> installations.</p>
</li>
</ul>
<h3 id="shai-hulud-20-supply-chain-attack-targets-over-25000-repositories-with-credential-harvesting"><a href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack?ref=mandos.io">Shai-Hulud 2.0 Supply Chain Attack Targets Over 25,000 Repositories With Credential Harvesting</a></h3>
<ul>
<li>
<p>Threat actors have launched a massive <strong>supply chain</strong> attack called Shai-Hulud 2.0 that compromises over 25,000 npm package repositories to steal developer credentials and secrets.</p>
</li>
<li>
<p>The attack involves publishing malicious packages that mimic legitimate libraries, with <strong>typosquatting</strong> techniques used to trick developers into installing compromised versions that exfiltrate sensitive data.</p>
</li>
<li>
<p>The campaign demonstrates sophisticated <strong>persistence</strong> mechanisms and targets high-value organizations by harvesting authentication tokens, API keys, and other secrets from development environments across multiple package ecosystems.</p>
</li>
</ul>
<h3 id="microsoft-teams-b2b-guest-access-bypass-defeats-defender-for-office-365-protections"><a href="https://www.ontinue.com/resource/blog-microsoft-chat-with-anyone-understanding-phishing-risk/?ref=mandos.io">Microsoft Teams B2B Guest Access Bypass Defeats Defender for Office 365 Protections</a></h3>
<ul>
<li>
<p>Attackers can create malicious <strong>Microsoft 365 tenants</strong> without Defender protections and invite victims as guests, completely bypassing Safe Links, ZAP, and malware scanning that exist in the victim's home organization.</p>
</li>
<li>
<p>Microsoft's <strong>MC1182004</strong> feature "Chat with anyone with an email address" is enabled by default and allows threat actors to trivially deliver guest invitations to any email address, making this attack vector easily exploitable.</p>
</li>
<li>
<p>When users accept guest invitations to external tenants, all security policies apply from the <strong>hosting tenant</strong> rather than their home organization, creating protection-free zones that attackers can exploit for <strong>phishing</strong> campaigns and malware distribution.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #131: Sturnus Trojan Bypasses WhatsApp Encryption, ServiceNow AI Agents Exploited, CISO Pay Up 6.7% ]]></title>
        <description><![CDATA[ Azure mitigated a record-breaking 15.72 Tbps DDoS attack from 500K+ IPs. Security budgets grew only 4% while executive compensation surged, creating resource allocation challenges. ]]></description>
        <link>https://mandos.io/newsletter/brief-131-sturnus-trojan-bypasses-whatsapp-encryption-servicenow-ai-agents-exploited-ciso-pay-up-6-7/</link>
        <guid isPermaLink="false">692065d8f9ab6000013cfec6</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 23 Nov 2025 17:00:27 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/47.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>OWASP's 2025 Top 10</strong>&nbsp;introduces Software Supply Chain Failures as a new #3 category, while social engineering attacks jumped 1,450% in the first half of 2025</li><li><strong>ChatGPT vulnerabilities</strong>&nbsp;are enabling attackers to steal private data from hundreds of millions of users through 0-click attacks and memory poisoning techniques</li><li><strong>The "two million cybersecurity jobs" narrative</strong>&nbsp;gets debunked with real data showing only 514,000 actual openings, explaining why qualified professionals struggle to find work</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="sturnus-banking-trojan-bypasses-whatsapp-telegram-and-signal-encryption"><a href="https://www.threatfabric.com/blogs/sturnus-banking-trojan-bypassing-whatsapp-telegram-and-signal?ref=mandos.io">Sturnus Banking Trojan Bypasses WhatsApp, Telegram and Signal Encryption</a></h3>
<ul>
<li>
<p>Security researchers discovered Sturnus, an <strong>Android</strong> banking trojan that bypasses end-to-end encryption by capturing content directly from device screens after decryption, allowing attackers to monitor communications on WhatsApp, Telegram, and Signal in real-time.</p>
</li>
<li>
<p>The malware provides extensive <strong>remote control</strong> capabilities including full device takeover, credential harvesting through fake banking app overlays, and the ability to black out screens while executing fraudulent transactions without victim knowledge.</p>
</li>
<li>
<p>Currently in development phase with limited deployment, Sturnus targets <strong>financial institutions</strong> across Southern and Central Europe and uses advanced techniques including AES encryption for C2 communications, VNC protocol for remote sessions, and Android Accessibility Service abuse for comprehensive device monitoring.</p>
</li>
</ul>
<h3 id="sneaky2fa-phishing-kit-adds-browser-in-the-browser-attack-capability"><a href="https://pushsecurity.com/blog/analyzing-the-latest-sneaky2fa-phishing-page/?ref=mandos.io">Sneaky2FA Phishing Kit Adds Browser-in-the-Browser Attack Capability</a></h3>
<ul>
<li>
<p>Push Security researchers discovered that the <strong>Sneaky2FA</strong> phishing-as-a-service kit has integrated Browser-in-the-Browser (BITB) techniques, creating fake Microsoft login pop-ups that mask the actual phishing URL while using <strong>reverse-proxy</strong> technology to steal credentials and bypass MFA.</p>
</li>
<li>
<p>The attack chain begins with <strong>Cloudflare Turnstile</strong> bot protection, followed by a fake Adobe Acrobat document prompt that loads a convincing Microsoft login form in an embedded browser window that adapts to the victim's operating system and browser type.</p>
</li>
<li>
<p>Sneaky2FA employs multiple <strong>evasion</strong> techniques including conditional loading to block security vendors, heavily obfuscated HTML/JavaScript code, domain rotation with randomized 150-character URLs, and anti-analysis methods that disable browser developer tools.</p>
</li>
</ul>
<h3 id="azure-neutralizes-record-breaking-15-tbps-ddos-attack"><a href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/defending-the-cloud-azure-neutralized-a-record-breaking-15-tbps-ddos-attack/4470422?ref=mandos.io">Azure Neutralizes Record-Breaking 15 Tbps DDoS Attack</a></h3>
<ul>
<li>
<p>Azure DDoS Protection automatically detected and mitigated a massive <strong>15.72 Tbps</strong> attack on October 24, 2025, targeting a single endpoint in Australia while maintaining uninterrupted service availability for customer workloads.</p>
</li>
<li>
<p>The attack originated from the <strong>Aisuru</strong> botnet, a Turbo Mirai-class IoT botnet that exploited compromised home routers and cameras across residential ISPs in the United States and other countries.</p>
</li>
<li>
<p>The multi-vector assault involved extremely high-rate <strong>UDP floods</strong> launched from over 500,000 source IPs with minimal source spoofing and random source ports, making it the largest DDoS attack ever observed in the cloud.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ How Founders and CTOs Can Build a Security Program in 90 Days (Without Losing Their Mind) ]]></title>
        <description><![CDATA[ Build an ISO 27001 and SOC 2-aligned security program in 90 days to win enterprise deals. Practical guide for founders and CTOs with limited time. ]]></description>
        <link>https://mandos.io/blog/how-founders-and-ctos-can-build-a-security-program-in-90-days-without-losing-their-mind/</link>
        <guid isPermaLink="false">691ef2c0beab250001e479db</guid>
        <category><![CDATA[ Fractional CISO ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 20 Nov 2025 12:50:36 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/best-fractional-CISO-europe-90-day-security-program-framework.png" medium="image"/>
        <content:encoded><![CDATA[ <p>I've spent 13 years building security programs for Forbes Cloud 100 FinTech, banking, and FMCG companies, so let me be honest with you.</p><p>Most founders and CTOs approach building security programs the wrong way. Usually, they are either:</p><ol><li>Trying to become security experts themselves (impossible while running a company)</li><li>Hiring Big 4 consultants who optimize for billable hours, not business outcomes</li><li>Procrastinating until an enterprise deal forces their hand (then panicking)</li></ol><p>What most people don’t say is that you don’t have<strong>&nbsp;to become a security expert to build a security program</strong>. You should focus on your product and business, while someone with experience builds the security foundation that helps you win enterprise deals.</p><p>In this guide, I will show you how to build a security program aligned with ISO 27001 and SOC 2 in 90 days. You can do it yourself if you have the time and skills, or work with a fractional CISO if you want to stay focused on growing your business.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2026/01/6_resized-copy.png" alt="CTA Image" data-image-dimensions="180x225"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Want to build an enterprise-grade security program?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let me show you how working with a fractional CISO can unlock your business through pragmatic security leadership.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-real-problem-founders-and-ctos-drowning-in-security">The Real Problem: Founders and CTOs Drowning in Security</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/The-Real-Problem_-Founders-and-CTOs-Drowning-in-Security.svg" class="kg-image" alt="" loading="lazy" width="732" height="540"></figure><p>Here is what happens all the time:</p><p><strong>Month 1:</strong>&nbsp;The enterprise prospect sends a 200-question security questionnaire. CTO spends 3 days answering it (poorly). Deal stalls.</p><p><strong>Month 2:</strong>&nbsp;Board asks about security posture for Series B. Founder spends 2 weeks researching ISO 27001 requirements. Feels overwhelmed. Nothing gets implemented.</p><p><strong>Month 3:</strong>&nbsp;Another enterprise deal blocked. CTO realizes they need "someone" to handle security. Starts 6-month search for full-time CISO. Meanwhile, deals keep dying.</p><p><strong>Month 6:</strong>&nbsp;Still no CISO hire. €5-10M in enterprise pipeline blocked. Competitors with working security programs win the deals.</p><p>Sound familiar?</p><p>The hard truth is that building a security program takes a full-time effort for 90 days. As a founder or CTO, you likely don’t have that kind of time. You need to build your product, lead your team, and grow your business.</p><h2 id="what-security-program-actually-means">What "Security Program" Actually Means</h2><p>Let’s be clear about what we’re building. A security program is not:</p><ul><li>❌ A pile of security tools</li><li>❌ A checkbox compliance exercise</li><li>❌ Perfect, enterprise-grade security architecture</li><li>❌ A guarantee you'll never be breached</li></ul><p>A security program IS:</p><ul><li>✅ Documented policies and procedures that show you take security seriously</li><li>✅ Essential technical controls that actually reduce risk</li><li>✅ Evidence collection systems that prove you do what you claim</li><li>✅ Incident response capability when (not if) something goes wrong</li><li>✅ Clear answers to enterprise security questionnaires</li></ul><p>This approach is what helps you win enterprise deals. It’s not about being perfect, but about showing real progress and maturity.</p><h2 id="the-90-day-security-program-framework">The 90-Day Security Program Framework</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/best-fractional-CISO-europe-90-day-security-program-framework.svg" class="kg-image" alt="" loading="lazy" width="1104" height="552"></figure><p>Whether you do this yourself or work with a fractional CISO, here’s the plan:</p><h3 id="month-1-foundation-weeks-1-4">Month 1: Foundation (Weeks 1-4)</h3><p><strong>Week 1: Rapid Assessment</strong></p><ul><li>Catalog what security measures already exist</li><li>Identify gaps that block enterprise deals</li><li>Prioritize based on actual customer questionnaires you've received</li><li>Define "done" criteria aligned to ISO 27001 and SOC 2</li></ul><p><strong>Time investment if DIY:</strong>&nbsp;40-60 hours (mostly your time)<br><strong>Time investment with Fractional CISO:</strong>&nbsp;4-6 hours (your strategic input only)</p><p><strong>Weeks 2-4: Essential Controls Implementation</strong>The 34 controls that enterprise buyers actually care about:</p><ul><li>Information security policy</li><li>Asset inventory</li><li>Access control &amp; authentication</li><li>Change management process</li><li>Backup procedures (tested, not theoretical)</li><li>Incident response plan</li><li>Risk assessment framework</li><li>Vendor/third-party risk management</li><li>Security awareness training</li><li>Audit logging &amp; monitoring</li></ul><p>You don’t need all 114 controls or a perfect setup. Focus on the essential controls that answer most enterprise security questions.</p><p><strong>Time investment if DIY:</strong>&nbsp;120-160 hours (CTO + engineering team)<br><strong>Time investment with Fractional CISO:</strong>&nbsp;15-20 hours (review and decisions only)</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2026/01/6_resized-copy.png" alt="CTA Image" data-image-dimensions="180x225"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Want to build an enterprise-grade security program?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let me show you how working with a fractional CISO can unlock your business through pragmatic security leadership.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h3 id="month-2-documentation-and-automation-weeks-5-8">Month 2: Documentation and Automation (Weeks 5-8)</h3><p><strong>Weeks 5-6: Policy Documentation Sprint</strong>Write essential policies. Critical ones:</p><ul><li>Information security policy</li><li>Access control policy</li><li>Acceptable use policy</li><li>Incident response policy</li><li>Business continuity policy</li><li>Data protection policy</li><li>Vendor management policy</li><li>Change management policy</li></ul><p><strong>This is where doing it yourself gets tough.</strong>&nbsp;Writing policies from scratch is why these projects can take up to 18 months. You need templates you can adjust and someone who understands what auditors really want, instead of over-complicating things.</p><p><strong>Time investment if DIY:</strong>&nbsp;80-100 hours (plus time learning what "good" looks like)<br><strong>Time investment with Fractional CISO:</strong>&nbsp;8-12 hours (review and approval only)</p><p><strong>Weeks 7-8: Evidence Automation Setup</strong>Implement compliance automation tools (Vanta, Drata, Tugboat - €24-48K/year) and connect them to:</p><ul><li>Cloud infrastructure (AWS, Azure, GCP)</li><li>Identity provider (Okta, Google Workspace)</li><li>Development tools (GitHub, GitLab)</li><li>Communication tools (Slack)</li><li>HR systems</li></ul><p>Automation can remove 80% of manual compliance work. Without it, you might spend over 160 hours each quarter collecting evidence by hand.</p><p><strong>Time investment if DIY:</strong>&nbsp;40-60 hours (figuring out integrations)<br><strong>Time investment with Fractional CISO:</strong>&nbsp;4-6 hours (decisions on tool selection)</p><h3 id="month-3-validation-and-preparation-weeks-9-12">Month 3: Validation and Preparation (Weeks 9-12)</h3><p><strong>Weeks 9-10: Internal Gap Assessment</strong>Review your program against ISO 27001 and SOC 2 requirements:</p><ul><li>Policy completeness</li><li>Evidence availability</li><li>Control effectiveness</li><li>Documentation accuracy</li><li>Team's understanding of procedures</li></ul><p><strong>Weeks 11-12: Refinement</strong></p><ul><li>Fix identified gaps</li><li>Prepare evidence documentation</li><li>Train team on security procedures</li><li>Create response templates for common security questions</li></ul><p><strong>Time investment if DIY:</strong>&nbsp;60-80 hours<br><strong>Time investment with Fractional CISO:</strong>&nbsp;10-15 hours (strategic reviews)</p><p>By week 12, you’ll have a&nbsp;<strong>working security program</strong>&nbsp;that matches ISO 27001 and SOC 2 standards. It may not be fully audit-ready yet, but it will be ready for security conversations with enterprise customers and for addressing their questions.</p><h2 id="the-brutal-time-math-diy-vs-fractional-ciso">The Brutal Time Math: DIY vs Fractional CISO</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/diy-vs-fractional-ciso.jpg" class="kg-image" alt="diy vs fractional ciso" loading="lazy" width="1600" height="896" srcset="https://mandos.io/content/images/size/w600/2025/11/diy-vs-fractional-ciso.jpg 600w, https://mandos.io/content/images/size/w1000/2025/11/diy-vs-fractional-ciso.jpg 1000w, https://mandos.io/content/images/2025/11/diy-vs-fractional-ciso.jpg 1600w" sizes="(min-width: 720px) 720px"></figure><p>Let's be honest about what building this yourself actually costs:<strong>DIY Security Program (90 days):</strong></p><ul><li><strong>Your time:</strong>&nbsp;200-280 hours over 90 days (that's 20-30 hours per week)</li><li>Security engineer time: 120-160 hours (if you even have one)</li><li>Research and learning curve: 40-60 hours</li><li>Tool evaluation and setup: 40-60 hours</li><li><strong>Total: 400-560 hours of senior technical time</strong></li></ul><p><strong>That’s 10 to 14 weeks you could spend</strong>&nbsp;building your product, managing your team, and closing deals.<strong>With Fractional CISO (90 days):</strong></p><ul><li><strong>Your time:</strong>&nbsp;50-70 hours over 90 days (5-7 hours per week for strategic decisions only)</li><li>Fractional CISO handles: 150-180 hours of security program building</li><li>Engineering team: 40-60 hours (implementation only, no research)</li><li><strong>Your total: 90-130 hours</strong></li></ul><p><strong>You save 310 to 430 hours. That’s 8 to 11 weeks you can use for product work</strong>, hiring, fundraising, or closing enterprise deals.</p><h2 id="what-enterprise-buyers-actually-care-about">What Enterprise Buyers Actually Care About</h2><p>After supporting security discussions with JP Morgan, Commonwealth Bank, Google, Uber and dozens of enterprise buyers, here's what matters:<strong>They care about:</strong></p><ul><li>Can you articulate your security approach clearly?</li><li>Do you have documented processes we can review?</li><li>Can you show evidence (not just claims)?</li><li>Do you have a proper incident response?</li><li>Will you pass our security review without months of back-and-forth?</li></ul><p><strong>They don't care about:</strong></p><ul><li>Whether you implemented every possible control</li><li>Your specific tool choices (within reason)</li><li>Perfect security (impossible anyway)</li><li>How long did it take you to build the program</li></ul><p>A single vague answer can hurt trust. If you give three, you risk losing the deal.</p><p>The founder who can confidently say, "Yes, we have AES-256 encryption at rest, TLS 1.3 in transit. Here's our architecture overview," wins the deal over the founder who says, "Yes, we encrypt everything with industry best practices."</p><p>Being specific builds credibility, which helps you close deals.</p><h2 id="the-real-investment-what-this-actually-costs">The Real Investment: What This Actually Costs</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/The-Real-Investment_-What-This-Actually-Costs---visual-selection.svg" class="kg-image" alt="fractional CISO in Europe to wins enterprise customers" loading="lazy" width="858" height="492"></figure><p>Let's look at real numbers:</p><p><strong>DIY Security Program:</strong></p><ul><li>Your time: 280 hours × your hourly value (€200-500/hour?) = €56K-140K opportunity cost</li><li>Security engineer time: 180 hours × €150/hour = €27K</li><li>Compliance automation: €30-50K/year</li><li>Essential security tools: €50-100K/year</li><li><strong>Total first year: €163K-317K</strong></li></ul><p><strong>Fractional CISO Approach:</strong></p><ul><li>Fractional CISO: ~€12,800/month × 3 months = €38,400&nbsp;<em>(pricing depends on daily rate of a CISO)</em></li><li>Your time saved: 200+ hours for product/business</li><li>Compliance automation: €30-50K/year</li><li>Essential security tools: €50-100K/year</li><li><strong>Total first year: €118K-188K</strong></li></ul><p>You save €45K to €129K and keep over 200 hours of founder or CTO time focused on growing your business.</p><p><strong>Big 4 Consultant (for comparison):</strong></p><ul><li>Consulting fees: €120-200K</li><li>Timeline: 18 months (12 months slower)</li><li>Your time: 50-80 hours in endless meetings</li><li>Opportunity cost: 12 months of blocked enterprise deals = €3-20M pipeline at risk</li><li><strong>Total first year: €200-350K</strong></li></ul><p>The numbers speak for themselves. Unless you have 280 extra hours in the next 90 days, a fractional CISO is the quickest way to win enterprise deals.</p><h2 id="common-mistakes-that-kill-diy-programs">Common Mistakes That Kill DIY Programs</h2><p>I've watched dozens of smart CTOs try to build security programs themselves. Here's where they fail:</p><p><strong>Mistake #1: Trying to learn security while building it</strong></p><p>You're reading NIST frameworks, ISO 27001 standards, SOC 2 criteria, vendor documentation, and 50 blog posts with conflicting advice. This research alone takes 60-80 hours.A fractional CISO who's done this 50+ times knows exactly what works. No research phase. Just execution.</p><p><strong>Mistake #2: Over-engineering because you don't know what "good enough" looks like</strong></p><p>Technical people (myself included) want to build the "right" solution. So you spend 40 hours designing the perfect access control architecture when a simple implementation would pass every enterprise review.Trying to make everything perfect can stop you from finishing. Experience helps you know what to focus on and what to simplify.</p><p><strong>Mistake #3: Writing policies from scratch</strong></p><p>Policies are painful to write. They're also mostly template-able. But if you've never written an incident response policy before, you're staring at a blank page for 8-10 hours per policy.Someone who's written 500+ security policies can customize a template in 30 minutes.</p><p><strong>Mistake #4: Not knowing what evidence auditors actually need</strong></p><p>You collect everything "just in case." Your evidence repository has 10,000 files. When audit time comes, you can't find what you need.With the right guidance, you collect only what’s needed—no more, no less.</p><p><strong>Mistake #5: Treating it as a side project instead of a sprint</strong></p><p>"I'll work on the security program a few hours per week" never works. You lose context, make inconsistent decisions, and the project stretches to 9-12 months.Building a security program requires sustained focus for 90 days. Either dedicate your time (280 hours) or delegate to someone who will.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2026/01/6_resized-copy.png" alt="CTA Image" data-image-dimensions="180x225"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Want to build an enterprise-grade security program?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let me show you how working with a fractional CISO can unlock your business through pragmatic security leadership.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="why-fractional-ciso-makes-sense-not-full-time">Why Fractional CISO Makes Sense (Not Full-Time)</h2><p>At 30-500 employees, you don't need a full-time CISO. Here's why:</p><p><strong>Full-Time CISO:</strong></p><ul><li>Salary: €150-200K + equity</li><li>Search timeline: 4-6 months (during which deals are blocked)</li><li>Risk: They want to build an empire (3-5 person security team)</li><li>Overhead: Enterprise processes for startup = slowed velocity</li><li>Retention risk: Leave for FAANG after 18 months</li></ul><p><strong>Fractional CISO:</strong></p><ul><li>Cost: €12,800-19,200/month (2-3 days per week)</li><li>Start: 2 weeks (no search process)</li><li>Right-sized: Security appropriate for your stage</li><li>Flexibility: Scale up/down as needed</li><li>Experience: 13+ years immediately available</li></ul><p>After 90 days, most companies keep a fractional CISO engaged 1-2 days/month (€6,400-12,800/month) for:</p><ul><li>Monthly security reviews</li><li>Quarterly policy updates</li><li>Answering complex security questions from enterprise prospects</li><li>Strategic guidance as business evolves</li></ul><p>The total yearly cost for a fractional CISO (at 4 days/month) is €48K to €76.8K, compared to €180K to €250K for a full-time hire. You also get more flexibility and immediate expertise.</p><h2 id="the-mindset-shift-required">The Mindset Shift Required</h2><p>Building a security program in 90 days requires abandoning perfectionism:</p><p><strong>Old mindset:</strong></p><ul><li>"We need enterprise-grade security"</li><li>"I should learn security properly before building this"</li><li>"We should implement every control to be safe"</li><li>"Let me research best practices for 6 weeks first"</li></ul><p><strong>New mindset:</strong></p><ul><li>"We need demonstrable security that wins deals"</li><li>"I should delegate security to an expert so I can focus on the product"</li><li>"We implement controls that answer enterprise questions"</li><li>"Good enough wins deals, perfect never ships"</li></ul><p>After building programs for industry-leading companies, I’ve seen that the difference between success and failure isn’t technical skill. It’s the willingness to focus on business results instead of technical perfection.</p><h2 id="when-this-approach-makes-sense">When This Approach Makes Sense</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/do-this-and-don-t-do-that.jpg" class="kg-image" alt="when to build security program from scratch" loading="lazy" width="1600" height="896" srcset="https://mandos.io/content/images/size/w600/2025/11/do-this-and-don-t-do-that.jpg 600w, https://mandos.io/content/images/size/w1000/2025/11/do-this-and-don-t-do-that.jpg 1000w, https://mandos.io/content/images/2025/11/do-this-and-don-t-do-that.jpg 1600w" sizes="(min-width: 720px) 720px"></figure><p><strong>Do this if:</strong></p><ul><li>You're 30-500 employees</li><li>Enterprise deals blocked by security questions (€5-20M pipeline at risk)</li><li>Raising Series B+ (investors expect compliance)</li><li>Expanding to regulated industries</li><li>Your product handles sensitive customer data</li><li>You want to focus on the product, not become a security expert</li></ul><p><strong>Don't do this if:</strong></p><ul><li>You're under 30 employees (too early, focus on product-market fit)</li><li>No enterprise deals in the pipeline (no urgency = project fails)</li><li>You genuinely enjoy security and have 280+ hours spare</li><li>Consumer product with no enterprise buyers</li><li>You prefer 18-month "perfect" programs over 90-day "good enough"</li></ul><h2 id="what-happens-after-90-days">What Happens After 90 Days</h2><p>You have a working security program. Now what?</p><p><strong>Immediate capabilities:</strong></p><ul><li>Respond to enterprise security questionnaires confidently (3-5 days, not 3-4 weeks)</li><li>Pass enterprise security reviews without months of delays</li><li>Demonstrate to investors that you take security seriously</li><li>Baseline for ISO 27001 or SOC 2 certification (if you choose to pursue)</li></ul><p><strong>Ongoing maintenance (with automation):</strong></p><ul><li>Monthly security reviews: 4-8 hours</li><li>Quarterly policy updates: 8-12 hours</li><li>Annual program review: 40-60 hours</li><li><strong>Total: 80-100 hours/year</strong></li></ul><p>In comparison, manual compliance can take over 640 hours a year. That’s the difference between a CTO who can focus on the product and one who is stuck in compliance work.</p><p>Most companies engage a fractional CISO for 1-2 days/month (€1,000-1,600 per day, or €4,000-6,400 for 4 days/month, depending on your needs) for ongoing program management, complex security questions, and strategic guidance. Much cheaper than a full-time CISO, much more effective than struggling alone.</p><h2 id="the-alternative-what-happens-if-you-dont-build-this">The Alternative: What Happens If You Don't Build This</h2><p>Let's be direct about consequences:</p><p><strong>Without a security program:</strong></p><ul><li>Enterprise deals stall 4-8 weeks during security review</li><li>Prospects ask "Do you have ISO 27001?" → you say "working towards it" → deal dies</li><li>Security questionnaires take 3-4 weeks to answer poorly</li><li>Competitors with programs win your deals</li><li>Series B investors flag security as risk</li><li>You spend 200+ hours per year on reactive security questions</li></ul><p><strong>With a security program:</strong></p><ul><li>Enterprise security reviews: 3-5 days</li><li>Security questions answered confidently from documentation</li><li>Competitive advantage versus unprepared competitors</li><li>Investor confidence in due diligence</li><li>You focus on product and growth</li></ul><p>I've watched companies lose €5-20M deals because they couldn't demonstrate basic security maturity. Competitor with a working security program won. Same product. Same price. Different security posture.</p><h2 id="the-real-question-do-you-have-280-hours">The Real Question: Do You Have 280 Hours?</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/founder-and-CTO-presenting-security-growth-to-the-team.jpg" class="kg-image" alt="founder and CTO of B2B scale-up" loading="lazy" width="1600" height="896" srcset="https://mandos.io/content/images/size/w600/2025/11/founder-and-CTO-presenting-security-growth-to-the-team.jpg 600w, https://mandos.io/content/images/size/w1000/2025/11/founder-and-CTO-presenting-security-growth-to-the-team.jpg 1000w, https://mandos.io/content/images/2025/11/founder-and-CTO-presenting-security-growth-to-the-team.jpg 1600w" sizes="(min-width: 720px) 720px"></figure><p>That's what this comes down to.</p><p>Building a security program yourself takes 280+ hours over 90 days. That's reality.</p><p>You're a founder or CTO. Do you have 280 spare hours while running your company?If yes: Use this framework. Build it yourself. It works.If no (and you shouldn't): Delegate to someone who's done this 50+ times. Keep your 200+ hours for product, team, and deals.</p><p>The companies winning enterprise deals aren't the ones with perfect security. They're the ones who stopped treating security as a side project and made it a focused 90-day sprint.</p><p>Either dedicate your time or delegate to experience. Just don't let security keep blocking your enterprise pipeline.</p><hr><h2 id="frequently-asked-questions">Frequently Asked Questions</h2><p><strong>Q: Can we really build a working security program in 90 days?</strong></p><p>A: Yes - a foundational program aligned to ISO 27001 and SOC 2 frameworks that answers enterprise security questions. This is NOT the same as being audit-certified (that takes additional time). But it's absolutely sufficient to pass enterprise security reviews and win deals.</p><p><strong>Q: What's the minimum team size where this makes sense?</strong></p><p>A: 30+ employees with enterprise deals in your pipeline. For companies with fewer than 30 employees, focus on product-market fit. A security program can wait unless you're in a highly regulated industry or handling extremely sensitive data.</p><p><strong>Q: Should we hire a full-time CISO or use a fractional one?</strong></p><p>A: At 30-500 employees, fractional makes more sense. Typical day rate is €1,000-1,600, so for 4 days/month that's €4,000-6,400/month versus €150-200K/year + equity for full-time. You get 13+ years experience immediately vs 4-6 month search. No empire building, no retention risk. Most companies keep a fractional CISO after initial build for 1-2 days/month ongoing support.</p><p><strong>Q: Can a CTO build this without security expertise?</strong></p><p>A: Technically yes, but it costs 280+ hours of your time over 90 days. That's 10-14 weeks pulled away from product and business. Most CTOs don't have this time. Those who try end up either: (a) taking 9-12 months instead of 90 days, or (b) building something that doesn't actually answer enterprise questions because they're learning security while building it.</p><p><strong>Q: What if we can't dedicate resources for the full 90 days?</strong></p><p>A: Then wait until you can. Partial effort guarantees failure. Security program requires sustained focus for 90 days. A half-built security program is worse than no security program - it creates false confidence. Either commit fully or don't start at all.</p><p><strong>Q: How do we know which controls to implement?</strong></p><p>A: The 34 essential controls I outlined apply to almost every B2B technology company. These satisfy 90% of enterprise security questionnaires. The art is knowing which controls matter versus which are security theatre. This is where experience matters - someone who's reviewed 150+ enterprise security programs knows what buyers actually care about.</p><p><strong>Q: Won't this just be "checkbox compliance" without real security?</strong></p><p>A: Only if you treat it that way. The 34 essential controls ARE real security - they actually reduce risk. The difference is focusing on the controls that matter rather than implementing all 114 ISO controls (many of which don't apply to your business). Real security doesn't require perfection. It requires doing the important things well.</p><p><strong>Q: What about ISO 27001 or SOC 2 certification?</strong></p><p>A: This 90-day program creates the foundation for certification, but certification itself requires additional time: formal audit preparation (4-6 weeks) + external audit (4-8 weeks) = 120-180 days total timeline from start to certificate. Still dramatically faster than 18-month Big 4 timelines. But the business value comes immediately - you can answer enterprise security questions and win deals even before formal certification.</p><p><strong>Q: Can we maintain this ourselves after 90 days?</strong></p><p>A: Depends on your team's security expertise. Ongoing maintenance with automation is 80-100 hours/year. A technically strong CTO or senior engineer can handle this. However, most companies keep a fractional CISO engaged 1-2 days/month (€1,000-1,600 per day, or €4,000-6,400 for 4 days/month) for strategic guidance, complex security questions from prospects, and program evolution as business grows.</p><p><strong>Q: What if an enterprise prospect needs answers next week?</strong></p><p>A: Then you're in reactive mode. Best approach: book a 30-minute strategy call, I'll assess your situation, and we'll identify the fastest path to answering their specific questions while laying the foundation for a complete program. I've helped companies unstick deals in 2-3 weeks with focused responses, then built a full program over the following 90 days.</p><p><strong>Q: What's your actual track record with this approach?</strong></p><p>A: 100% first-time audit pass rate for companies I've supported through certification. Timeline from start to working program: 90-120 days average. Companies using this approach have won enterprise deals with Goldman Sachs, Commonwealth Bank, and other tier-1 buyers. Check my LinkedIn for recommendations from CTOs and founders who've worked with me.</p><p><strong>Q: Why should we trust your approach versus Big 4 consultants?</strong></p><p>A: Big 4 consultants optimize for billable hours. I optimize for business outcomes (winning enterprise deals). I've done this 50+ times across Forbes Cloud 100, banking, FinTech, and FMCG. My incentive is referrals from successful clients, not extending engagements. I want you winning deals in 90 days, not paying consulting fees for 18 months.</p><p><strong>Q: What if we need this faster than 90 days?</strong></p><p>A: 90 days is aggressive but realistic. 60 days is possible, but requires total commitment and some corners get cut. Under 60 days, you're creating risk, not managing it. If you have an urgent enterprise deal, a better approach is to stabilize the immediate situation with targeted responses (2-3 weeks), then build a proper program (90 days). Don't sacrifice quality for impossible timelines.</p><hr><p><strong>Ready to stop losing enterprise deals to security reviews?</strong></p><p>Book a 30-minute strategy call. I'll assess your current state, show you exactly what you need to win your enterprise deals, and map the fastest path to get there.</p><p>You'll walk away knowing:</p><ul><li>Which security gaps are actually blocking your deals (vs nice-to-have)</li><li>Realistic timeline for your situation</li><li>Whether DIY or fractional CISO makes sense for you</li><li>Exact next steps</li></ul><p>No pitch. No pressure. Just actionable guidance from someone who's done this 50+ times.</p><p><a href="https://cal.com/nikolozk/30min?ref=mandos.io"><strong>Book your free 30-minute strategy call</strong></a></p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #130: Amazon Detects APT Zero-Days, Claude AI Exploited for Espionage, $1M-$10M Insider Losses ]]></title>
        <description><![CDATA[ Chinese actors autonomously attacked 30 major tech firms using manipulated AI. 41% of breached orgs lost millions to insiders. DPRK targets developers via JSON storage services. ]]></description>
        <link>https://mandos.io/newsletter/brief-130-amazon-detects-apt-zero-days-claude-ai-exploited-for-espionage-1m-10m-insider-losses/</link>
        <guid isPermaLink="false">69185c15eaa8200001bbf38c</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 16 Nov 2025 17:00:08 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/46.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>Chinese state actors</strong>&nbsp;just pulled off the first largely autonomous AI-driven cyber espionage campaign, letting Claude Code handle 80-90% of their attack operations from start to finish</li><li><strong>77% of organizations</strong>&nbsp;dealt with insider-driven data loss in the past 18 months, yet most still can't see how their own users are handling sensitive data</li><li><strong>Amazon's honeypot service</strong>&nbsp;caught an APT exploiting Cisco and Citrix zero-days before they were publicly known, using sophisticated custom web shells with advanced evasion techniques</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days"><a href="https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/?ref=mandos.io">Amazon Discovers APT Exploiting Cisco and Citrix Zero-Days</a></h3>
<ul>
<li>
<p>Amazon's MadPot honeypot service detected an <strong>APT</strong> exploiting CVE-2025-5777 (Citrix Bleed Two) and CVE-2025-20337 (Cisco ISE) as <strong>zero-days</strong> before public disclosure, indicating sophisticated vulnerability research capabilities.</p>
</li>
<li>
<p>The threat actor deployed a custom <strong>web shell</strong> disguised as "IdentityAuditAction" that operated in-memory with advanced evasion techniques including Java reflection, DES encryption, and non-standard Base64 encoding to avoid detection.</p>
</li>
<li>
<p>The campaign targeted critical <strong>identity</strong> management and network access control infrastructure, demonstrating pre-authentication remote code execution capabilities that provided administrator-level access to compromised Cisco ISE deployments.</p>
</li>
</ul>
<h3 id="dprk-actors-use-json-storage-services-in-contagious-interview-campaign"><a href="https://blog.nviso.eu/2025/11/13/contagious-interview-actors-now-utilize-json-storage-services-for-malware-delivery/?ref=mandos.io">DPRK Actors Use JSON Storage Services in Contagious Interview Campaign</a></h3>
<ul>
<li>
<p>North Korean threat actors behind the Contagious Interview campaign have evolved their tactics to use legitimate <strong>JSON</strong> storage services like JSON Keeper, JSONsilo, and npoint.io to host and deliver malware disguised as interview <strong>demo</strong> projects targeting software developers.</p>
</li>
<li>
<p>The campaign uses <strong>social engineering</strong> through fake recruiter profiles on LinkedIn to distribute trojanized Node.js projects containing base64-encoded URLs that fetch obfuscated JavaScript code leading to BeaverTail and <strong>InvisibleFerret</strong> malware deployment.</p>
</li>
<li>
<p>The malware chain includes a new component called Tsunami that establishes <strong>persistence</strong>, downloads Python if needed, and retrieves additional payloads from Pastebin with over 400 views indicating significant campaign success across multiple platforms including Windows, Linux, and macOS.</p>
</li>
</ul>
<h3 id="operation-endgame-takes-down-1025-malware-servers-in-international-cybercrime-crackdown"><a href="https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down?ref=mandos.io">Operation Endgame Takes Down 1025 Malware Servers in International Cybercrime Crackdown</a></h3>
<ul>
<li>
<p>Law enforcement from 11 countries coordinated by <strong>Europol</strong> dismantled three major cybercrime enablers including the <strong>Rhadamanthys</strong> infostealer, VenomRAT remote access trojan, and Elysium botnet between November 10-13, 2024.</p>
</li>
<li>
<p>The operation resulted in one <strong>arrest</strong> in Greece, 11 location searches across three countries, and the seizure of 20 domains along with over 1,025 servers that had infected hundreds of thousands of victims worldwide.</p>
</li>
<li>
<p>The dismantled infrastructure contained several million stolen credentials and over 100,000 <strong>crypto</strong> wallets potentially worth millions of euros, with victims now able to check their exposure through dedicated websites established by authorities.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ What is a Fractional CISO and How Can It Help European B2B Companies? ]]></title>
        <description><![CDATA[ Fractional CISO services are essential for growing B2B companies to win enterprise customers and grow with confidence. In this article we look at what is fractional CISO, how it works and associated costs. ]]></description>
        <link>https://mandos.io/blog/what-is-a-fractional-ciso-and-how-can-it-help-european-b2b-companies/</link>
        <guid isPermaLink="false">6915b891eb051b00018d63a8</guid>
        <category><![CDATA[ Fractional CISO ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 13 Nov 2025 12:21:42 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/What-is-a-Fractional-CISO-and-How-Can-It-Help-European-B2B-Companies-2-1.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Many European B2B companies make a costly mistake by attempting to hire a full-time CISO before they are adequately prepared.</p><p>After 13 years of building security programs for Forbes Cloud 100 companies, banks, and B2B scale-ups, I've reviewed 150+ security programs. The pattern is clear: most growing companies need strategic security leadership, but hiring a full-time CISO too early can kill momentum and drain resources.</p><p>Here is what works best.</p><h2 id="the-full-time-ciso-problem-nobody-talks-about">The Full-Time CISO Problem Nobody Talks About</h2><p>For B2B companies with €5-50M in revenue, hiring a full-time CISO is often not the best choice.</p><p>This is because hiring a full-time CISO costs €150-250K per year, plus equity, benefits, and a lengthy hiring process, for someone who may spend much of their time on tasks that are not yet needed. Most companies at this stage do not have a mature enough security program to require full-time strategic leadership.</p><p>I've seen CTOs burn out trying to handle security between product sprints.&nbsp;</p><p>I've watched founders lose €20M deals because they couldn't answer basic security questionnaires.&nbsp;</p><p>And I've seen companies hire expensive CISOs who leave within 18 months because there wasn't enough scope for them to make a meaningful impact.</p><p>The primary issue is that European B2B companies must meet enterprise-level security requirements, but often lack the same resources as large enterprises.</p><h2 id="what-is-a-fractional-ciso">What is a Fractional CISO?</h2><p>A fractional CISO (Chief Information Security Officer) is a senior security executive who works with multiple companies on a part-time, strategic basis. Think of it as having a battle-tested security leader available for 1-3 days per week, rather than five.</p><p>However, not all fractional CISOs offer the same level of expertise or service.</p><p>Many security consultants have never built a complete security program. They may audit your current state, produce a lengthy report that is never implemented, and then move on. This approach is costly and does not provide real value.</p><p>A true fractional CISO goes beyond giving advice. They help build your security program, guide you through ISO 27001 and SOC 2 audits, improve your responses to vendor questionnaires, present to your board, and make security decisions that support business growth.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="why-european-b2b-companies-need-different-security-leadership">Why European B2B Companies Need Different Security Leadership</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/Why-European-B2B-Companies-Need-Different-Security-Leadership---visual-selection.svg" class="kg-image" alt="European B2B security challenges" loading="lazy" width="624" height="725"></figure><p>European B2B companies encounter challenges that are not covered by typical American approaches:</p><p><strong>Regulatory complexity, including the</strong>&nbsp;GDPR, NIS2, sector-specific requirements, and multiple jurisdictions, creates compliance burdens that American companies don't face. Your customers in Germany have different security expectations than those in the Netherlands or the UK.</p><p><strong>European enterprises typically demand ISO 27001</strong>&nbsp;or equivalent certifications before initiating procurement conversations. In the US, many deals close without certifications. In Europe, no certification often means no conversation.</p><p><strong>European B2B companies typically have smaller teams and tighter budgets</strong>&nbsp;compared to their US counterparts at the same revenue stage. You can't throw money at the problem; you need smart, efficient security programs.</p><p><strong>Operating across EU member states means navigating different data residency requirements</strong>, local regulations, and varying security maturity expectations from customers.</p><p>I've navigated M&amp;A transactions worth over €150M, supported deals with the world’s largest and most highly regulated organizations, and built security programs that helped scale from €10M to over €100M in revenue. The companies that succeed don't copy Silicon Valley playbooks; they build pragmatic security programs that fit European market realities.</p><h2 id="the-real-roi-what-fractional-ciso-services-actually-deliver">The Real ROI: What Fractional CISO Services Actually Deliver</h2><p>The most important factor is the impact on revenue.</p><p><strong>Deals that close</strong>: Enterprise procurement committees require evidence of security maturity. When you can demonstrate a functioning security program, answer questionnaires confidently, and provide ISO 27001 or SOC 2 certification, deals that would have stalled for 6-12 months close in weeks.</p><p>I've watched sales teams lose €5-20M opportunities because "security maturity is insufficient." Then, I watched those same companies close identical deals 90 days after implementing proper security governance.</p><p>The difference? They could finally answer the questions enterprise buyers actually ask.</p><p><strong>Investor confidence</strong>: Series B investors now mandate security diligence. A fractional CISO provides the strategic oversight that satisfies investors without the full-time cost. In my experience, companies with clear security leadership receive better valuations and smoother due diligence processes.</p><p><strong>Cost optimization</strong>: A fractional CISO working 2 days per week costs anywhere between €10,000 and €14,000/month. A full-time CISO costs €17-20K+/month in salary alone, plus 3-6 months to hire, plus equity, plus benefits. You save 40-70% while getting 13+ years of proven experience starting immediately.</p><p>But here's the real ROI nobody calculates: the opportunity cost of getting security wrong. Every week without a demonstrable security capability costs you €200-500K in stalled pipeline. Competitors with mature security stories are winning the deals you pioneered.</p><h2 id="how-fractional-ciso-services-work-the-honest-version">How Fractional CISO Services Work (The Honest Version)</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/How-Fractional-CISO-Services-Work--The-Honest-Version-.svg" class="kg-image" alt="How Fractional CISO Services Work (The Honest Version)" loading="lazy" width="858" height="492"></figure><p>Most consultants will promise you the world in a glossy PDF and call themselves advisors without touching anything. However, most consultants are wrong because that’s not a service but rather an AI-generated output.</p><p>I'm going to explain exactly how pragmatic and customer-driven fractional CISOs work and what you can expect. Here is how we approach it at Mandos:</p><p><strong>Phase 1 (Weeks 0-4): Rapid Assessment.&nbsp;</strong>We assess your current security posture, identify immediate risks, and prioritize based on business impact. You get a clear roadmap of what needs fixing and why. No 200-page reports; just actionable priorities tied to your revenue goals.</p><p><strong>Phase 2 (Months 2-6): Enterprise-Ready Security.</strong>&nbsp;We build your security program alongside your technical teams. This means implementing controls, documenting policies, establishing governance processes, and preparing for compliance certifications. The goal is to pass enterprise security reviews and close deals.</p><p><strong>Phase 3 (Months 4-8): Certification.</strong>&nbsp;Navigate ISO 27001 or SOC 2 audits with minimal disruption to your team. We manage auditor relationships, evidence collection, and remediation. Our track record: 100% first-time pass rate on audits.</p><p><strong>Phase 4 (Month 7+): Ongoing Governance.</strong>&nbsp;Once certified, you require continuous leadership, including board reporting, program maturity, regulatory adaptation, and strategic decision-making. This is where fractional CISO services deliver long-term value: ongoing executive oversight without full-time cost.</p><p><strong>What this isn't</strong>:</p><ul><li>Not a security audit that produces reports nobody implements</li><li>Not a compliance checkbox exercise that doesn't improve actual security</li><li>Not vendor-agnostic consulting that recommends €500K tool stacks</li><li>Not someone who disappears after the PowerPoint presentation</li></ul><p><strong>What this is</strong>: Real security leadership that makes decisions, implements solutions, and drives business outcomes.</p><h2 id="the-three-critical-use-cases-for-fractional-ciso-services">The Three Critical Use Cases for Fractional CISO Services</h2><p>After working with dozens of B2B companies, three scenarios consistently drive the need for fractional CISO services:</p><h3 id="1-deal-driven-security-requirements">1. Deal-Driven Security Requirements</h3><p>Your sales team is in late-stage negotiations with an enterprise customer. Procurement sends a 300-question security assessment. Your CTO doesn't have time to answer it, and your team doesn't know how to proceed.</p><p>This is the most common trigger. Enterprise customers now require evidence of security maturity before signing contracts. If you can't demonstrate a functioning security program, the deal dies, regardless of how good your product is.</p><p>A fractional CISO responds to RFPs, manages enterprise security conversations, and provides the documentation that procurement committees demand. The goal is to remove security as a blocker to revenue.</p><h3 id="2-compliance-certifications-iso-27001-soc-2-nis2">2. Compliance Certifications (ISO 27001, SOC 2, NIS2)</h3><p>Investors mandate compliance frameworks. Enterprise contracts require certifications. Regulations impose penalties for non-compliance.</p><p>But Big 4 consultants quote €150K+ and 18-month timelines. Your 25-person team is already at capacity. Pulling engineers away from product development to build compliance programs can kill momentum.</p><p>A fractional CISO implements lean, business-focused compliance programs that satisfy auditors without enterprise overhead. I achieved ISO 27001 and SOC 2 certifications within 6-8 months, with 100% first-time pass rates, because the goal is certification that enables business, not security theater.</p><h3 id="3-ma-security-integration">3. M&amp;A Security Integration</h3><p>You're acquiring a company or being acquired. Security due diligence reveals gaps. Integration requires consolidating security programs, tools, and teams to achieve a comprehensive security approach.</p><p>I've conducted security assessments for dozens of mergers and acquisitions (M&amp;A) transactions. The companies that succeed treat security as a business enabler during M&amp;A, not an afterthought. A fractional CISO manages due diligence, identifies risks, and leads post-merger integration without derailing the deal timeline.</p><h2 id="what-to-look-for-in-a-fractional-ciso-red-flags-and-green-flags">What to Look for in a Fractional CISO (Red Flags and Green Flags)</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/11/What-to-Look-for-in-a-Fractional-CISO--Red-Flags-and-Green-Flags-.svg" class="kg-image" alt="What to Look for in a Fractional CISO (Red Flags and Green Flags)" loading="lazy" width="732" height="576"></figure><p>The security consulting market is rife with individuals selling snake oil. Here's how to tell the difference between real expertise and expensive PowerPoints:</p><p><strong>Red flags:</strong></p><ul><li>Promises ISO 27001 certification in 6 weeks (impossible)</li><li>Leads with tool recommendations before understanding your business</li><li>Uses fear-based selling ("You'll get breached tomorrow!")</li><li>Can't explain complex security concepts in simple business terms</li><li>Has never built a complete security program from scratch</li><li>Focuses on compliance theater instead of business outcomes</li></ul><p><strong>Green flags:</strong></p><ul><li>Battle-tested experience building security programs at scale</li><li>Clear track record of audit success (not just consulting work)</li><li>Can explain security ROI in business terms, not technical jargon</li><li>Understands European regulatory requirements (GDPR, NIS2, sector-specific)</li><li>Has navigated M&amp;A security due diligence</li><li>Focuses on pragmatic solutions that fit your growth stage</li></ul><p>Here's my bias: I've built security programs for Forbes Cloud 100 FinTech companies, navigated over €150M in M&amp;A transactions, and achieved 100% first-time pass rates on ISO 27001 and SOC 2 audits. I understand what enterprise buyers demand because I've helped companies close deals with the world’s largest and most highly regulated organizations.</p><p>However, these credentials don't matter if the approach doesn't align with your company's needs. The right fractional CISO understands your business context, aligns security with revenue goals, and builds programs that scale with your growth, not against it.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-investment-what-fractional-ciso-services-actually-cost">The Investment: What Fractional CISO Services Actually Cost</h2><p>Let me give you the numbers consultants usually hide until the third meeting.</p><p><strong>Full-time CISO cost:</strong></p><ul><li>Salary: €150-250K annually (€12.5-20.8K/month)</li><li>Benefits, equity, taxes: +30-40%</li><li>Recruitment fees: €30-50K</li><li>Time to hire and onboard: 4-6 months</li><li>Risk of wrong hire: High (18-month average tenure if mismatched)</li></ul><p><strong>Total first-year cost: €200-350K+, with 6 months before productivity</strong></p><p><strong>Fractional CISO costs,</strong>&nbsp;on the other hand, range from €10,000 to €14,000/month depending on the engagement scope, region, and time commitment. Most engagements are structured as monthly retainers rather than hourly billing, providing predictable costs and strategic continuity. (At least that’s how we prefer to deliver maximum value to customers here at Mandos.)</p><p>In exchange, you get <strong>immediate productivity, 40-70% cost savings, and a proven track record</strong>. The investment pays for itself when you close the first enterprise deal that was previously blocked by security concerns.</p><h2 id="when-should-you-actually-hire-a-full-time-ciso">When Should You Actually Hire a Full-Time CISO?</h2><p>Here's the honest answer: when you have the scope and resources to justify one.</p><p><strong>Consider a full-time CISO when:</strong></p><ul><li>Revenue exceeds €100M with a mature security program already established.</li><li>You have a security team of three or more people who require daily leadership.</li><li>You're operating in multiple regions with complex compliance obligations.</li><li>Board members and investors specifically mandate full-time security leadership.</li></ul><p><strong>Stick with a fractional CISO when:</strong></p><ul><li>Revenue is €10-100M M and the security program is still being built.</li><li>The CTO is handling security reactively, balancing it with product priorities.</li><li>You need enterprise security capability but not full-time overhead.</li><li>Compliance certifications are driving the immediate need.</li><li>You're navigating mergers and acquisitions (M&amp;A) or a major transformation.</li><li>You want flexibility.</li></ul><p>The mistake most companies make? Hiring a full-time CISO too early, burning cash on someone who doesn't have enough scope, then watching them leave within 18 months. Or waiting too long, losing deals to competitors with better security maturity.</p><p>Fractional CISO services bridge that gap, providing strategic leadership when you need it most, at a cost structure that fits your growth stage.</p><hr><h2 id="faq-fractional-ciso-services-for-european-b2b-companies">FAQ: Fractional CISO Services for European B2B Companies</h2><p><strong>What is a fractional CISO, and how is it different from a security consultant?</strong></p><p>A fractional CISO is a senior security executive who works with your company on a regular, part-time basis (typically 1-3 days per week). Unlike consultants who audit and advise, a fractional CISO executes, building security programs, making strategic decisions, managing audits, and providing ongoing leadership and guidance. Think of it as having an experienced CISO on your executive team without the full-time cost.</p><p><strong>What is the cost of a fractional CISO in Europe?</strong></p><p>Fractional CISO services typically range from €10,000 to €14,000/month, depending on the engagement level (1-3 days per week). This represents 40-70% savings compared to hiring a full-time CISO (€150-250K annually plus benefits, equity, and recruitment costs). The investment pays for itself when you close enterprise deals that were previously blocked by security requirements.</p><p><strong>How long does it take to get ISO 27001 or SOC 2 certified with a fractional CISO?</strong></p><p>With a pragmatic, business-focused approach, ISO 27001 or SOC 2 certification typically takes 6-8 months from start to successful audit completion. This timeline assumes reasonable starting maturity and dedicated internal resources to implement controls. Companies with strong technical teams can achieve certification faster; those with limited capacity may take longer. Beware of consultants promising 6-week certifications, they're selling fantasy.</p><p><strong>Can a fractional CISO work remotely, or must they be on-site?</strong></p><p>Most fractional CISO work is conducted remotely with periodic on-site visits for key activities (audit preparation, board presentations, major incidents). For European B2B companies, this model works well: you get experienced leadership without geographic limitations. Critical situations (major security incidents, audit weeks) may require on-site presence, but day-to-day strategic work happens effectively remotely.</p><p><strong>What's the difference between a fractional CISO and a vCISO?</strong></p><p>These terms are often used interchangeably, but there's a subtle distinction: "fractional CISO" typically implies a senior executive working with a limited number of clients (3-5 companies), providing deep engagement and strategic leadership. "vCISO" (virtual CISO) sometimes refers to lower-touch, more distributed consulting models. The key question: Is this person making executive-level security decisions for your company, or just providing advice?</p><p><strong>How do I know if my B2B company needs a fractional CISO?</strong></p><p>You need fractional CISO services if: (1) Enterprise customers are asking security questions you can't answer confidently, (2) You're pursuing ISO 27001 or SOC 2 certification, (3) Investors are demanding security maturity, (4) Your CTO is drowning in security work, or (5) You're navigating M&amp;A that requires security due diligence. If security has become a blocker to revenue, it's time for strategic leadership.</p><p><strong>What industries benefit most from fractional CISO services?</strong></p><p>B2B SaaS, FinTech, data platforms, enterprise software, enterprise AI, and any technology company selling to enterprise customers benefit most from fractional CISO services. These companies face stringent security requirements from buyers, yet they operate with lean teams and tight budgets. Industries with strong regulatory requirements (financial services, healthcare, critical infrastructure) also benefit, though may eventually need full-time security leadership as they scale.</p><p><strong>How many companies does a fractional CISO typically work with?</strong></p><p>An effective fractional CISO typically works with 3-5 companies simultaneously, dedicating 1-3 days per week to each client. This balance ensures deep engagement and strategic impact while maintaining cost efficiency. Beware of "fractional CISOs" working with 10+ companies; they're spreading themselves too thin to provide meaningful leadership.</p><p><strong>Can a fractional CISO help with NIS2 compliance for European companies?</strong></p><p>Yes. NIS2 (Network and Information Security Directive 2) applies to many European B2B companies, particularly those in critical sectors or providing digital services. A fractional CISO can assess your NIS2 obligations, implement required security measures, establish governance processes, and ensure ongoing compliance. This is increasingly important as EU member states enforce NIS2 requirements with serious penalties for non-compliance.</p><p><strong>What happens during a typical fractional CISO engagement?</strong></p><p>A typical engagement follows four phases: (1) Rapid assessment of your current security posture and business priorities (weeks 0-4), (2) Building enterprise-ready security program and preparing for certifications (months 2-6), (3) Navigating audits and achieving ISO 27001/SOC 2 certification (months 4-8), and (4) Ongoing governance, board reporting, and continuous program maturity (month 7+). The timeline adjusts based on your immediate needs and existing maturity.</p><p><strong>How do I measure ROI on fractional CISO services?</strong></p><p>ROI shows up in three ways: (1) Revenue impact - enterprise deals that close faster because you can demonstrate security maturity, (2) Cost avoidance - not hiring a full-time CISO saves €100-200K+ annually while getting proven expertise immediately, and (3) Risk reduction - avoiding compliance penalties, data breaches, and reputational damage. Most companies see positive ROI within the first 90 days when security stops blocking enterprise sales.</p><p><strong>What's the typical contract length for fractional CISO services?</strong></p><p>Initial engagements typically run 6-12 months to build and certify a complete security program. After achieving initial goals (certification, enterprise readiness, compliance), many companies continue with ongoing governance at reduced time commitment (1 day/week). The goal is to build a security capability that eventually becomes self-sustaining, rather than creating a permanent dependency.</p><hr><h2 id="the-bottom-line-on-fractional-ciso-services">The Bottom Line on Fractional CISO Services</h2><p>European B2B companies face a fundamental challenge: enterprise customers demand security maturity, but they lack the necessary enterprise resources.</p><p>Fractional CISO services solve this problem - providing battle-tested security leadership when you need it most, at a cost structure that fits your growth stage.</p><p>After 13 years of building security programs and reviewing over 150 B2B companies, I've learned what actually works: pragmatic security programs that unlock revenue, simplified compliance that satisfies auditors, and strategic leadership that scales with business growth.</p><p>The companies winning enterprise deals in 2025 aren't outspending competitors; they're out-executing them with smart security strategies.</p><p>If security is blocking your next enterprise deal, delaying your fundraising, or consuming your technical team's bandwidth, it's time to talk.</p><p><a href="https://cal.com/nikolozk/30min?ref=mandos.io"><strong>Book a complimentary 30-minute discovery call</strong></a>&nbsp;to explore whether fractional CISO services are a suitable fit for your organization. No sales pitch, just an honest conversation about your security challenges and whether I can help solve them.</p><p><strong>Nikoloz Kokhreidze</strong><br>Fractional CISO | Founder at Mandos<br>13+ years turning security roadblocks into competitive advantages</p><hr><p><em>Want to explore all Mandos services, security resources? Visit </em><a href="https://mandos.io/solutions" rel="noreferrer"><em>mandos.io/solutions</em></a></p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #129: 7 ChatGPT Vulnerabilities, New OWASP 2025 Top 10, 2 Million Jobs Myth ]]></title>
        <description><![CDATA[ Samsung Galaxy zero-day exploited by LANDFALL spyware for surveillance across Middle East. Social engineering attacks surge 1,450% in H1 2025 with breakout times under 60 minutes. ]]></description>
        <link>https://mandos.io/newsletter/brief-129-7-chatgpt-vulnerabilities-new-owasp-2025-top-10-2-million-jobs-myth/</link>
        <guid isPermaLink="false">690f16a8f9628e000108b37f</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 09 Nov 2025 17:00:41 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/45.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>OWASP's 2025 Top 10</strong>&nbsp;introduces Software Supply Chain Failures as a new #3 category, while social engineering attacks jumped 1,450% in the first half of 2025</li><li><strong>ChatGPT vulnerabilities</strong>&nbsp;are enabling attackers to steal private data from hundreds of millions of users through 0-click attacks and memory poisoning techniques</li><li><strong>The "two million cybersecurity jobs" narrative</strong>&nbsp;gets debunked with real data showing only 514,000 actual openings, explaining why qualified professionals struggle to find work</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->
<style>
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            padding: 24px;
            color: white;
            width: 100%;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
            box-sizing: border-box;
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 13px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
            text-align: center;
        }
        
        .sponsor-title {
            font-size: 28px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 16px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #ffffff; /* Changed from #1f2937 to white */
            text-decoration: none;
            padding: 12px 20px;
            border-radius: 6px;
            font-size: 16px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            padding: 16px 20px;
            width: 100%;
            margin-top: 20px;
            box-sizing: border-box;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>

<div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="owasp-releases-top-10-application-security-risks-for-2025"><a href="https://owasp.org/Top10/2025/0x00_2025-Introduction/?ref=mandos.io#whats-changed-in-the-top-10-for-2025">OWASP Releases Top 10 Application Security Risks for 2025</a></h3>
<ul>
<li>
<p>OWASP has published the <strong>Top 10:2025</strong> release candidate featuring two new categories and one consolidation, with Broken Access Control maintaining its #1 position while <strong>Security Misconfiguration</strong> jumps from #5 to #2 based on data from 2.8 million tested applications.</p>
</li>
<li>
<p>The new <strong>Software Supply Chain Failures</strong> category expands beyond vulnerable components to encompass broader ecosystem compromises including build systems and distribution infrastructure, ranking #3 despite limited testing data but showing the highest average <strong>exploit</strong> and impact scores from CVEs.</p>
</li>
<li>
<p>A tenth new category called <strong>Mishandling of Exceptional Conditions</strong> addresses improper error handling and logical errors, while the methodology now analyzes 589 <strong>CWEs</strong> (up from 400 in 2021) grouped into categories focusing on root causes rather than symptoms.</p>
</li>
</ul>
<h3 id="unit-42-discovers-landfall-android-spyware-exploiting-samsung-zero-day-vulnerability"><a href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/?ref=mandos.io">Unit 42 Discovers LANDFALL Android Spyware Exploiting Samsung Zero-Day Vulnerability</a></h3>
<ul>
<li>
<p>Researchers uncovered LANDFALL, a previously unknown <strong>Android</strong> spyware family targeting Samsung Galaxy devices through <strong>CVE-2025-21042</strong>, a zero-day vulnerability in Samsung's image processing library that was actively exploited in the wild before being patched in April 2025.</p>
</li>
<li>
<p>The spyware was delivered via malicious <strong>DNG</strong> image files likely sent through WhatsApp, enabling comprehensive surveillance capabilities including microphone recording, location tracking, and collection of photos, contacts, and call logs on targeted devices in the <strong>Middle East</strong>.</p>
</li>
<li>
<p>LANDFALL shares infrastructure and tradecraft patterns with commercial spyware operations, indicating possible links to <strong>private-sector</strong> offensive actors (PSOAs), with similarities observed to Stealth Falcon activity and references to "Bridge Head" terminology commonly used by commercial spyware vendors.</p>
</li>
</ul>
<h3 id="scattered-lapsus-hunters-emerges-as-federated-cybercriminal-brand-combining-legacy-groups"><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/scattered-lapsuss-hunters-anatomy-of-a-federated-cybercriminal-brand/?ref=mandos.io">Scattered LAPSUS$ Hunters Emerges as Federated Cybercriminal Brand Combining Legacy Groups</a></h3>
<ul>
<li>
<p>A new cybercriminal umbrella brand called Scattered LAPSUS$ Hunters (SLH) emerged in August 2025, appropriating reputational assets from <strong>Scattered Spider</strong>, <strong>ShinyHunters</strong>, and <strong>LAPSUS$</strong> groups while operating through a federated model rather than a formal merger of the original entities.</p>
</li>
<li>
<p>The group operates primarily through <strong>Telegram</strong> channels that have been recreated at least 16 times following takedowns, offering <strong>Extortion-as-a-Service</strong> capabilities and targeting cloud-first environments including SaaS providers, CRMs, and database systems for data theft and extortion.</p>
</li>
<li>
<p>SLH demonstrates advanced technical capabilities including <strong>AI-automated vishing</strong>, exploit development targeting <strong>CVE-2025-61882</strong> (Oracle E-Business Suite) and <strong>CVE-2025-31324</strong> (SAP NetWeaver), with evidence suggesting fewer than five core operators control approximately 30 public personas through sophisticated sockpuppetry.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #128: Windows WSUS RCE Exploited, Claude AI Data Leak, CISO Budget Gaps ]]></title>
        <description><![CDATA[ 100,000 WSUS exploitation attempts in 7 days demand immediate patching. CISOs running 25+ security tools face 50% higher incident rates. Entry-level cybersecurity roles see 5,000 applications per position as market contracts. ]]></description>
        <link>https://mandos.io/newsletter/brief-128-windows-wsus-rce-exploited-claude-ai-data-leak-ciso-budget-gaps/</link>
        <guid isPermaLink="false">690673d9c633f60001667383</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 02 Nov 2025 17:00:50 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/11/44.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>YouTube's become a malware playground</strong>&nbsp;with over 3,000 malicious videos targeting gamers and software crackers - Check Point found this network has been operating since 2021 and attacks tripled this year</li><li><strong>AI-generated code is creating serious security headaches</strong>&nbsp;with 70% of organizations finding vulnerabilities in AI-written code, which now makes up nearly a quarter of all production code</li><li><strong>The cybersecurity job market is brutal right now</strong>&nbsp;- even experienced professionals from major tech companies are struggling to land new roles, with some positions getting 5,000 applications in 72 hours</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->
<style>
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            padding: 24px;
            color: white;
            width: 100%;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
            box-sizing: border-box;
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 13px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
            text-align: center;
        }
        
        .sponsor-title {
            font-size: 28px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 16px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 12px 20px;
            border-radius: 6px;
            font-size: 16px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            padding: 16px 20px;
            width: 100%;
            margin-top: 20px;
            box-sizing: border-box;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>

<div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="check-point-exposes-youtube-ghost-network-distributing-malware-through-3000-videos"><a href="https://research.checkpoint.com/2025/youtube-ghost-network/?ref=mandos.io">Check Point Exposes YouTube Ghost Network Distributing Malware Through 3,000+ Videos</a></h3>
<ul>
<li>
<p>Check Point Research discovered a sophisticated <strong>YouTube</strong> malware distribution network operating since 2021, using over 3,000 malicious videos to distribute infostealers like <strong>Rhadamanthys</strong> and Lumma. The network employs compromised accounts with specialized roles – video uploaders, community post managers, and engagement manipulators – to create false legitimacy through positive comments and likes.</p>
</li>
<li>
<p>The network primarily targets users seeking <strong>game hacks</strong> (especially Roblox with 380 million monthly users) and <strong>software cracks</strong> (particularly Adobe products like Photoshop). The most viewed malicious video garnered 293,000 views promoting cracked Adobe Photoshop, while actors frequently update payloads every 3-4 days and rotate C2 servers to evade detection.</p>
</li>
<li>
<p>Malicious videos tripled in 2025 compared to previous years, with threat actors shifting from Lumma to <strong>Rhadamanthys</strong> infostealer following Lumma's disruption by law enforcement. Videos redirect users to phishing pages on Google Sites or file-sharing platforms, distributing password-protected archives that commonly instruct victims to disable <strong>Windows Defender</strong> before execution.</p>
</li>
</ul>
<h3 id="10-typosquatted-npm-packages-deploy-multi-stage-credential-harvester"><a href="https://socket.dev/blog/10-npm-typosquatted-packages-deploy-credential-harvester?ref=mandos.io">10 Typosquatted npm Packages Deploy Multi-Stage Credential Harvester</a></h3>
<ul>
<li>
<p>Socket's Threat Research Team discovered 10 malicious <strong>npm</strong> packages using <strong>typosquatting</strong> to mimic popular libraries like TypeScript, discord.js, and ethers.js. The packages automatically execute via postinstall hooks, spawn new terminal windows to avoid detection, and use four layers of obfuscation including XOR encryption and control flow obfuscation to hide their payload.</p>
</li>
<li>
<p>The malware displays a fake <strong>CAPTCHA</strong> prompt for social engineering, performs IP fingerprinting against the C2 server at 195.133.79.43, then downloads a 24MB PyInstaller-packaged information stealer called data_extracter. This cross-platform stealer harvests credentials from system <strong>keyrings</strong>, browsers, SSH keys, and authentication tokens across Windows, Linux, and macOS.</p>
</li>
<li>
<p>Published by threat actor andrew_r1 on July 4, 2025, the packages remained live for over four months and accumulated 9,900+ downloads. Organizations should audit dependencies immediately, assume compromised systems, reset all stored credentials, revoke authentication tokens, and implement Socket's supply chain protection tools to prevent similar attacks.</p>
</li>
</ul>
<h3 id="google-confirms-active-exploitation-of-critical-windows-wsus-vulnerability"><a href="https://www.theregister.com/2025/10/27/microsoft_wsus_attacks_multiple_orgs/?ref=mandos.io">Google Confirms Active Exploitation of Critical Windows WSUS Vulnerability</a></h3>
<ul>
<li>
<p>Google's Threat Intelligence Group reports <strong>UNC6512</strong> threat actor actively exploiting <strong>CVE-2025-59287</strong> across multiple victim organizations, with attackers conducting reconnaissance and <strong>exfiltrating</strong> data from compromised hosts.</p>
</li>
<li>
<p>The vulnerability affects Windows Server Update Services with an <strong>unauthenticated</strong> remote code execution flaw stemming from insecure deserialization – Microsoft's initial October patch was incomplete, requiring an emergency fix last Thursday.</p>
</li>
<li>
<p>Researchers observe approximately 100,000 exploitation attempts in seven days targeting publicly exposed WSUS instances on default TCP ports 8530/8531, with attackers using <strong>PowerShell</strong> commands to gather network intelligence before data exfiltration.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #127: AWS Multi-Service Outage, AI MCP Command Injection, Microsoft Deputy CISO Model ]]></title>
        <description><![CDATA[ Self-propagating GlassWorm worm harvests credentials from 49 crypto wallets using blockchain C2 infrastructure. CISO salary discussion reveals $161K university role versus $250-300/hour consulting opportunities amid market challenges. ]]></description>
        <link>https://mandos.io/newsletter/brief-127-aws-multi-service-outage-ai-mcp-command-injection-microsoft-deputy-ciso-model/</link>
        <guid isPermaLink="false">68fc84e97a30620001f3410b</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 26 Oct 2025 17:00:55 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/10/43.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>AWS suffered a major outage</strong>&nbsp;when a DNS race condition in DynamoDB brought down multiple services across US-EAST-1, showing how cascading failures can impact entire cloud regions</li><li><strong>GlassWorm malware</strong>&nbsp;is targeting VS Code extensions using invisible Unicode characters and an unkillable blockchain-based command structure that's nearly impossible to take down</li><li><strong>Microsoft deployed 14 Deputy CISOs</strong>&nbsp;to handle security across their massive organization, offering insights into how large enterprises are restructuring security leadership</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->
<style>
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            padding: 24px;
            color: white;
            width: 100%;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
            box-sizing: border-box;
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 13px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
            text-align: center;
        }
        
        .sponsor-title {
            font-size: 28px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 16px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 12px 20px;
            border-radius: 6px;
            font-size: 16px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            padding: 16px 20px;
            width: 100%;
            margin-top: 20px;
            box-sizing: border-box;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>

<div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="aws-dynamodb-dns-race-condition-causes-major-multi-service-outage-in-us-east-1"><a href="https://aws.amazon.com/message/101925/?ref=mandos.io">AWS DynamoDB DNS Race Condition Causes Major Multi-Service Outage in US-EAST-1</a></h3>
<ul>
<li>
<p>A <strong>race condition</strong> in DynamoDB's automated DNS management system caused the regional endpoint to resolve to an empty record, preventing new connections to the service from 11:48 PM on October 19 to 2:40 AM on October 20, 2025. The bug occurred when two DNS Enactors processed plans simultaneously, with one applying an outdated plan that was then deleted by cleanup processes, leaving the system in an inconsistent state requiring <strong>manual intervention</strong>.</p>
</li>
<li>
<p>The DynamoDB outage cascaded to cause EC2 instance launch failures lasting until 1:50 PM on October 20 due to the DropletWorkflow Manager's dependency on DynamoDB for maintaining server leases. When leases timed out, the system entered <strong>congestive collapse</strong> and couldn't establish new droplet leases, requiring engineers to throttle incoming work and selectively restart DWFM hosts to recover capacity.</p>
</li>
<li>
<p>Multiple AWS services including <strong>Lambda</strong>, ECS, EKS, Fargate, Connect, STS, IAM authentication, Redshift, and Support Console experienced significant disruptions, with some services like Connect experiencing busy tones and failed connections, while Redshift clusters remained in "modifying" states that prevented query processing even after DynamoDB recovery.</p>
</li>
</ul>
<h3 id="glassworm-self-propagating-worm-uses-invisible-unicode-code-against-vs-code-extensions"><a href="https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace?ref=mandos.io">GlassWorm Self-Propagating Worm Uses Invisible Unicode Code Against VS Code Extensions</a></h3>
<ul>
<li>
<p>Researchers discovered the first <strong>self-propagating</strong> worm targeting VS Code extensions on OpenVSX marketplace, affecting 10,711 installations across seven compromised extensions. The malware uses invisible <strong>Unicode</strong> characters to hide malicious code that becomes completely transparent in code editors and bypasses traditional code review processes.</p>
</li>
<li>
<p>GlassWorm employs an unkillable command and control infrastructure using the <strong>Solana blockchain</strong> as its primary C2 server, with Google Calendar as backup. This immutable, decentralized approach makes takedowns impossible while enabling dynamic payload updates for less than a penny per transaction.</p>
</li>
<li>
<p>The final payload transforms infected developer workstations into criminal infrastructure through <strong>SOCKS</strong> proxy servers, hidden VNC access, and peer-to-peer communication channels. The worm harvests credentials from 49 cryptocurrency wallet extensions, NPM tokens, and GitHub credentials to automatically spread to additional packages and extensions.</p>
</li>
</ul>
<h3 id="layerx-discovers-cometjacking-vulnerability-in-perplexitys-ai-browser"><a href="https://layerxsecurity.com/blog/cometjacking-how-one-click-can-turn-perplexitys-comet-ai-browser-against-you/?ref=mandos.io">LayerX Discovers CometJacking Vulnerability in Perplexity's AI Browser</a></h3>
<ul>
<li>
<p>Researchers found that a single <strong>weaponized URL</strong> can hijack Perplexity's Comet AI browser to steal sensitive data from connected services like Gmail and Calendar without requiring credential phishing, simply by tricking users into clicking a malicious link.</p>
</li>
<li>
<p>The attack exploits URL parameters to force the AI to prioritize user <strong>memory</strong> over web searches, then instructs it to encode stolen data in <strong>base64</strong> format and POST it to attacker-controlled servers, effectively bypassing Perplexity's built-in exfiltration protections.</p>
</li>
<li>
<p>Despite LayerX's responsible disclosure in August 2025, Perplexity marked the findings as "Not Applicable," highlighting the emerging security risks of <strong>agentic</strong> browsers where AI assistants have trusted access to personal and corporate data sources.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #126: Nation-State Steals F5 Code, Prompt Injection Costs $100K+, CISO Skills ]]></title>
        <description><![CDATA[ Only 6% of executives confident against attacks despite investment surges. UNC5342 exploits Ethereum smart contracts for JADESNOW malware delivery through fake job interviews targeting crypto developers. ]]></description>
        <link>https://mandos.io/newsletter/brief-126-nation-state-steals-f5-code-prompt-injection-costs-100k-ciso-skills/</link>
        <guid isPermaLink="false">68f3a8536d75220001b37100</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 19 Oct 2025 17:02:06 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/10/42.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>F5 confirms a nation-state breach</strong>&nbsp;that exposed BIG-IP source code and undisclosed vulnerabilities, reminding us that even security vendors aren't immune to persistent attacks</li><li><strong>AI security incidents more than doubled in 2025</strong>&nbsp;with prompt injection attacks now accounting for 35% of all documented incidents and causing six-figure financial losses</li><li><strong>90% of security leaders say managing cyber risk</strong>&nbsp;is harder now than five years ago, yet only 19% rate their programs as mature - highlighting the growing complexity we're all facing</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->
<style>
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            padding: 24px;
            color: white;
            width: 100%;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
            box-sizing: border-box;
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 13px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
            text-align: center;
        }
        
        .sponsor-title {
            font-size: 28px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 16px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 12px 20px;
            border-radius: 6px;
            font-size: 16px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            padding: 16px 20px;
            width: 100%;
            margin-top: 20px;
            box-sizing: border-box;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>

<div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="f5-breach-exposes-big-ip-source-code-%E2%80%93-nation-state-hackers-behind-massive-intrusion"><a href="https://thehackernews.com/2025/10/f5-breach-exposes-big-ip-source-code.html?m=1&ref=mandos.io">F5 Breach Exposes BIG-IP Source Code – Nation-State Hackers Behind Massive Intrusion</a></h3>
<ul>
<li>
<p>F5 disclosed that a <strong>nation-state</strong> threat actor gained persistent access to their network and stole BIG-IP <strong>source code</strong> along with information about undisclosed vulnerabilities, with the breach discovered on August 9, 2025.</p>
</li>
<li>
<p>The attackers accessed F5's product development environment and knowledge management platform, exfiltrating configuration and implementation information affecting a small percentage of <strong>customers</strong> who will be directly notified.</p>
</li>
<li>
<p>F5 has engaged Google Mandiant and CrowdStrike for incident response, implemented enhanced security controls, and advises users to apply the latest <strong>updates</strong> for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients immediately.</p>
</li>
</ul>
<h3 id="north-korean-unc5342-threat-actor-adopts-etherhiding-technique-for-cryptocurrency-theft"><a href="https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding?ref=mandos.io">North Korean UNC5342 Threat Actor Adopts EtherHiding Technique for Cryptocurrency Theft</a></h3>
<ul>
<li>
<p>Google Threat Intelligence observed <strong>UNC5342</strong> using EtherHiding to deliver <strong>JADESNOW</strong> malware through fake job interviews – marking the first time a nation-state actor has adopted this <strong>blockchain</strong>-based technique that stores malicious payloads in smart contracts on BNB Smart Chain and Ethereum, making takedowns nearly impossible.</p>
</li>
<li>
<p>The social engineering campaign targets cryptocurrency developers with fraudulent job interviews, deploying a multi-stage infection chain where JADESNOW downloads <strong>INVISIBLEFERRET</strong> backdoor from blockchain transactions, ultimately leading to cryptocurrency wallet theft and credential harvesting from browsers and password managers.</p>
</li>
<li>
<p>While the blockchain storage provides resilience against traditional blocking methods, the attack still relies on centralized API services to interface with blockchains – creating potential mitigation opportunities through Chrome Enterprise policies that block dangerous downloads and enforce managed browser updates.</p>
</li>
</ul>
<h3 id="attackers-exploit-cisco-snmp-vulnerability-cve-2025-20352-to-deploy-rootkits-in-operation-zero-disco"><a href="https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html?ref=mandos.io">Attackers Exploit Cisco SNMP Vulnerability CVE-2025-20352 to Deploy Rootkits in Operation Zero Disco</a></h3>
<ul>
<li>
<p>Threat actors leveraged <strong>CVE-2025-20352</strong>, a Cisco SNMP vulnerability in both 32-bit and 64-bit switch builds, to achieve remote code execution and deploy Linux rootkits on unprotected devices, primarily targeting Cisco 9400, 9300, and legacy 3750G series switches.</p>
</li>
<li>
<p>The <strong>rootkit</strong> establishes persistent access through a universal password containing "disco" and installs hooks into IOSd memory space, enabling attackers to disable logging, bypass authentication, hide configuration changes, and control network traffic through UDP listeners on any port.</p>
</li>
<li>
<p>Attackers used sophisticated <strong>lateral movement</strong> techniques including ARP spoofing to impersonate waystation IP addresses, bypass internal firewalls, and move between network zones while evading detection through log manipulation and configuration hiding capabilities.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #125: Redis CVE 10.0 RCE Hits 330K Instances, Meta&#x27;s A2AS AI Framework, 50% Networks Block AI ]]></title>
        <description><![CDATA[ Ivanti left 13 vulnerabilities unpatched until March 2026 after ZDI disclosure. Anthropic research shows just 250 poisoned documents can backdoor LLMs of any size. Half of enterprises face direct financial losses from network failures blocking AI initiatives. ]]></description>
        <link>https://mandos.io/newsletter/brief-125-redis-cve-10-0-rce-hits-330k-instances-metas-a2as-ai-framework-50-networks-block-ai/</link>
        <guid isPermaLink="false">68eb716c617dbb00016f4cd4</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 12 Oct 2025 17:00:02 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/10/41.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>In this week's brief:</p><ul><li><strong>A perfect 10.0 CVSS vulnerability</strong>&nbsp;dubbed RediShell is exposing 330,000 Redis instances worldwide, allowing attackers to escape Lua sandbox and achieve complete system compromise</li><li><strong>Half of enterprise networks</strong>&nbsp;are too outdated to support AI initiatives according to IDC, with 94% saying their infrastructure limits large data and AI projects</li><li><strong>70% of job openings</strong>&nbsp;never make it to LinkedIn according to a former hiring manager, meaning you're competing with 1,500+ people for the visible 30%</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->
<style>
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            padding: 24px;
            color: white;
            width: 100%;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
            box-sizing: border-box;
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 13px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
            text-align: center;
        }
        
        .sponsor-title {
            font-size: 28px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 16px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 12px 20px;
            border-radius: 6px;
            font-size: 16px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            padding: 16px 20px;
            width: 100%;
            margin-top: 20px;
            box-sizing: border-box;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>

<div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="redishell-critical-redis-rce-vulnerability-exposes-330000-internet-facing-instances"><a href="https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844?ref=mandos.io">RediShell: Critical Redis RCE Vulnerability Exposes 330,000 Internet-Facing Instances</a></h3>
<ul>
<li>
<p>Wiz Research discovered CVE-2025-49844, a <strong>use-after-free</strong> memory corruption vulnerability in Redis that allows attackers to escape the Lua sandbox and achieve arbitrary code execution with a <strong>CVSS 10.0</strong> rating – the highest possible severity.</p>
</li>
<li>
<p>The vulnerability affects approximately 330,000 internet-exposed Redis instances globally, with about 60,000 lacking <strong>authentication</strong> and 57% of cloud environments running Redis as <strong>container</strong> images with potentially insecure default configurations.</p>
</li>
<li>
<p>Successful exploitation enables complete system compromise including credential theft, malware installation, data exfiltration, and lateral movement within cloud environments using stolen IAM tokens and certificates.</p>
</li>
</ul>
<h3 id="zdi-discloses-13-unpatched-ivanti-endpoint-manager-vulnerabilities"><a href="https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/?ref=mandos.io">ZDI Discloses 13 Unpatched Ivanti Endpoint Manager Vulnerabilities</a></h3>
<ul>
<li>
<p>Trend Micro's Zero Day Initiative published advisories for 13 <strong>unpatched</strong> vulnerabilities in Ivanti Endpoint Manager, with CVSS scores ranging from 7.2 to 8.8. One flaw allows local <strong>privilege escalation</strong> while 12 enable <strong>remote code execution</strong>.</p>
</li>
<li>
<p>All vulnerabilities stem from improper validation of user-supplied input, leading to <strong>SQL injection</strong> and deserialization attacks. The bugs affect various components including AgentPortal service, Report_RunPatch, DBDR, and PatchHistory classes.</p>
</li>
<li>
<p>Ivanti initially requested patches by September 2025 but later extended the timeline to March 2026 for all 12 RCE flaws. ZDI disclosed the vulnerabilities after the 120-day disclosure window expired without adequate vendor response.</p>
</li>
</ul>
<h3 id="cursor-ide-case-sensitivity-bug-enables-remote-code-execution"><a href="https://www.lakera.ai/blog/cursor-vulnerability-cve-2025-59944?ref=mandos.io">Cursor IDE Case-Sensitivity Bug Enables Remote Code Execution</a></h3>
<ul>
<li>
<p>A <strong>case-sensitivity</strong> vulnerability in Cursor IDE allowed attackers to bypass file protections by using variations like .cUrSoR/mcp.json instead of .cursor/mcp.json, which the IDE treated as different files while the operating system treated them as identical on <strong>Windows</strong> and <strong>macOS</strong>.</p>
</li>
<li>
<p>The flaw could lead to <strong>remote code execution</strong> by enabling attackers to inject malicious configuration files, register unauthorized plugins, or modify build tasks that execute arbitrary shell commands without triggering Cursor's security confirmation prompts.</p>
</li>
<li>
<p>Cursor patched the vulnerability in version 1.7 by normalizing file paths and implementing case-insensitive comparisons, but the incident highlights broader security challenges as <strong>AI-powered</strong> development tools gain more autonomous capabilities to modify system configurations.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #124: Red Hat GitLab Breach, WhatsApp Malware, $250K SOC Salary ]]></title>
        <description><![CDATA[ Cloud account compromises jumped from 16% to 46% in five years. North Korean IT workers now use stolen developer identities to infiltrate western companies. Financial damage over $200K doubled as hybrid environments reach 77% adoption. ]]></description>
        <link>https://mandos.io/newsletter/brief-124-red-hat-gitlab-breach-whatsapp-malware-250k-soc-salary/</link>
        <guid isPermaLink="false">68e1030e7eacc300013f526d</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sat, 04 Oct 2025 17:00:33 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/10/40.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>In this week's brief:</p><ul><li><strong>Red Hat confirms a security incident</strong>&nbsp;following claims that hackers breached their GitLab repositories, though details about the scope remain limited</li><li><strong>AI code generation creates more problems than it solves</strong>&nbsp;with research showing vulnerabilities increase by 37.6% after just five iterations of AI improvements</li><li><strong>Senior cybersecurity professionals are hitting walls</strong>&nbsp;in today's job market, with experienced candidates submitting hundreds of applications and getting nowhere</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->

    <style>
        body {
            margin: 0;
            padding: 20px;
            font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, sans-serif;
            background-color: #f5f5f5;
        }
        
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            border-radius: 12px;
            padding: 24px;
            color: white;
            max-width: 600px;
            margin: 0 auto;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 11px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
        }
        
        .sponsor-title {
            font-size: 20px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 14px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 10px 18px;
            border-radius: 6px;
            font-size: 14px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            border-radius: 8px;
            padding: 16px 20px;
            max-width: 600px;
            margin: 20px auto 0;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>
<body>
    <div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
    
</body>
</html>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="red-hat-confirms-security-incident-after-hackers-claim-gitlab-breach"><a href="https://www.bleepingcomputer.com/news/security/red-hat-confirms-security-incident-after-hackers-claim-github-breach?ref=mandos.io">Red Hat Confirms Security Incident After Hackers Claim GitLab Breach</a></h3>
<ul>
<li>
<p>Red Hat acknowledged a <strong>security</strong> incident following claims by threat actors that they breached the company's systems and accessed sensitive data from their GitLab repositories.</p>
</li>
<li>
<p>The incident appears to involve unauthorized access to Red Hat's development infrastructure, though the company has not disclosed specific details about the scope or nature of the <strong>breach</strong>.</p>
</li>
<li>
<p>Red Hat is currently investigating the incident and working to determine what data may have been compromised, while implementing additional security measures to prevent further <strong>unauthorized</strong> access.</p>
</li>
</ul>
<h3 id="north-koreas-fake-recruiters-feed-stolen-data-to-it-workers"><a href="https://www.securityweek.com/north-koreas-fake-recruiters-feed-stolen-data-to-it-workers/?ref=mandos.io">North Korea's Fake Recruiters Feed Stolen Data to IT Workers</a></h3>
<ul>
<li>
<p><strong>DeceptiveDevelopment</strong> campaign targets cryptocurrency and DeFi developers through fake job offers on LinkedIn and Upwork, deploying malware including BeaverTail, InvisibleFerret, and <strong>Tropidoor</strong> to steal credentials and infect systems.</p>
</li>
<li>
<p>Stolen developer identities are supplied to North Korean fraudulent IT workers tracked as <strong>WageMole</strong>, who use this information along with proxy interviewing and AI-generated synthetic identities to obtain remote work at western companies.</p>
</li>
<li>
<p>The operation extends beyond programming roles into <strong>civil engineering</strong> and architecture, with North Korean workers impersonating legitimate companies and producing falsified engineering drawings with fake approval stamps.</p>
</li>
</ul>
<h3 id="sorvepotel-malware-spreads-through-whatsapp-targeting-brazilian-users"><a href="https://www.trendmicro.com/en_us/research/25/j/self-propagating-malware-spreads-via-whatsapp.html?ref=mandos.io">SORVEPOTEL Malware Spreads Through WhatsApp Targeting Brazilian Users</a></h3>
<ul>
<li>
<p>The malware spreads via <strong>phishing</strong> messages containing malicious ZIP files that appear to come from trusted contacts, specifically targeting desktop users with Portuguese messages instructing them to download and open attachments on their PCs.</p>
</li>
<li>
<p>Once executed, SORVEPOTEL establishes <strong>persistence</strong> by copying itself to the Windows Startup folder and hijacks active WhatsApp Web sessions to automatically send the same malicious ZIP file to all contacts and groups in the victim's account.</p>
</li>
<li>
<p>The campaign has primarily impacted <strong>Brazil</strong> with 457 of 477 detected cases, focusing on government and public service organizations but also affecting manufacturing, technology, education, and construction sectors through automated propagation rather than data theft.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #123: $800K Pay Cut for Data Breach, Microsoft Azure Tokens Expose All Tenants, Steam Game Steals $150K ]]></title>
        <description><![CDATA[ Enterprise AI usage exploded 200% while organizations unknowingly run 320 Shadow AI apps. Cisco zero-days target government networks as state actors deploy reboot-surviving malware. ]]></description>
        <link>https://mandos.io/newsletter/brief-123-800k-pay-cut-for-data-breach-microsoft-azure-tokens-expose-all-tenants-steam-game-steals-150k/</link>
        <guid isPermaLink="false">68d91ff1c543d20001a4acec</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 28 Sep 2025 17:00:16 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/09/39.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!&nbsp;</p><p>The Qantas CEO taking an&nbsp;<strong>$800K pay cut</strong>&nbsp;for a data breach feels like a turning point - finally seeing real accountability at the top instead of security teams taking all the heat.</p><p>In this week's brief:</p><ul><li>A&nbsp;<strong>critical Azure flaw</strong>&nbsp;that could have given attackers silent access to any Microsoft tenant worldwide - thankfully patched quickly</li><li><strong>Deepfake losses</strong>&nbsp;hit $347M this quarter alone, with incidents doubling every six months</li><li>Industry veterans are calling out the&nbsp;<strong>cybersecurity job shortage myth</strong>, saying most openings are just backfills</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->

    <style>
        body {
            margin: 0;
            padding: 20px;
            font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, sans-serif;
            background-color: #f5f5f5;
        }
        
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            border-radius: 12px;
            padding: 24px;
            color: white;
            max-width: 600px;
            margin: 0 auto;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 11px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
        }
        
        .sponsor-title {
            font-size: 20px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 14px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 10px 18px;
            border-radius: 6px;
            font-size: 14px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            border-radius: 8px;
            padding: 16px 20px;
            max-width: 600px;
            margin: 20px auto 0;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>
<body>
    <div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
    
</body>
</html>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="verified-steam-game-steals-streamers-cancer-treatment-donations"><a href="https://www.bleepingcomputer.com/news/security/verified-steam-game-steals-streamers-cancer-treatment-donations/?ref=mandos.io">Verified Steam Game Steals Streamer's Cancer Treatment Donations</a></h3>
<ul>
<li>
<p>A verified Steam game called BlockBlasters was updated with a <strong>cryptodrainer</strong> component that stole $32,000 from a cancer patient's wallet during a fundraising livestream for his treatment.</p>
</li>
<li>
<p>Security researchers report the malware affected approximately 261-478 Steam users, stealing a total of $150,000, with victims being specifically <strong>targeted</strong> based on their cryptocurrency holdings.</p>
</li>
<li>
<p>The game contained sophisticated malware components including a Python backdoor and <strong>StealC</strong> payload that collected Steam login information and uploaded it to command and control servers.</p>
</li>
</ul>
<h3 id="actor-tokens-vulnerability-allowed-complete-access-to-every-entra-id-tenant"><a href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/?ref=mandos.io">Actor Tokens Vulnerability Allowed Complete Access to Every Entra ID Tenant</a></h3>
<ul>
<li>
<p>A critical <strong>vulnerability</strong> in the Azure AD Graph API failed to properly validate tenant origins when processing undocumented impersonation "Actor tokens" used by Microsoft for service-to-service communication, allowing attackers to access any Entra ID tenant globally with no logs or evidence.</p>
</li>
<li>
<p>The <strong>impact</strong> was catastrophic – an attacker could impersonate any user (including Global Admins) in any tenant, bypass Conditional Access policies, and make any modification to the directory without generating logs in the victim's tenant, effectively allowing complete Microsoft 365 and Azure resource compromise.</p>
</li>
<li>
<p>Microsoft fixed the issue within days of receiving the report on July 14, 2025, rolled out additional mitigations preventing applications from requesting these tokens, and issued <strong>CVE-2025-55241</strong> to address this flaw that Microsoft's telemetry indicates was not exploited in the wild.</p>
</li>
</ul>
<h3 id="state-sponsored-threat-actor-exploits-multiple-zero-day-vulnerabilities-in-cisco-asa-and-ftd-software"><a href="https://unit42.paloaltonetworks.com/zero-day-vulnerabilities-affect-cisco-software/?ref=mandos.io">State-Sponsored Threat Actor Exploits Multiple Zero-Day Vulnerabilities in Cisco ASA and FTD Software</a></h3>
<ul>
<li>
<p>Cisco identified a <strong>state-sponsored</strong> threat actor actively exploiting multiple zero-day vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software for <strong>data exfiltration</strong> from government networks.</p>
</li>
<li>
<p>The three critical vulnerabilities (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363) allow attackers to execute arbitrary code, with the first two already under active <strong>exploitation</strong> in the wild and the third at high risk of imminent exploitation.</p>
</li>
<li>
<p>The U.K.'s NCSC identified <strong>RayInitiator</strong> (multi-stage bootkit) and LINE VIPER (shellcode loader) malware families being used in these attacks, with the malware designed to survive reboots and firmware upgrades.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #122: CrowdStrike npm Attack, SonicWall Cloud Breach, ChatGPT Zero-Click ]]></title>
        <description><![CDATA[ Ransomware payments dropped to $115K median but hit 44% of all breaches. Cybersecurity pros can&#39;t find jobs despite 10+ years experience. ]]></description>
        <link>https://mandos.io/newsletter/brief-122-crowdstrike-npm-attack-sonicwall-cloud-breach-chatgpt-zero-click/</link>
        <guid isPermaLink="false">68ce785888cf460001028865</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 21 Sep 2025 17:00:30 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/09/38.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>In this week's brief:</p><ul><li><strong>CrowdStrike's npm packages</strong>&nbsp;got hit by the Shai-Hulud supply chain attack, affecting over 526 packages and showing how sophisticated these attacks have become</li><li><strong>71.7% of workplace AI tools</strong>&nbsp;are classified as high or critical risk, with most enterprise data flowing to risky platforms rather than secure alternatives</li><li><strong>Experienced cybersecurity professionals</strong>&nbsp;are struggling in an unprecedented job market, with some reporting over 1,000 applications without success</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->

    <style>
        body {
            margin: 0;
            padding: 20px;
            font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, sans-serif;
            background-color: #f5f5f5;
        }
        
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            border-radius: 12px;
            padding: 24px;
            color: white;
            max-width: 600px;
            margin: 0 auto;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 11px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
        }
        
        .sponsor-title {
            font-size: 20px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 14px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 10px 18px;
            border-radius: 6px;
            font-size: 14px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            border-radius: 8px;
            padding: 16px 20px;
            max-width: 600px;
            margin: 20px auto 0;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>
<body>
    <div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
    
</body>
</html>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="shai-hulud-supply-chain-attack-targets-crowdstrike-npm-packages"><a href="https://socket.dev/blog/ongoing-supply-chain-attack-targets-crowdstrike-npm-packages?ref=mandos.io">Shai-Hulud Supply Chain Attack Targets CrowdStrike npm Packages</a></h3>
<ul>
<li>
<p>Multiple npm packages published under CrowdStrike's account were <strong>compromised</strong> in an ongoing supply chain attack called "Shai-Hulud" that previously affected tinycolor and 40+ other packages. The attack uses identical <strong>malware</strong> that scans systems for tokens/credentials and exfiltrates sensitive data.</p>
</li>
<li>
<p>The malware evolved through seven distinct versions, becoming increasingly stealthy and efficient. It self-propagates by stealing credentials to modify and republish packages, adding a malicious bundle.js file that executes automatically via postinstall scripts.</p>
</li>
<li>
<p>Over 526 packages were affected, with more than 100 packages compromised in a single burst targeting CrowdStrike. Organizations should rotate npm <strong>tokens</strong>, audit environments that installed affected packages, and monitor for unusual publish events.</p>
</li>
</ul>
<h3 id="shadowleak-zero-click-attack-exfiltrates-sensitive-data-via-chatgpts-deep-research-agent"><a href="https://www.radware.com/blog/threat-intelligence/shadowleak/?ref=mandos.io">ShadowLeak: Zero-Click Attack Exfiltrates Sensitive Data via ChatGPT's Deep Research Agent</a></h3>
<ul>
<li>
<p>Researchers discovered a <strong>zero-click</strong> vulnerability in ChatGPT's Deep Research agent that allows attackers to craft malicious emails that trick the agent into leaking sensitive inbox data with no user action required or visible indication.</p>
</li>
<li>
<p>Unlike previous attacks requiring client-side image rendering, this <strong>service-side</strong> exfiltration occurs entirely from OpenAI's cloud environment, making it invisible to traditional enterprise security controls and applicable across multiple data connectors beyond Gmail.</p>
</li>
<li>
<p>The attack used sophisticated <strong>social engineering</strong> techniques embedded in HTML emails to bypass the agent's safety restrictions, achieving 100% success rate by encoding stolen data in Base64 format before exfiltration.</p>
</li>
</ul>
<h3 id="sonicwall-urges-password-resets-after-cloud-backup-breach-affecting-under-5-of-customers"><a href="https://thehackernews.com/2025/09/sonicwall-urges-password-resets-after.html?ref=mandos.io">SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers</a></h3>
<ul>
<li>
<p>SonicWall detected suspicious activity targeting their cloud <strong>backup</strong> service, with unknown threat actors accessing encrypted firewall configuration files for less than 5% of customers through a series of <strong>brute-force</strong> attacks.</p>
</li>
<li>
<p>While credentials within the compromised files were encrypted, the files contained information that could help attackers potentially <strong>exploit</strong> the related firewalls, prompting SonicWall to urge immediate password resets.</p>
</li>
<li>
<p>The company recommends affected customers take urgent containment actions including limiting WAN access, disabling management services and VPN access, resetting passwords, and importing fresh <strong>preferences</strong> files provided by SonicWall with randomized credentials.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #121: Apple Memory Integrity, HybridPetya UEFI Bypass, npm Packages Compromised ]]></title>
        <description><![CDATA[ AI agents now exploit zero-days in under 10 minutes while energy sector attacks surge 586%. Web3 hackers earn millions as traditional security salaries lag behind. ]]></description>
        <link>https://mandos.io/newsletter/brief-121-apple-memory-integrity-hybridpetya-uefi-bypass-npm-packages-compromised/</link>
        <guid isPermaLink="false">68c68a0467478e00018dac3c</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 14 Sep 2025 17:11:23 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/09/37.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>The renewable energy transition is turning into a cybersecurity nightmare for European utilities, with attacks jumping <strong>586%</strong> last year alone - seems like going green comes with some unexpected red flags.</p><p>In this week's brief:</p><ul><li><strong>HybridPetya ransomware</strong>&nbsp;surfaces with UEFI Secure Boot bypass capabilities, marking the fourth bootkit of its kind we've seen</li><li><strong>Hexstrike-AI</strong>&nbsp;drops as a game-changing framework that lets threat actors orchestrate 150+ AI agents to exploit targets in under 10 minutes</li><li><strong>Web3 white hats</strong>&nbsp;are making millions from bug bounties while traditional cybersecurity salaries look increasingly modest in comparison</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->

    <style>
        body {
            margin: 0;
            padding: 20px;
            font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, sans-serif;
            background-color: #f5f5f5;
        }
        
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            border-radius: 12px;
            padding: 24px;
            color: white;
            max-width: 600px;
            margin: 0 auto;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 11px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
        }
        
        .sponsor-title {
            font-size: 20px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 14px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 10px 18px;
            border-radius: 6px;
            font-size: 14px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            border-radius: 8px;
            padding: 16px 20px;
            max-width: 600px;
            margin: 20px auto 0;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>
<body>
    <div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Spotlight</div>
            <div class="sponsor-title">Roboshadow Platform</div>
            <div class="sponsor-description">
                RoboShadow is a cybersecurity platform that delivers daily vulnerability scans and automated fixes, helping businesses stay secure and compliant. With powerful integrations and continuous monitoring, it makes managing cyber risks simple and proactive.
            </div>
            <a href="https://roboshadow.pxf.io/ra3ZPG?ref=mandos.io" class="sponsor-cta">
                Get Started Now
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
    
</body>
</html>
<!--kg-card-end: html-->

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #120: Grok AI Exploited, Shadow AI Surge 200%, LOTL Attacks Increase by 84% ]]></title>
        <description><![CDATA[ Colombian malware campaign using SVG files went completely undetected by all antivirus engines. C-suite executives show dangerous overconfidence compared to frontline security teams. ]]></description>
        <link>https://mandos.io/newsletter/brief-120-grok-ai-exploited-shadow-ai-surge-200-lotl-attacks-increase-by-84/</link>
        <guid isPermaLink="false">68badae7c560050001e8173d</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 07 Sep 2025 17:00:31 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/09/36.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>The disconnect between&nbsp;<strong>C-suite confidence</strong>&nbsp;and frontline reality continues to widen, with executives feeling twice as confident about cyber readiness compared to the managers actually dealing with daily threats.</p><p>In this week's brief:</p><ul><li><strong>Threat actors</strong>&nbsp;are getting creative by exploiting Grok AI on X to spread malicious links through hidden metadata fields</li><li><strong>Shadow AI</strong>&nbsp;usage has exploded 200% across enterprises, with companies now juggling an average of 320 AI applications outside IT oversight</li><li><strong>SOC analyst burnout</strong>&nbsp;is reaching crisis levels due to chaotic scheduling and toxic management practices at understaffed centers</li></ul><p>A quick note before we dive in.</p>
<!--kg-card-begin: html-->

    <style>
        body {
            margin: 0;
            padding: 20px;
            font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, sans-serif;
            background-color: #f5f5f5;
        }
        
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            border-radius: 12px;
            padding: 24px;
            color: white;
            max-width: 600px;
            margin: 0 auto;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 11px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
        }
        
        .sponsor-title {
            font-size: 20px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 14px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 10px 18px;
            border-radius: 6px;
            font-size: 14px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            border-radius: 8px;
            padding: 16px 20px;
            max-width: 600px;
            margin: 20px auto 0;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>
<body>
    <div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Sponsored Tool Spotlight</div>
            <div class="sponsor-title">Proton VPN</div>
            <div class="sponsor-description">
                Protect your business communications and research with Proton VPN's Swiss-based, no-logs service trusted by security professionals worldwide. Get 64% off their 24-month plan and secure your digital operations with military-grade encryption.
            </div>
            <a href="https://www.jdoqocy.com/click-101524927-14028812?ref=mandos.io" class="sponsor-cta">
                Get 64% Off Proton VPN
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
    
</body>
</html>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="threat-actors-abuse-xs-grok-ai-to-spread-malicious-links"><a href="https://www.bleepingcomputer.com/news/security/threat-actors-abuse-xs-grok-ai-to-spread-malicious-links/?ref=mandos.io">Threat Actors Abuse X's Grok AI to Spread Malicious Links</a></h3>
<ul>
<li>
<p>Malicious advertisers are exploiting a loophole where they hide <strong>malicious</strong> links in the "From:" metadata field of video ads on X, which isn't scanned by the platform's security filters.</p>
</li>
<li>
<p>When users ask Grok about these posts, the AI assistant extracts and shares the hidden links as clickable URLs, effectively <strong>bypassing</strong> X's link posting restrictions while gaining credibility from Grok's trusted system account status.</p>
</li>
<li>
<p>This technique, dubbed "Grokking" by researcher Nati Tal, has helped some malicious ads reach <strong>millions</strong> of impressions, leading to various scams and information-stealing <strong>malware</strong>.</p>
</li>
</ul>
<h3 id="ghostredirector-poisons-windows-servers-with-backdoors-and-seo-fraud-tools"><a href="https://www.welivesecurity.com/en/eset-research/ghostredirector-poisons-windows-servers-backdoors-side-potatoes/?ref=mandos.io">GhostRedirector Poisons Windows Servers with Backdoors and SEO Fraud Tools</a></h3>
<ul>
<li>
<p>ESET researchers identified a China-aligned threat actor named GhostRedirector that compromised at least 65 Windows servers primarily in Brazil, Thailand, and Vietnam using a passive C++ <strong>backdoor</strong> (Rungan) and a malicious IIS module (Gamshen) for <strong>SEO</strong> fraud.</p>
</li>
<li>
<p>The attackers use EfsPotato and BadPotato <strong>exploits</strong> to create privileged users on compromised servers, ensuring persistent access even if their malware is removed, and deploy various webshells for maintaining access to the systems.</p>
</li>
<li>
<p>GhostRedirector's SEO fraud scheme uses the Gamshen module to manipulate Google search results by hijacking responses only for Googlebot requests, artificially promoting <strong>gambling</strong> websites without affecting regular visitors of the compromised sites.</p>
</li>
</ul>
<h3 id="virustotal-uncovers-undetected-colombian-malware-campaign-using-svg-files"><a href="https://blog.virustotal.com/2025/09/uncovering-colombian-malware-campaign.html?ref=mandos.io">VirusTotal Uncovers Undetected Colombian <strong>Malware</strong> Campaign Using SVG Files</a></h3>
<ul>
<li>
<p>VirusTotal's Code Insight detected a sophisticated <strong>phishing</strong> campaign impersonating the Colombian justice system through SVG files that went completely undetected by all antivirus engines.</p>
</li>
<li>
<p>The malicious SVGs execute embedded JavaScript to render a fake government portal, simulate a document download with progress bar, while secretly downloading a malicious ZIP <strong>archive</strong> in the background.</p>
</li>
<li>
<p>Investigation revealed 523 samples dating back to August 2025, with attackers using <strong>polymorphism</strong> techniques and Spanish-language code comments to evade detection while targeting Colombian users via email.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Why Compliance-First Cybersecurity Programs Fail (And What Actually Works) ]]></title>
        <description><![CDATA[ Most B2B companies build cybersecurity programs backwards - starting with compliance instead of real security. Learn why this approach fails and how fractional CISO services can help you build effective security that actually prevents breaches while achieving compliance. ]]></description>
        <link>https://mandos.io/blog/compliance-first-cybersecurity-programs-fail/</link>
        <guid isPermaLink="false">6890710313b3630001b54f41</guid>
        <category><![CDATA[ Cybersecurity ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 04 Sep 2025 10:59:34 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/The-Backwards-Approach-That-s-Sabotaging-Your-Security.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Last month, I spoke with a CEO of a fast-growing fintech startup in Europe who was frustrated beyond belief. They had just completed their ISO 27001 certification - a grueling 18-month process that consumed significant engineering resources and cost over €150,000 (employee time costs included). Two weeks later, they discovered unauthorized access to their customer database through a misconfigured API endpoint that their compliance program never addressed.</p><p>"We checked every box," he told me. "But we still got breached."</p><p>This story isn't unique. It's become the norm for growing B2B companies who mistake compliance for actual cybersecurity.</p><h2 id="the-backwards-approach-thats-sabotaging-your-security">The Backwards Approach That's Sabotaging Your Security</h2><p>Most companies I advise through fractional CISO services follow the same predictable pattern. They start by selecting a compliance framework - usually ISO 27001 or SOC 2 because enterprise customers demand it. Then they work backwards, implementing controls and writing policies designed to satisfy auditors rather than prevent actual threats.</p><p>The result? Companies end up with elaborate documentation systems and expensive compliance tools, but their actual security posture remains fundamentally weak. They can produce impressive-looking security policies on demand, but they can't detect when attackers are already inside their systems.</p><p>This compliance-first mentality creates several critical blind spots:</p><p><strong>Documentation Over Detection:</strong>&nbsp;Teams spend months crafting incident response procedures that look good on paper, but they've never tested whether they can actually detect an incident in progress. I've seen companies with 47-page incident response playbooks discover breaches weeks after they occurred because they had no real-time monitoring capabilities.</p><p><strong>Process Over Protection:</strong>&nbsp;Organizations implement complex access control policies to satisfy auditors, but they don't address the fundamental issue that 73% of their employees are sharing passwords through Slack messages. The policy says "multi-factor authentication required," but the implementation is so cumbersome that people routinely bypass it.</p><p><strong>Audit Theater Over Asset Security:</strong>&nbsp;Companies catalog their assets and assign risk ratings because the framework demands it, but they don't actually know which systems contain their most sensitive customer data or how those systems connect to each other. When a breach occurs, they spend days just figuring out what was compromised.</p><h2 id="why-smart-auditors-actually-prefer-security-first-programs">Why Smart Auditors Actually Prefer Security-First Programs</h2><p>Here's what most CTOs and founders don't realize: experienced auditors can immediately tell the difference between a compliance program built for show and a security program built for business protection.</p><p>When I work with companies as their fractional CISO, we focus on building security programs that auditors actually respect. The approach is counterintuitive but consistently more effective.</p><p>Instead of starting with framework requirements, we begin by identifying the company's actual business risks. What would happen if customer payment data was compromised? How much revenue would the company lose during a week-long system outage? Which third-party integrations create the highest risk exposure?</p><p>Once we understand the real business impact, we build security controls that directly address these risks. Then - and only then - we document our decisions and map them to compliance requirements.</p><p>The difference in audit outcomes is remarkable. When auditors see security programs built on genuine business risk analysis, they ask fewer challenging questions and accept explanations more readily. They can see that security decisions were made for legitimate business reasons, not just to check compliance boxes.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-security-first-approach-that-actually-works">The Security-First Approach That Actually Works</h2><p>After implementing this approach across dozens of B2B companies through fractional CISO engagements, I've identified the pattern that consistently delivers both strong security and smooth compliance outcomes.</p><p><strong>Start With Business Context:</strong>&nbsp;Before writing a single policy, understand what you're actually protecting. Map your customer data flows, identify your revenue-critical systems, and quantify the business impact of different types of security incidents. This business context becomes the foundation for every security decision you make.</p><p><strong>Build Detection Before Documentation:</strong>&nbsp;Implement monitoring and threat detection capabilities first. You need to know when something bad is happening before you worry about having the perfect incident response procedure. Companies that can detect and contain threats quickly consistently outperform those with elaborate but untested response plans.</p><p><strong>Test Everything Under Pressure:</strong>&nbsp;Design security controls that work during actual business pressure, not just during audit demonstrations. If your access control system is so complex that developers disable it during critical deployments, you don't have security - you have security theater.</p><p><strong>Document Decisions, Not Just Processes:</strong>&nbsp;When auditors review your program, they want to understand why you made specific security investments. Document the business rationale behind your security architecture decisions. Explain why you chose endpoint detection over network monitoring, or why you prioritized identity management over data encryption. This context demonstrates genuine security thinking rather than checkbox compliance.</p><h2 id="what-this-looks-like-in-practice">What This Looks Like in Practice</h2><p>One of my fractional CISO clients, a B2B SaaS company with 120 employees, exemplifies this approach. Instead of starting with ISO 27001 requirements, we spent our first month understanding their business model and identifying their highest-impact security risks.</p><p>We discovered that their biggest vulnerability wasn't technical - it was operational. Customer support agents had broad database access because the previous CTO believed role-based access control was "too complicated for a startup." This single issue created more business risk than all the technical vulnerabilities in their codebase combined.</p><p>Rather than implementing the traditional ISO 27001 access control documentation, we built a practical access management system based on actual job functions and business processes. Support agents could still resolve customer issues quickly, but they couldn't access financial data or modify user accounts.</p><p>When their ISO 27001 audit occurred six months later, the auditor spent less than an hour reviewing access controls because the business rationale was immediately clear. The system was designed to support business operations while preventing data misuse - exactly what the auditor wanted to see.</p><p>The company achieved ISO 27001 certification in record time and simultaneously reduced their security risk exposure by an estimated 67%. More importantly, their enterprise sales cycle shortened by an average of six weeks because prospects had confidence in their security posture.</p><h2 id="why-this-approach-accelerates-enterprise-sales">Why This Approach Accelerates Enterprise Sales</h2><p>For growing B2B companies, the security-first approach creates a significant competitive advantage in enterprise sales cycles. When prospects ask about your security program, you can demonstrate genuine security thinking rather than just showing compliance certificates.</p><p>Enterprise buyers are increasingly sophisticated about cybersecurity. They've seen too many vendors with impressive compliance credentials suffer embarrassing breaches. They want to work with companies that understand security as a business enabler, not just a regulatory requirement.</p><p>When your security program is built on real business risk analysis, you can have confident conversations with enterprise prospects about their specific security concerns. Instead of fumbling through generic compliance documentation, you can explain exactly how your security architecture protects their data and supports business continuity.</p><p>This confidence translates directly into shorter sales cycles and higher win rates for enterprise deals.</p><h2 id="the-fractional-ciso-advantage-for-growing-companies">The Fractional CISO Advantage for Growing Companies</h2><p>Most growing B2B companies face a fundamental challenge: they need enterprise-grade security expertise, but they're not ready for a full-time CISO hire. The typical CISO salary ranges from €150,000 to €250,000 annually, plus equity and benefits - a significant investment for companies still scaling their core business operations.</p><p>Fractional CISO services provide access to senior security leadership without the full-time overhead. You get strategic security guidance from someone who has built security programs across multiple industries and growth stages, but you only pay for the time you actually need.</p><p>More importantly, fractional CISOs bring pattern recognition from working with many companies. We can quickly identify which security investments will have the highest business impact and which compliance requirements you can address more efficiently.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="getting-started-your-next-steps">Getting Started: Your Next Steps</h2><p>If your company is currently building security around compliance requirements, you're not alone - but you can change direction before it becomes a bigger problem.</p><p>Start by asking yourself these questions: What would actually happen to your business if your systems were compromised tomorrow? Which of your current security investments directly address your highest business risks? Can you explain to an enterprise prospect why your security program is designed the way it is?</p><p>If you can't answer these questions confidently, your security program might be built backwards.</p><p>The good news is that it's never too late to refocus on security-first principles. Companies that make this transition consistently achieve better security outcomes and smoother compliance processes.</p><p>Whether you work with fractional CISO services or build internal security capabilities, remember that compliance should validate your security decisions, not drive them.</p><hr><p><strong>About Mandos:</strong>&nbsp;Mandos provides fractional CISO services for growing B2B companies across Europe. We help organizations build lean security programs that accelerate business growth while achieving compliance requirements like ISO 27001 and SOC 2. Our security-first approach has helped companies reduce sales cycles, pass audits, and prevent breaches.</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #119: First AI Ransomware Discovered, Docker Desktop CVE, CrowdStrike $290M Buy ]]></title>
        <description><![CDATA[ Netskope files IPO with $707M ARR amid cybersecurity M&amp;A surge. Industry training decline leaves newcomers struggling despite credentials and certs. ]]></description>
        <link>https://mandos.io/newsletter/brief-119-first-ai-ransomware-discovered-docker-desktop-cve-crowdstrike-290m-buy/</link>
        <guid isPermaLink="false">68aefeec983113000159d1d5</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 31 Aug 2025 17:00:57 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/35.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>The disconnect between what executives think AI is doing for their security teams versus what analysts actually experience on the ground is becoming impossible to ignore - and it's a conversation every security leader needs to have this week.</p><p>In this week's brief:</p><ul><li>ESET discovered the first AI-powered ransomware that writes its own malicious code using publicly available AI models</li><li>A major study reveals 71% of executives believe AI significantly improves security productivity, but only 22% of the analysts using these tools daily actually agree</li><li>The cybersecurity job market continues tightening as companies cut training programs and expect new hires to already have enterprise experience</li></ul><p></p>
<!--kg-card-begin: html-->

    <style>
        body {
            margin: 0;
            padding: 20px;
            font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen, Ubuntu, Cantarell, sans-serif;
            background-color: #f5f5f5;
        }
        
        .sponsor-banner {
            background: linear-gradient(135deg, #1f2937 0%, #374151 50%, #4ade80 100%);
            border-radius: 12px;
            padding: 24px;
            color: white;
            max-width: 600px;
            margin: 0 auto;
            position: relative;
            overflow: hidden;
            border: 1px solid rgba(74, 222, 128, 0.2);
        }
        
        .sponsor-banner::before {
            content: '';
            position: absolute;
            top: 0;
            right: 0;
            width: 100px;
            height: 100px;
            background: rgba(74, 222, 128, 0.15);
            border-radius: 50%;
            transform: translate(30px, -30px);
        }
        
        .sponsor-label {
            font-size: 11px;
            font-weight: 600;
            text-transform: uppercase;
            letter-spacing: 1px;
            color: rgba(255, 255, 255, 0.8);
            margin-bottom: 8px;
        }
        
        .sponsor-content {
            position: relative;
            z-index: 2;
        }
        
        .sponsor-title {
            font-size: 20px;
            font-weight: 700;
            margin-bottom: 8px;
            line-height: 1.3;
        }
        
        .sponsor-description {
            font-size: 14px;
            line-height: 1.5;
            margin-bottom: 16px;
            color: rgba(255, 255, 255, 0.9);
        }
        
        .sponsor-cta {
            display: inline-flex;
            align-items: center;
            background: #4ade80;
            border: 1px solid #22c55e;
            color: #1f2937;
            text-decoration: none;
            padding: 10px 18px;
            border-radius: 6px;
            font-size: 14px;
            font-weight: 600;
            transition: all 0.2s ease;
        }
        
        .sponsor-cta:hover {
            background: #22c55e;
            transform: translateY(-1px);
            box-shadow: 0 4px 12px rgba(74, 222, 128, 0.3);
        }
        
        .sponsor-cta svg {
            margin-left: 6px;
            width: 14px;
            height: 14px;
        }
        
        /* Alternative minimal design */
        .sponsor-banner-minimal {
            background: #f8fafc;
            border: 1px solid #e2e8f0;
            border-left: 4px solid #6366f1;
            border-radius: 8px;
            padding: 16px 20px;
            max-width: 600px;
            margin: 20px auto 0;
        }
        
        .sponsor-banner-minimal .sponsor-label {
            color: #64748b;
            font-size: 10px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-title {
            color: #1e293b;
            font-size: 16px;
            margin-bottom: 6px;
        }
        
        .sponsor-banner-minimal .sponsor-description {
            color: #475569;
            font-size: 13px;
            margin-bottom: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta {
            background: #6366f1;
            color: white;
            border: none;
            padding: 6px 12px;
            font-size: 12px;
        }
        
        .sponsor-banner-minimal .sponsor-cta:hover {
            background: #4f46e5;
            transform: none;
        }
    </style>
<body>
    <div class="sponsor-banner">
        <div class="sponsor-content">
            <div class="sponsor-label">Sponsored Tool Spotlight</div>
            <div class="sponsor-title">Proton VPN</div>
            <div class="sponsor-description">
                Protect your business communications and research with Proton VPN's Swiss-based, no-logs service trusted by security professionals worldwide. Get 64% off their 24-month plan and secure your digital operations with military-grade encryption.
            </div>
            <a href="https://www.jdoqocy.com/click-101524927-14028812?ref=mandos.io" class="sponsor-cta">
                Get 64% Off Proton VPN
                <svg viewBox="0 0 20 20" fill="currentColor">
                    <path fill-rule="evenodd" d="M7.293 14.707a1 1 0 010-1.414L10.586 10 7.293 6.707a1 1 0 011.414-1.414l4 4a1 1 0 010 1.414l-4 4a1 1 0 01-1.414 0z" clip-rule="evenodd" />
                </svg>
            </a>
        </div>
    </div>
    
</body>
</html>
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="first-known-ai-powered-ransomware-uncovered-by-eset-research"><a href="https://www.welivesecurity.com/en/ransomware/first-known-ai-powered-ransomware-uncovered-eset-research/?ref=mandos.io">First Known AI-Powered Ransomware Uncovered By ESET Research</a></h3>
<ul>
<li>
<p>ESET researchers discovered "PromptLock" - the first known <strong>AI-powered</strong> ransomware that uses the gpt-oss-20b model via Ollama API to generate malicious Lua scripts on the fly for data exfiltration and encryption.</p>
</li>
<li>
<p>The <strong>malware</strong> is written in Golang with both Windows and Linux variants identified, though it appears to be a proof-of-concept rather than having been deployed in actual attacks.</p>
</li>
<li>
<p>This discovery demonstrates how publicly-available AI tools could dramatically lower the <strong>barrier</strong> for attackers to create sophisticated ransomware that can adapt to environments at unprecedented speed and <strong>scale</strong>.</p>
</li>
</ul>
<h3 id="docker-desktop-vulnerability-allows-container-escape-cve-2025-9074"><a href="https://pvotal.tech/breaking-dockers-isolation-using-docker-cve-2025-9074/?ref=mandos.io">Docker Desktop Vulnerability Allows Container Escape (CVE-2025-9074)</a></h3>
<ul>
<li>
<p>A critical <strong>vulnerability</strong> in Docker Desktop for Windows and MacOS exposes the Docker Engine socket without authentication, allowing attackers to break container isolation and potentially access the host filesystem.</p>
</li>
<li>
<p>On Windows, attackers can mount the entire filesystem with administrator privileges, read sensitive files, and even escalate to system administrator by overwriting DLLs, while MacOS impact is limited by additional security layers.</p>
</li>
<li>
<p>The issue is fixed in Docker Desktop version 4.44.3 - Linux users are not affected as they use named pipes instead of TCP sockets for the Docker Engine API.</p>
</li>
</ul>
<h3 id="storm-0501-shifts-to-cloud-based-ransomware-tactics"><a href="https://www.microsoft.com/en-us/security/blog/2025/08/27/storm-0501s-evolving-techniques-lead-to-cloud-based-ransomware/?ref=mandos.io">Storm-0501 Shifts To Cloud-Based Ransomware Tactics</a></h3>
<ul>
<li>
<p>Financially motivated threat actor Storm-0501 has evolved from deploying traditional on-premises ransomware to using cloud-based tactics that leverage <strong>exfiltration</strong> of large data volumes and destruction of data/backups without malware deployment.</p>
</li>
<li>
<p>The attack chain begins with on-premises Active Directory compromise, then pivots to Microsoft Entra ID through compromised Directory Synchronization Accounts, eventually elevating to Global Administrator privileges to access and control <strong>Azure</strong> resources.</p>
</li>
<li>
<p>After gaining control, the actor deletes or encrypts critical <strong>storage</strong> accounts and disables protections like resource locks and immutability policies, then demands ransom through Microsoft Teams using compromised accounts.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #118: PayPal 15.8M Credentials Stolen, Workday Breach, AI Sprawl Risks ]]></title>
        <description><![CDATA[ Initial Access Brokers surge 90% targeting smaller US companies. Machine identities now outnumber humans 80 while most orgs lack AI security controls. ]]></description>
        <link>https://mandos.io/newsletter/brief-118-paypal-15-8m-credentials-stolen-workday-breach-ai-sprawl-risks/</link>
        <guid isPermaLink="false">68aacf838c2e9d000142c7f0</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 24 Aug 2025 17:00:17 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/34.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>It seems we're drowning in our own data - with 61% of security teams overwhelmed by threat intelligence feeds while lacking the skilled analysts to make sense of it all.</p><p>In this week's brief:</p><ul><li>Initial Access Brokers are shifting their sights to smaller US companies with weaker defenses, while VPN access becomes their new favorite entry point</li><li>AI adoption is exploding across enterprises, but security teams can only see about 20% of what's actually being used - creating some serious blind spots</li><li>A SOC Lead candidate got rejected mid-interview for not knowing a specific tool, sparking debate about what really matters in security hiring</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-purple kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://calendly.com/nikolozk/30-minute-cybersecurity-discovery-call?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security slowing your business growth? Want your security team to actually drive revenue instead of just saying "no" to everything?</strong></b></p><p><span style="white-space: pre-wrap;">I transform security into your secret weapon for winning deals. </span></p><p><span style="white-space: pre-wrap;">Let's fix this.</span></p>
                        </div>
                    
                    
                        <a href="https://calendly.com/nikolozk/30-minute-cybersecurity-discovery-call?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="initial-access-brokers-target-us-companies-while-shifting-focus-to-smaller-organizations"><a href="https://drive.google.com/file/d/13mpIwINU1YzCmE2y1vTiUgjqgyuS-cew/view?usp=share_link&ref=mandos.io">Initial Access Brokers Target US Companies While Shifting Focus to Smaller Organizations</a></h3>
<ul>
<li>
<p>Initial Access Brokers (IABs) primarily targeted the US (31%) in 2023, while France and Brazil saw increased targeting in 2024, with a 90% increase in accesses for sale across the top 10 targeted countries – suggesting <strong>ransomware</strong> actors are concentrating on specific geographic regions.</p>
</li>
<li>
<p>The <strong>manufacturing</strong> sector has risen into the top 3 targeted industries in 2024, joining business services and retail, while IABs have shifted focus to smaller organizations with revenue between $5M-$50M (60.5% of all listings), potentially due to their weaker security posture.</p>
</li>
<li>
<p>VPN access has surged in 2024 (33% of listings), challenging RDP access (55%) as the preferred access type sold by IABs, with most access listings priced between $500-$3,000, though high-value targets can exceed $10,000.</p>
</li>
</ul>
<h3 id="threat-actor-offering-158-million-paypal-credentials-for-sale"><a href="https://hackread.com/threat-actor-selling-plain-text-paypal-credentials/?ref=mandos.io">Threat Actor Offering 15.8 Million PayPal Credentials For Sale</a></h3>
<ul>
<li>
<p>A threat actor named "Chucky_BF" is advertising a "Global PayPal Credential Dump 2025" containing 15.8 million <strong>plain-text</strong> password and email combinations with associated PayPal URLs for just $750.</p>
</li>
<li>
<p>The 1.1GB dataset likely originated from <strong>infostealer</strong> malware logs rather than a direct PayPal breach, containing login details collected from infected devices worldwide across multiple email providers.</p>
</li>
<li>
<p>The data includes specific PayPal endpoints like /signin and /signup, along with Android-specific URIs, potentially enabling automated <strong>credential stuffing</strong> attacks against both web and mobile services.</p>
</li>
</ul>
<h3 id="workday-discloses-data-breach-following-salesforce-attack"><a href="https://www.bleepingcomputer.com/news/security/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks/?ref=mandos.io">Workday Discloses Data Breach Following Salesforce Attack</a></h3>
<ul>
<li>
<p>HR giant Workday confirmed a data breach after threat actors gained access to their third-party <strong>CRM</strong> platform through a social engineering campaign, primarily exposing business contact information such as names, email addresses, and phone numbers.</p>
</li>
<li>
<p>The breach is part of a larger campaign linked to the <strong>ShinyHunters</strong> extortion group targeting Salesforce instances, with attackers using social engineering and voice phishing techniques to trick employees into linking malicious OAuth apps.</p>
</li>
<li>
<p>Workday, which serves over 11,000 organizations including more than 60% of Fortune 500 companies, discovered the breach on August 6 and emphasized that no customer <strong>tenants</strong> or the data within them were accessed during the incident.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Why Your B2B Company&#x27;s Growth Is at Risk Without Strategic Cybersecurity Leadership ]]></title>
        <description><![CDATA[ Most growing B2B companies make a critical mistake: they treat cybersecurity as a technical problem instead of business protection. Here&#39;s how strategic cybersecurity leadership changes everything. ]]></description>
        <link>https://mandos.io/blog/fractional-ciso-strategic-cybersecurity-leadership-growing-b2b-companies/</link>
        <guid isPermaLink="false">68906b9713b3630001b54ee3</guid>
        <category><![CDATA[ Cybersecurity ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 21 Aug 2025 10:59:56 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/B2B-Company-Growth-Stages---Security-Focus.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Three months ago, I had a conversation with a SaaS founder that perfectly illustrates why most growing B2B companies get cybersecurity completely wrong.</p><p>His company had just lost a $2M enterprise deal because they couldn't answer security questions during the vendor assessment. The procurement team asked about their incident response plan, data encryption standards, and compliance frameworks. His CTO scrambled to provide technical documentation that missed the point entirely.</p><p>"We have great security," he told me, frustrated. "Our infrastructure is solid, we use multi-factor authentication, and our developers follow secure coding practices. Why wasn't that enough?"</p><p>The answer reveals a fundamental misunderstanding that's costing growing B2B companies millions in lost revenue and putting their entire business at risk.</p><h2 id="the-million-dollar-reframing-that-changes-everything">The Million-Dollar Reframing That Changes Everything</h2><p>What I've learned from building cybersecurity programs for dozens of organizations that have never done this before is that success starts with taking the first step to frame cybersecurity broadly.</p><p>It's not a technical problem.</p><p>Of course there are technical aspects to it, but cybersecurity is part of the larger enterprise risk management strategy that keeps everyone inside and outside of your organization safe. This includes your employees, your clients, your partners, and your business reputation.</p><p>When you frame cybersecurity this way, suddenly the conversation changes from "why do we need another IT expense?" to "how do we protect our business and the people who trust us?"</p><p>The CEO stops seeing cybersecurity as something the tech team handles in the background and starts seeing it as something that directly affects customer trust, regulatory compliance, and business continuity. This shift in perspective makes it dramatically easier to get budget, resources, and organizational buy-in.</p><p>Because now you're not asking for security tools – you're asking for business protection.</p><h2 id="why-technical-excellence-isnt-enough-for-enterprise-deals">Why Technical Excellence Isn't Enough for Enterprise Deals</h2><p>That SaaS founder's technical security was actually impressive. His team had implemented zero-trust architecture (sort of), automated vulnerability scanning, and comprehensive logging across their infrastructure. From a purely technical standpoint, they were more secure than many Fortune 500 companies.</p><p>But enterprise buyers don't evaluate vendor security based on technical implementation alone. They evaluate it based on risk management, governance, and the vendor's ability to protect their business relationship.</p><p>When enterprise procurement teams ask about your security program, they're really asking: "Can we trust you to protect our data, maintain business continuity, and help us meet our own compliance requirements?"</p><p>Technical security answers the "what" and "how." Strategic cybersecurity leadership answers the "why" and "what happens when things go wrong."</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-hidden-cost-of-treating-security-as-an-it-problem">The Hidden Cost of Treating Security as an IT Problem</h2><p>Growing B2B companies that treat cybersecurity as purely a technical problem face predictable consequences that compound over time:</p><p><strong>Enterprise deals stall or disappear</strong>&nbsp;because you can't demonstrate governance, risk management, and compliance readiness that enterprise buyers require.</p><p><strong>Regulatory compliance becomes a reactive scramble</strong>&nbsp;rather than a competitive advantage, often requiring expensive consultants and delaying market expansion plans.</p><p><strong>Security incidents create organizational chaos</strong>&nbsp;because there's no clear communication plan, defined roles, or business continuity strategy beyond technical recovery.</p><p><strong>Investor due diligence reveals gaps</strong>&nbsp;that can delay funding rounds or reduce valuations when security is viewed as a technical afterthought rather than business enabler.</p><p>The companies that break through these barriers share one common characteristic: they have strategic cybersecurity leadership that connects security investments to business outcomes.</p><h2 id="from-cost-center-to-competitive-advantage">From Cost Center to Competitive Advantage</h2><p>The transformation happens when cybersecurity moves from being viewed as a necessary expense to being positioned as business protection and competitive differentiation.</p><p>This shift requires someone who can translate technical security controls into business language, demonstrate ROI on security investments, and build programs that actually accelerate business goals rather than obstruct them.</p><p>For most growing B2B companies, hiring a full-time CISO represents a significant investment – typically €120K+ annually plus benefits, equity, and the time required to find and onboard the right person. Many companies aren't ready for that level of commitment, but they desperately need the strategic perspective that comes with experienced cybersecurity leadership.</p><h2 id="the-strategic-advantage-of-fractional-cybersecurity-leadership">The Strategic Advantage of Fractional Cybersecurity Leadership</h2><p>Fractional CISO services bridge this gap by providing experienced cybersecurity leadership on a part-time basis, typically 1-3 days per week depending on your company's stage and needs.</p><p>This approach offers several strategic advantages for growing B2B companies:</p><p><strong>Immediate expertise without hiring delays.</strong>&nbsp;Instead of spending months recruiting and onboarding a full-time executive, you get proven cybersecurity leadership that can start making an impact immediately.</p><p><strong>Cost-effective strategic guidance.</strong>&nbsp;Fractional services typically cost 40-70% less than full-time executive salaries while providing the same level of strategic insight and industry experience.</p><p><strong>Scalable engagement model.</strong>&nbsp;As your company grows and security needs evolve, the engagement can scale up or transition to internal leadership when the timing and budget align.</p><p><strong>External perspective and industry knowledge.</strong>&nbsp;Fractional CISOs bring experience from multiple organizations and industries, providing insights that internal teams might miss.</p><h2 id="what-strategic-cybersecurity-leadership-actually-looks-like">What Strategic Cybersecurity Leadership Actually Looks Like</h2><p>The difference between technical security management and strategic cybersecurity leadership becomes clear when you examine how each approach handles common business scenarios:</p><p><strong>Enterprise sales situations:</strong>&nbsp;Technical teams focus on demonstrating security controls and compliance checkboxes. Strategic leadership focuses on positioning security as a competitive advantage that accelerates deal closure and supports premium pricing.</p><p><strong>Regulatory compliance requirements:</strong>&nbsp;Technical approaches treat compliance as a documentation exercise. Strategic leadership builds compliance programs that streamline operations, reduce business risk, and create competitive differentiation.</p><p><strong>Security incident response:</strong>&nbsp;Technical teams focus on system recovery and vulnerability patching. Strategic leadership ensures business continuity, stakeholder communication, and organizational learning that strengthens future resilience.</p><p><strong>Budget and resource allocation:</strong>&nbsp;Technical security asks for tools and technologies based on functional requirements. Strategic leadership demonstrates ROI, business impact, and risk reduction that supports executive decision-making.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="building-security-programs-that-scale-with-your-business">Building Security Programs That Scale With Your Business</h2><p>The most successful growing B2B companies build cybersecurity programs that evolve with their business model, rather than creating static compliance frameworks that become obstacles to growth.</p><p>This requires understanding how security requirements change as companies move through different growth stages:</p><p><strong>Early growth (50-200 employees):</strong>&nbsp;Focus on foundational security policies, basic compliance frameworks, and security-aware culture that supports rapid scaling without creating operational friction.</p><p><strong>Market expansion (200-500 employees):</strong>&nbsp;Implement governance frameworks that support enterprise sales, regulatory compliance for new markets, and security architecture that scales with increased complexity.</p><p><strong>Enterprise readiness (500+ employees):</strong>&nbsp;Establish mature security operations, comprehensive risk management, and security leadership that can represent the company to enterprise customers, regulators, and investors.</p><p>Each stage requires different priorities, investments, and leadership approaches. Companies that try to skip stages or implement enterprise-level security too early often create unnecessary complexity and costs. Companies that wait too long to invest in strategic security leadership find themselves blocked from growth opportunities.</p><h2 id="the-roi-of-strategic-security-investment">The ROI of Strategic Security Investment</h2><p>When cybersecurity is approached strategically rather than tactically, the return on investment becomes measurable and significant:</p><p><strong>Accelerated sales cycles</strong>&nbsp;through streamlined security questionnaire responses and confident enterprise customer conversations.</p><p><strong>Premium pricing opportunities</strong>&nbsp;when security becomes a competitive differentiator rather than a checkbox requirement.</p><p><strong>Reduced compliance costs</strong>&nbsp;through efficient frameworks that satisfy multiple regulatory requirements simultaneously.</p><p><strong>Faster international expansion</strong>&nbsp;when security programs are designed to meet diverse regulatory requirements from the beginning.</p><p><strong>Higher valuations during funding or acquisition</strong>&nbsp;when security is positioned as a business enabler rather than a cost center.</p><p>The companies that achieve these outcomes share a common approach: they invest in strategic cybersecurity leadership that connects security decisions to business outcomes.</p><h2 id="making-the-strategic-shift">Making the Strategic Shift</h2><p>The transition from viewing cybersecurity as a technical problem to embracing it as business protection requires more than just changing terminology or reorganizing responsibilities.</p><p>It requires leadership that can bridge the gap between technical security requirements and business strategy, someone who can communicate effectively with both engineering teams and executive stakeholders, and the experience to build security programs that actually accelerate business goals.</p><p>For growing B2B companies, fractional CISO services provide the strategic perspective and industry expertise needed to make this transition successfully, without the full-time executive investment that many companies aren't ready to make.</p><p>The question isn't whether your growing B2B company needs strategic cybersecurity leadership. The question is whether you'll invest in it proactively to accelerate growth, or reactively after missing opportunities that strategic security leadership could have captured.</p><hr><p><strong>About Mandos:</strong>&nbsp;Mandos provides fractional CISO and strategic cybersecurity leadership services for growing B2B companies across Europe. Led by Nikoloz Kokhreidze, with 13+ years of experience building security programs at Forbes Cloud 100 FinTech, FMCG multinationals, banking, and global enterprises, Mandos helps companies turn security from a business bottleneck into a competitive advantage.</p><p><strong>Ready to discuss your cybersecurity strategy?</strong>&nbsp;Book a free 30-minute consultation at&nbsp;<a href="http://cal.com/nikolozk/30min?ref=mandos.io">http://cal.com/nikolozk/30min</a></p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #117: Cisco CVSS 10.0 RCE Flaw, ChatGPT Prompt Hijacking, Security Budgets Drop ]]></title>
        <description><![CDATA[ LayerX researchers expose &quot;Man-in-the-Prompt&quot; attacks turning AI assistants into hacking copilots. CISA releases zero trust microsegmentation guidance as Python skills become mandatory for 50%+ of cyber jobs. ]]></description>
        <link>https://mandos.io/newsletter/brief-117-cisco-cvss-10-0-rce-flaw-chatgpt-prompt-hijacking-security-budgets-drop/</link>
        <guid isPermaLink="false">68a18ee12358950001871392</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 17 Aug 2025 17:00:32 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/33.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>Security budgets hitting a five-year low while threats keep escalating feels like trying to fill a bucket with a bigger hole in the bottom each year.</p><p>In this week's brief:</p><ul><li>Cisco patches a maximum severity vulnerability that lets attackers execute remote code on firewall management systems</li><li>New "Man-in-the-Prompt" attacks turn your favorite AI tools into potential data theft machines</li><li>Python skills now showing up in half of all cybersecurity job postings - time to dust off those coding tutorials</li></ul><p>A quick note before we dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-purple kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://calendly.com/nikolozk/30-minute-cybersecurity-discovery-call?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security slowing your business growth? Want your security team to actually drive revenue instead of just saying "no" to everything?</strong></b></p><p><span style="white-space: pre-wrap;">I transform security into your secret weapon for winning deals. </span></p><p><span style="white-space: pre-wrap;">Let's fix this.</span></p>
                        </div>
                    
                    
                        <a href="https://calendly.com/nikolozk/30-minute-cybersecurity-discovery-call?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisco-warns-of-critical-cvss-100-fmc-radius-flaw-allowing-remote-code-execution"><a href="https://thehackernews.com/2025/08/cisco-warns-of-cvss-100-fmc-radius-flaw.html?ref=mandos.io">Cisco Warns of Critical CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution</a></h3>
<ul>
<li>
<p>Cisco has patched a critical <strong>vulnerability</strong> (CVE-2025-20265) with maximum CVSS score of 10.0 in Secure Firewall Management Center (FMC) Software, affecting the <strong>RADIUS</strong> authentication subsystem.</p>
</li>
<li>
<p>The flaw allows unauthenticated, remote attackers to inject arbitrary shell commands during authentication that execute with high privileges when the system is configured for RADIUS authentication.</p>
</li>
<li>
<p>Cisco also released patches for multiple high-severity bugs affecting various <strong>Firewall</strong> products, including denial-of-service vulnerabilities in Adaptive Security Appliance and Secure Firewall Threat Defense <strong>Software</strong>.</p>
</li>
</ul>
<h3 id="top-genai-tools-vulnerable-to-man-in-the-prompt-attack"><a href="https://layerxsecurity.com/blog/man-in-the-prompt-top-ai-tools-vulnerable-to-injection/?ref=mandos.io">Top GenAI Tools Vulnerable to "Man-in-the-Prompt" Attack</a></h3>
<ul>
<li>
<p>LayerX researchers discovered a new <strong>exploit</strong> allowing browser extensions to access and manipulate LLM prompts without special permissions, affecting major platforms like ChatGPT (5B monthly visits) and Google Gemini (400M monthly visits).</p>
</li>
<li>
<p>The vulnerability enables attackers to turn LLMs into "hacking copilots" that can extract sensitive data, with <strong>malicious</strong> extensions able to inject hidden instructions, exfiltrate information, and delete evidence of the attack.</p>
</li>
<li>
<p>Internal corporate LLMs are especially vulnerable as they contain proprietary <strong>datasets</strong> and often lack hardening against adversarial input, creating significant risks for <strong>intellectual</strong> property theft and regulatory compliance violations.</p>
</li>
</ul>
<h3 id="crypto24-ransomware-targets-large-organizations-with-custom-edr-evasion-tool"><a href="https://www.bleepingcomputer.com/news/security/crypto24-ransomware-hits-large-orgs-with-custom-edr-evasion-tool/?ref=mandos.io">Crypto24 Ransomware Targets Large Organizations With Custom EDR Evasion Tool</a></h3>
<ul>
<li>
<p>The <strong>ransomware</strong> group is targeting high-value victims in finance, manufacturing, entertainment, and tech sectors across the US, Europe, and Asia, using a custom variant of RealBlindingEDR to disable security solutions from 12 major vendors.</p>
</li>
<li>
<p>After initial access, attackers escalate privileges by activating default admin accounts, create persistence through malicious Windows services (WinMainSvc keylogger and MSRuntime ransomware loader), and deploy custom tools to systematically <strong>evade</strong> detection.</p>
</li>
<li>
<p>Crypto24 uses a custom <strong>exfiltration</strong> tool that leverages the WinINET API to send stolen data to Google Drive before encrypting files and deleting volume shadow copies to prevent recovery.</p>
</li>
</ul>

<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #116: Microsoft Exchange RCE, Google Salesforce Breach, AI SOC Market ]]></title>
        <description><![CDATA[ RomCom exploits WinRAR zero-day for malware deployment. North Korean UNC4899 steals millions in cryptocurrency through sophisticated cloud attacks. ]]></description>
        <link>https://mandos.io/newsletter/brief-116-microsoft-exchange-rce-google-salesforce-breach-ai-soc-market/</link>
        <guid isPermaLink="false">68989b1526b6d900013cbcb7</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 10 Aug 2025 17:00:50 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/32.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!&nbsp;</p><p>The North Korean cryptocurrency heist story this week really shows how social engineering remains one of our biggest blind spots. Even sophisticated organizations are falling for fake freelance job offers that lead to multi-million dollar losses.</p><p>In this week's brief:</p><ul><li>Microsoft disclosed a high-severity Exchange vulnerability that lets attackers silently escalate privileges in hybrid cloud setups</li><li>The AI SOC market is exploding with predictions that AI will handle 60% of SOC tasks by 2028 - but are we ready for that shift?</li><li>A SOC manager is struggling to transition back to technical work, highlighting a common career dilemma many of us face</li></ul><p>Let's dive in.</p>
<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Why Your Growing B2B Company Shouldn&#x27;t Build AI Infrastructure (And What to Do Instead) ]]></title>
        <description><![CDATA[ Most growing B2B companies are making the same expensive mistake with AI that they made with cloud computing 15 years ago. Here&#39;s why building your own AI infrastructure will kill your competitive advantage and what smart leaders are doing instead. ]]></description>
        <link>https://mandos.io/blog/ai-security-strategy-growing-b2b-companies/</link>
        <guid isPermaLink="false">679f856f726dab0001588176</guid>
        <category><![CDATA[ AI ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 07 Aug 2025 10:20:28 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/ai-security-strategy-growing-b2b-companies.png" medium="image"/>
        <content:encoded><![CDATA[ <h2 id="the-expensive-d%C3%A9j%C3%A0-vu-of-ai-infrastructure">The Expensive Déjà Vu of AI Infrastructure</h2><p>Remember 2010? Every technology leader insisted that cloud computing was "too risky" for serious business applications. Companies burned through millions building and maintaining their own data centers, convinced that keeping everything on-premises was the only way to maintain security and control.</p><p>Fast forward to today, and I'm seeing the exact same pattern with artificial intelligence.</p><p>CTOs and engineering leaders at growing fintech, biotech, and SaaS companies are convincing their boards to invest $20-50 million in on-premises AI infrastructure. They're hiring specialized AI teams, purchasing expensive hardware, and dedicating months of development time to build what they believe will be their competitive moat.</p><p>But here's the uncomfortable truth:&nbsp;<strong>you're not an AI company, and you never will be.</strong></p><h2 id="the-mathematics-of-competitive-disadvantage">The Mathematics of Competitive Disadvantage</h2><p>Let's talk numbers that matter to your business growth.</p><p>Microsoft invested over $100 billion in AI development and infrastructure. OpenAI has raised $300 billion and employs some of the world's brightest AI researchers. Google's AI division operates with resources that dwarf most countries' GDP.</p><p>Your $50 million AI infrastructure budget? It's not even a rounding error in their calculations.</p><p>While your engineering team spends 18 months building yesterday's AI models, your competitors are already leveraging today's cutting-edge APIs to deliver superior customer experiences, automate complex processes, and capture market share.</p><p>I've seen this play out with three different clients in the past year. Each company delayed critical product launches by 6-12 months while building "proprietary" AI capabilities that were obsolete before they went live.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-real-ai-security-challenge-its-not-what-you-think">The Real AI Security Challenge (It's Not What You Think)</h2><p>Here's where most founders and CTOs get it wrong: they think AI security is about controlling the infrastructure.</p><p>It's not.</p><p>AI security is about controlling data flow, inputs, and outputs. It's about governance frameworks that ensure your company can leverage AI tools safely without exposing sensitive customer data or proprietary information.</p><p>The companies that will win the AI adoption race aren't building their own models. They're the ones who figured out how to securely integrate best-in-class AI services into their existing workflows.</p><p>This requires a completely different approach to security strategy – one that most growing companies aren't equipped to handle internally.</p><h2 id="what-smart-leaders-are-doing-instead">What Smart Leaders Are Doing Instead</h2><p>The most successful growing B2B companies I work with have made a fundamental shift in their AI strategy. Instead of asking "How do we build AI?", they're asking "How do we securely consume AI?"</p><p>This shift changes everything:</p><p><strong>Infrastructure Investment</strong>: Instead of spending millions on hardware and specialized talent, they're investing in robust API security, data classification systems, and AI governance frameworks.</p><p><strong>Security Approach</strong>: Rather than trying to secure their own AI infrastructure, they're implementing controls that allow safe consumption of external AI services while protecting sensitive data.</p><p><strong>Competitive Timeline</strong>: While competitors spend years building inferior AI capabilities, these companies are already delivering AI-powered features to customers using best-in-class APIs.</p><p><strong>Risk Management</strong>: They've moved from the high-risk strategy of building unproven technology to the lower-risk approach of securely integrating proven solutions.</p><h2 id="the-fractional-ciso-advantage-in-ai-strategy">The Fractional CISO Advantage in AI Strategy</h2><p>Most growing companies face a critical gap: they need strategic security leadership for AI adoption, but they're not ready for a full-time CISO hire.</p><p>This is where fractional cybersecurity leadership becomes invaluable. An experienced fractional CISO can help you:</p><ul><li>Develop AI governance frameworks that enable safe adoption without slowing innovation</li><li>Implement data classification and protection controls that work with external AI services</li><li>Create security policies that allow your teams to leverage AI tools productively</li><li>Build vendor assessment processes for AI service providers</li><li>Establish incident response procedures for AI-related security events</li></ul><h2 id="the-hidden-costs-of-getting-ai-security-wrong">The Hidden Costs of Getting AI Security Wrong</h2><p>The companies that try to "figure out" AI security as they go face predictable and expensive consequences:</p><p><strong>Regulatory Exposure</strong>: AI governance requirements are emerging rapidly across industries. Companies without proper frameworks face compliance risks that can shut down entire product lines.</p><p><strong>Data Breaches</strong>: Poorly implemented AI integrations become attack vectors. One client avoided a potentially devastating breach only because we caught their development team accidentally training models on customer PII.</p><p><strong>Competitive Disadvantage</strong>: While you're building AI infrastructure, competitors with better security strategies are already delivering AI-powered features that customers demand.</p><p><strong>Investor Concerns</strong>: Sophisticated investors now ask detailed questions about AI governance during due diligence. Companies without clear answers find fundraising much more difficult.</p><h2 id="building-your-ai-security-strategy-a-practical-framework">Building Your AI Security Strategy: A Practical Framework</h2><p>The most effective approach I've seen follows a clear progression:</p><p><strong>Phase 1: Data Classification and Protection</strong>&nbsp;Identify what data can and cannot be processed by external AI services. Implement controls that prevent sensitive information from leaving your environment.</p><p><strong>Phase 2: AI Governance Framework</strong>&nbsp;Establish policies for AI tool adoption, usage monitoring, and incident response. Create approval processes that balance security with innovation speed.</p><p><strong>Phase 3: Secure Integration Architecture</strong>&nbsp;Design API security controls, implement monitoring systems, and establish data flow controls that enable safe AI consumption.</p><p><strong>Phase 4: Continuous Monitoring and Improvement</strong>&nbsp;Deploy systems that track AI usage across your organization and continuously assess emerging risks and opportunities.</p><p>Most companies try to tackle all four phases simultaneously and end up with incomplete solutions that create more risk than protection.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-bottom-line-for-growing-b2b-companies">The Bottom Line for Growing B2B Companies</h2><p>The companies that will dominate their markets over the next five years won't be the ones that built the best AI infrastructure. They'll be the ones that figured out how to securely and strategically consume AI services while their competitors were still arguing about on-premises versus cloud deployment.</p><p>Your competitive advantage lies in your core business expertise, not in recreating technology that Microsoft and Google have already perfected.</p><p>The question isn't whether your company should adopt AI – your competitors are already using it to improve customer experiences, automate processes, and reduce costs.</p><p>The question is whether you'll adopt AI securely and strategically, or whether you'll spend the next two years building expensive infrastructure while missing the opportunities that matter most to your business growth.</p><p><strong>Stop fighting the inevitable. Start securing what actually matters.</strong></p><hr><p><strong>About Mandos:</strong>&nbsp;Mandos provides fractional CISO and strategic cybersecurity leadership services for growing B2B companies across Europe. Led by Nikoloz Kokhreidze, with 13+ years of experience building security programs at Forbes Cloud 100 FinTech, FMCG multinationals, banking, and global enterprises, Mandos helps companies turn security from a business bottleneck into a competitive advantage.</p><p><strong>Ready to discuss your cybersecurity strategy?</strong>&nbsp;Book a free 30-minute consultation at <a href="http://cal.com/nikolozk/30min?ref=mandos.io">http://cal.com/nikolozk/30min</a>.</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #115: Palo Alto&#x27;s $25B CyberArk Acquisition, Microsoft OAuth MFA Bypass, 45% Insecure AI Code ]]></title>
        <description><![CDATA[ Auto-Color backdoor exploits SAP NetWeaver via CVE-2025-31324 targeting US chemicals company. Cursor IDE vulnerability enables full RCE through prompt injection attacks. ]]></description>
        <link>https://mandos.io/newsletter/brief-115-palo-altos-25b-cyberark-acquisition-microsoft-oauth-mfa-bypass-45-insecure-ai-code/</link>
        <guid isPermaLink="false">688cd982b9eef00001b16cca</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 03 Aug 2025 17:00:37 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/08/31.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>The crypto industry just lost over $800 million in a single quarter – a quick reminder that even cutting-edge tech isn't immune to basic security fundamentals being overlooked.</p><p>In this week's brief:</p><ul><li>Attackers are successfully bypassing MFA using fake Microsoft OAuth apps, compromising thousands of accounts with a concerning 50%+ success rate</li><li>New research reveals that AI-generated code contains vulnerabilities nearly half the time, raising questions about our growing reliance on LLMs for development</li><li>The cybersecurity job market is getting tougher, with even GRC roles now requiring technical skills that weren't expected just a few years ago</li></ul><p>As organizations rush to integrate AI into security workflows, are we moving fast enough on securing the AI itself, or are we creating new attack surfaces faster than we can defend them?</p><p>Let me know in the comments.</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="threat-actors-using-fake-microsoft-oauth-apps-to-bypass-mfa"><a href="https://www.proofpoint.com/us/blog/threat-insight/microsoft-oauth-app-impersonation-campaign-leads-mfa-phishing?ref=mandos.io">Threat Actors Using Fake Microsoft OAuth Apps To Bypass MFA</a></h3>
<ul>
<li>
<p>Attackers are impersonating legitimate enterprises with fake Microsoft OAuth applications to conduct <strong>AiTM</strong> (attacker-in-the-middle) phishing campaigns that specifically bypass multi-factor authentication using the <strong>Tycoon</strong> phishing-as-a-service platform.</p>
</li>
<li>
<p>The campaign has targeted over 3,000 user accounts across 900+ Microsoft 365 environments with a success rate exceeding 50%, customizing attacks to specific industries including <strong>aerospace</strong> and defense companies.</p>
</li>
<li>
<p>Microsoft plans to block legacy authentication protocols and require admin consent for third-party app access starting July 2025, which will significantly reduce the effectiveness of this attack technique.</p>
</li>
</ul>
<h3 id="aim-labs-discovers-curxecute-rce-vulnerability-in-cursor-ide"><a href="https://www.aim.security/lp/aim-labs-curxecute-blogpost?ref=mandos.io">Aim Labs Discovers "CurXecute" RCE Vulnerability in Cursor IDE</a></h3>
<ul>
<li>
<p>Aim Labs identified a high <strong>severity</strong> (8.6) vulnerability in Cursor IDE enabling full Remote-Code-Execution through a prompt-injection attack tracked as CVE-2025-54135.</p>
</li>
<li>
<p>The exploit occurs when Cursor's MCP server fetches untrusted external data that can silently rewrite ~/.cursor/mcp.json and execute <strong>arbitrary</strong> commands with user privileges.</p>
</li>
<li>
<p>Cursor fixed the issue in version 1.3, but all earlier releases remain <strong>vulnerable</strong> to this attack vector, which requires no user confirmation and executes before users can reject suggested edits.</p>
</li>
</ul>
<h3 id="auto-color-backdoor-darktrace-thwarts-stealthy-linux-intrusion-via-cve-2025-31324"><a href="https://www.darktrace.com/blog/auto-color-backdoor-how-darktrace-thwarted-a-stealthy-linux-intrusion?ref=mandos.io">Auto-Color Backdoor: Darktrace Thwarts Stealthy Linux Intrusion Via CVE-2025-31324</a></h3>
<ul>
<li>
<p>Darktrace identified and contained an <strong>Auto-Color</strong> backdoor malware attack targeting a US chemicals company through exploitation of CVE-2025-31324 in SAP NetWeaver, marking the first observed pairing of this vulnerability with Auto-Color <strong>malware</strong>.</p>
</li>
<li>
<p>The threat actor used multiple stages: initial exploitation to download a ZIP file, followed by <strong>DNS</strong> tunneling requests to OAST domains, and ultimately deployment of the Auto-Color ELF file which establishes persistence by modifying /etc/ld.so.preload and installing a malicious shared object (libcext.so.2).</p>
</li>
<li>
<p>Auto-Color employs sophisticated evasion techniques including a unique <strong>suppression</strong> mechanism that limits malicious behavior when C2 connection fails, helping it avoid detection in air-gapped or sandboxed environments while maintaining persistence through system library manipulation.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="web3-security-over-800-million-lost-in-crypto-hacks-during-q2-2025"><a href="https://drive.google.com/file/d/1JLwb6D4f7V8VvNgGOxn1smweg5DGYubh/view?usp=drivesdk&ref=mandos.io">Web3 Security: Over $800 Million Lost In Crypto Hacks During Q2 2025</a></h3>
<ul>
<li>
<p>The crypto industry suffered $801,315,669 in losses across 144 security incidents in Q2 2025, with <strong>phishing</strong> emerging as the most costly attack vector ($395M stolen across 52 incidents), followed by code <strong>vulnerabilities</strong> ($235.7M across 47 incidents).</p>
</li>
<li>
<p>While Ethereum experienced the highest number of incidents (70), Bitcoin saw the largest financial impact with $373.6M stolen. The total for H1 2025 has already reached $2.47B in losses, surpassing the entire 2024 total of $2.4B.</p>
</li>
<li>
<p>Notable incidents include a BTC whale losing $330.7M to social engineering, Cetus Protocol's $225.6M smart contract <strong>exploit</strong> on Sui blockchain, and Nobitex's $89.1M loss to a <strong>hacktivist</strong> group that deliberately burned the stolen funds.</p>
</li>
</ul>
<h3 id="mitratech-study-third-party-risk-management-programs-understaffed-and-underprepared"><a href="https://drive.google.com/file/d/1GDmbVIaAtlZs1vAMNrsN0qrRt87g0Zs4/view?usp=drivesdk&ref=mandos.io">Mitratech Study: Third-Party Risk Management Programs Understaffed and Underprepared</a></h3>
<ul>
<li>
<p>Nearly 70% of TPRM programs are <strong>understaffed</strong> by about 29%, with organizations only managing 40% of their total vendor base on average – creating significant security blind spots for most companies.</p>
</li>
<li>
<p>The involvement of compliance teams in TPRM has surged from 42% in 2023 to 88% in 2025, driven by increasing <strong>regulatory</strong> pressures, particularly around data privacy and operational resilience.</p>
</li>
<li>
<p>While cybersecurity remains the most tracked third-party risk (85%), only 35% of organizations feel prepared for incident response, with 41% still relying on <strong>spreadsheets</strong> despite growing AI adoption (14% active implementation, 65% exploring).</p>
</li>
</ul>
<h3 id="social-engineering-remains-top-initial-access-vector-in-unit-42-ir-cases"><a href="https://unit42.paloaltonetworks.com/2025-unit-42-global-incident-response-report-social-engineering-edition/?ref=mandos.io">Social Engineering Remains Top Initial Access Vector in Unit 42 IR Cases</a></h3>
<ul>
<li>
<p>Social engineering was the top initial access vector in 36% of Unit 42 incident response cases between May 2024-2025, with <strong>high-touch</strong> attacks on the rise where threat actors like Muddled Libra bypass MFA and exploit IT support processes to escalate privileges in minutes.</p>
</li>
<li>
<p><strong>Data</strong> exposure resulted from 60% of social engineering attacks, significantly higher than the 44% rate seen in other attack vectors, with financial gain being the primary motivation in 93% of cases.</p>
</li>
<li>
<p>Non-phishing social engineering techniques are gaining ground, with SEO poisoning, fake system prompts, and help desk manipulation accounting for 35% of social engineering cases, forcing defenders to strengthen <strong>identity</strong> resilience and visibility across workflows.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ciso-melina-scotto-shares-insights-on-cybersecurity-career-paths"><a href="https://www.darkreading.com/cybersecurity-operations/cyber-career-opportunities-certifications-degrees?ref=mandos.io">CISO Melina Scotto Shares Insights on Cybersecurity Career Paths</a></h3>
<ul>
<li>
<p>Former Fortune 500 CISO Melina Scotto recommends pursuing <strong>certifications</strong> through organizations like ISC2 and platforms like Udemy before committing to full degree programs, noting that while formal education remains valuable for leadership roles, certifications may suffice for technical positions.</p>
</li>
<li>
<p>Scotto emphasizes gaining practical experience in different systems, <strong>networking</strong>, and AI before specializing in cybersecurity, as understanding technical details helps security professionals work effectively with operations teams.</p>
</li>
<li>
<p>The industry has evolved from viewing cybersecurity teams as "nags" to recognizing them as essential business partners, with organizations now understanding that cyber risk is <strong>business</strong> risk and well-maintained systems improve both security and operational performance.</p>
</li>
</ul>
<h3 id="cybersecurity-job-market-shows-significant-challenges-for-grc-professionals"><a href="https://www.reddit.com/r/cybersecurity/comments/1m93ezp/job_market_feels_brutal_6_weeks_unemployed_and/?ref=mandos.io">Cybersecurity Job Market Shows Significant Challenges for GRC Professionals</a></h3>
<ul>
<li>
<p>A GRC security professional with 5 years of experience reports applying to 80 jobs over 7 weeks, resulting in only 4 substantive interviews, highlighting the <strong>competitive</strong> nature of the current cybersecurity job market.</p>
</li>
<li>
<p>Many interviews focused on technical skills outside traditional GRC expertise, including coding requirements, <strong>SIEM</strong> usage, threat hunting, and EDR knowledge – suggesting employers are seeking broader technical competencies even for governance-focused roles.</p>
</li>
<li>
<p>Community responses indicate this experience is common, with multiple professionals noting extended unemployment periods and increasing technical <strong>requirements</strong> for traditionally non-technical security roles, including coding assessments for GRC positions.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-question-value-of-certifications-without-experience"><a href="https://www.reddit.com/r/cybersecurity/comments/1m97n6h/seeing_so_many_certified_people_still_jobless_are/?ref=mandos.io">Cybersecurity Professionals Question Value Of Certifications Without Experience</a></h3>
<ul>
<li>
<p>Industry <strong>professionals</strong> are emphasizing that cybersecurity is not an entry-level field – it typically requires foundational IT experience before specialization, with many hiring managers looking past certifications to practical skills.</p>
</li>
<li>
<p>Multiple <strong>experienced</strong> cybersecurity practitioners report employment challenges despite having advanced certifications (like CISSP, GCIH, GDAT), suggesting that the current job market values demonstrated competence over credentials alone.</p>
</li>
<li>
<p>The consensus among commenters is that certifications primarily help candidates pass initial HR <strong>filters</strong> but rarely compensate for a lack of hands-on experience, with hiring managers increasingly scrutinizing applicants who pursue certifications without building relevant technical backgrounds.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="mas-hijacking-attack-compromises-multi-agent-ai-systems"><a href="https://blog.trailofbits.com/2025/07/31/hijacking-multi-agent-systems-in-your-pajamas/?ref=mandos.io">MAS Hijacking Attack Compromises Multi-Agent AI Systems</a></h3>
<ul>
<li>
<p>Trail of Bits released pajaMAS, a set of demo exploits showing how attackers can manipulate multi-agent systems (MAS) to execute <strong>malicious</strong> code, even when individual agents have strong prompt injection defenses.</p>
</li>
<li>
<p>The attack works by exploiting inter-agent communication, turning agents into confused deputies that launder unsafe data from other agents, with attack vectors including <strong>compromised</strong> environments, tools, agent memory, and URL anchors.</p>
</li>
<li>
<p>Researchers recommend defensive measures including validation of command chains, tool provenance tracking, strict session <strong>hygiene</strong>, and implementing security at the orchestration layer rather than within individual agents.</p>
</li>
</ul>
<h3 id="owasp-releases-comprehensive-genai-incident-response-guide"><a href="https://drive.google.com/file/d/1OoHhGLH44HAV9145nR9fyR4aViySp1JT/view?usp=drivesdk&ref=mandos.io">OWASP Releases Comprehensive GenAI Incident Response Guide</a></h3>
<ul>
<li>
<p>The OWASP GenAI Security Project has published a new guide to help security teams respond to <strong>incidents</strong> involving generative AI applications, addressing the unique challenges posed by their probabilistic nature and semantic vulnerabilities.</p>
</li>
<li>
<p>The guide provides practical frameworks for risk assessment, asset classification, detection techniques, and response protocols specific to AI systems, with dedicated sections for attacks on AI systems, supply chains, and third-party model <strong>providers</strong>.</p>
</li>
<li>
<p>According to 2025 McKinsey data cited in the guide, fewer than 50% of organizations are actively mitigating <strong>security</strong> risks associated with GenAI, highlighting a significant gap in organizational <strong>preparedness</strong> for AI-related threats.</p>
</li>
</ul>
<h3 id="genai-llms-generate-insecure-code-45-of-the-time-study-finds"><a href="https://drive.google.com/file/d/1P5s_WYYcv28GckKIctVqABMeiDqe6dAC/view?usp=drivesdk&ref=mandos.io">GenAI LLMs Generate Insecure Code 45% Of The Time, Study Finds</a></h3>
<ul>
<li>
<p>Only 55% of code generated by AI models is secure, with the remaining 45% containing known <strong>vulnerabilities</strong> like SQL injection, XSS, log injection, and insecure cryptographic algorithms.</p>
</li>
<li>
<p>Security performance remains consistent regardless of model size and has shown minimal improvement over time, even as LLMs get better at generating functionally correct code.</p>
</li>
<li>
<p>Test results varied significantly across different vulnerability types (<strong>CWEs</strong>) and programming languages (Java, JavaScript, C#, and Python), but remained surprisingly consistent across different AI <strong>models</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="palo-alto-networks-to-acquire-cyberark-in-25-billion-deal"><a href="https://www.helpnetsecurity.com/2025/07/31/palo-alto-networks-cyberark/?ref=mandos.io">Palo Alto Networks to Acquire CyberArk in $25 Billion Deal</a></h3>
<ul>
<li>
<p>Palo Alto Networks will acquire CyberArk for approximately $25 billion, marking its formal entry into <strong>identity</strong> security as a core pillar of its multi-platform strategy.</p>
</li>
<li>
<p>The strategic combination aims to disrupt the legacy IAM market by extending robust, security-first <strong>privileged</strong> access management principles to all identity types – human, machine, and autonomous AI agents.</p>
</li>
<li>
<p>Integration will create a unified security platform that addresses critical <strong>credential</strong> protection challenges while securing <strong>Agentic</strong> AI, ensuring AI agents receive just-in-time access with least privilege principles.</p>
</li>
</ul>
<h3 id="comp-ai-secures-26m-pre-seed-to-disrupt-soc-2-compliance-market"><a href="https://securityledger.com/2025/08/comp-ai-secures-2-6m-pre-seed-to-disrupt-soc-2-market/?ref=mandos.io">Comp AI Secures $2.6M Pre-Seed To Disrupt SOC 2 Compliance Market</a></h3>
<ul>
<li>
<p>San Francisco-based startup Comp AI has raised $2.6M in pre-seed funding to transform how companies achieve compliance with <strong>frameworks</strong> like SOC 2, HIPAA, and ISO 27001 through AI-powered automation.</p>
</li>
<li>
<p>The company claims its AI-powered approach can automate up to 90% of the compliance process, helping early customers save over 2,500 hours on manual <strong>compliance</strong> work with its solution positioned as a developer-friendly alternative to traditional platforms.</p>
</li>
<li>
<p>Funding will support the expansion of their open-source platform enabling security professionals to contribute control templates, and launch their AI Agent Studio for <strong>automated</strong> evidence collection and risk assessments.</p>
</li>
</ul>
<h3 id="echo-raises-15m-for-vulnerability-free-container-images"><a href="https://www.securityweek.com/echo-raises-15m-in-seed-funding-for-vulnerability-free-container-images/?ref=mandos.io">Echo Raises $15M for Vulnerability-Free Container Images</a></h3>
<ul>
<li>
<p>Echo secured $15M in seed funding led by Notable Capital and Hyperwise Ventures to develop <strong>container</strong> base images built from the ground up to be free of known vulnerabilities.</p>
</li>
<li>
<p>Founded by former Argon Security creators, Echo allows customers to simply replace the base image in their Dockerfile with a CVE-free version without switching to non-standard operating <strong>software</strong>.</p>
</li>
<li>
<p>The company has reduced vulnerability <strong>remediation</strong> timelines from an industry average of 120 days to just 24 hours, with changes reflected in customers' existing scanners and CNAPPs.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="tracebit"><a href="https://tracebit.com/?ref=mandos.io">Tracebit</a></h3>
<p>A security platform that automates the deployment and management of security canaries across cloud infrastructure to detect potential intrusions and unauthorized access.</p>
<h3 id="xocopy"><a href="http://reverse.lostrealm.com/tools/xocopy.html?ref=mandos.io">xocopy</a></h3>
<p>Copy executables with execute, but no read permission on Unix systems.</p>
<h3 id="owasp-bricks"><a href="http://sechow.com/bricks/download.html?ref=mandos.io">OWASP Bricks</a></h3>
<p>Deliberately vulnerable web application for security professionals to practice attack techniques.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #114: Microsoft SharePoint Zero-Day, Amazon AI Hacked, 97% AI Incidents ]]></title>
        <description><![CDATA[ Scattered Spider resurfaces with $592M in damages across 11 major attacks. Nigerian cybercrime ring targets aviation execs with six-figure BEC losses. ]]></description>
        <link>https://mandos.io/newsletter/brief-114-microsoft-sharepoint-zero-day-amazon-ai-hacked-97-ai-incidents/</link>
        <guid isPermaLink="false">688389195fadcc0001526865</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 27 Jul 2025 18:28:01 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/07/30.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>A new study shows 70% of third-party risk management programs are understaffed by nearly 30%. It's almost like we're setting ourselves up for failure. We know human factors matter, but we're not investing in the human resources to actually manage those risks properly.</p><p>In this week's brief:</p><ul><li>SharePoint servers are under active attack through a zero-day vulnerability chain with no patch available yet</li><li>TPRM programs are significantly understaffed just as regulatory pressures are intensifying</li><li>AI security incidents are hitting 97% of organizations, and it turns out it's really all about API security</li></ul><p>The thread connecting these stories? We're dealing with complex, interconnected risks that require both technical solutions and adequate staffing to manage effectively.</p><p><strong>Here's my question for you this week:</strong> If you had to choose between hiring one more security analyst or one more vendor risk specialist, which would have bigger impact on your organization's security posture right now?</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="microsoft-sharepoint-servers-under-attack-through-zero-day-vulnerability-chain"><a href="https://research.eye.security/sharepoint-under-siege/?ref=mandos.io">Microsoft SharePoint Servers Under Attack Through Zero-Day Vulnerability Chain</a></h3>
<ul>
<li>
<p>Eye Security detected active <strong>exploitation</strong> of a new SharePoint RCE vulnerability chain dubbed "ToolShell" (CVE-2025-53770), allowing attackers to compromise systems without authentication by exploiting vulnerabilities in the ToolPane.aspx component.</p>
</li>
<li>
<p>Attackers deploy a malicious ASPX file that extracts <strong>MachineKey</strong> configurations, enabling them to generate valid ViewState payloads for complete remote code execution using tools like ysoserial.</p>
</li>
<li>
<p>Microsoft has acknowledged the vulnerability but has not released a patch; organizations should isolate affected servers, scan for the malicious spinstall0.aspx file, and rotate all <strong>credentials</strong> that may have been exposed.</p>
</li>
</ul>
<h3 id="hacker-plants-computer-wiping-commands-in-amazons-ai-coding-agent"><a href="https://www.404media.co/hacker-plants-computer-wiping-commands-in-amazons-ai-coding-agent/?ref=mandos.io">Hacker Plants Computer 'Wiping' Commands in Amazon's AI Coding Agent</a></h3>
<ul>
<li>
<p>A <strong>hacker</strong> compromised Amazon's AI coding assistant 'Q' by adding code that instructed the software to "clean a system to a near-factory state and delete file-system and cloud resources," which Amazon then released to users.</p>
</li>
<li>
<p>The attacker claimed they gained access by simply submitting a pull request to the tool's GitHub <strong>repository</strong>, highlighting significant security gaps in Amazon's code review and release process.</p>
</li>
<li>
<p>While the wiping commands likely wouldn't have worked properly, the hacker stated they could have caused much more <strong>damage</strong> with their access and wanted to expose what they called Amazon's AI "security theater."</p>
</li>
</ul>
<h3 id="nigerian-cybercrime-ring-silverterrier-targets-aviation-executives-with-bec-scams"><a href="https://krebsonsecurity.com/2025/07/phishers-target-aviation-execs-to-scam-customers/?ref=mandos.io">Nigerian Cybercrime Ring SilverTerrier Targets Aviation Executives With BEC Scams</a></h3>
<ul>
<li>
<p>A long-running Nigerian <strong>cybercrime</strong> ring known as SilverTerrier is actively targeting transportation and aviation companies with sophisticated business email compromise (BEC) attacks, resulting in at least one customer suffering a six-figure financial loss.</p>
</li>
<li>
<p>After compromising an executive's Microsoft 365 credentials, attackers quickly established <strong>look-alike</strong> domains and sent modified invoice demands to customers, revealing an extensive infrastructure with hundreds of phishing domains registered since 2012.</p>
</li>
<li>
<p>BEC scams generated nearly $2.8 billion in losses last year, making them the second most costly form of <strong>cybercrime</strong> reported to the FBI, with victims having 72 hours to use the Financial Fraud Kill Chain to potentially recover stolen funds.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybercube-analysis-identifies-2-of-large-firms-at-highest-scattered-spider-ransomware-risk">CyberCube Analysis Identifies 2% of Large Firms at Highest Scattered Spider <strong>Ransomware</strong> Risk</h3>
<p>(<a href="https://insights.cybcube.com/en/firms-highest-scattered-spider-risk?ref=cybersecstats.com">https://insights.cybcube.com/en/firms-highest-scattered-spider-risk?ref=cybersecstats.com</a>)</p>
<ul>
<li>
<p>Scattered Spider has resurfaced with renewed intensity, conducting 11 major <strong>attacks</strong> between April-July 2025 across retail, insurance, and airline industries, causing significant financial damage (up to $592 million to UK retailers alone).</p>
</li>
<li>
<p>The threat actor exhibits a pattern of targeting multiple companies within one sector before moving to another, utilizing sophisticated social-engineering tactics to bypass <strong>authentication</strong> systems and infiltrate high-value corporate networks.</p>
</li>
<li>
<p>CyberCube's Portfolio Threat Actor Intelligence (PTI) solution has identified Manufacturing, Education, IT, and Retail sectors as having the highest concentrations of potential <strong>targets</strong> for Scattered Spider attacks.</p>
</li>
</ul>
<h3 id="thales-cloud-security-study-highlights-growing-complexity-and-attack-surface"><a href="https://drive.google.com/file/d/1IaXb9Npb2h1G29PgrfuS-LngjgYFvfZ-/view?usp=drivesdk&ref=mandos.io">Thales Cloud Security Study Highlights Growing Complexity and Attack Surface</a></h3>
<ul>
<li>
<p>Cloud security remains the top security spending priority for organizations, with 64% identifying it as a pressing discipline, yet 55% report that securing cloud environments is more <strong>complex</strong> than on-premises infrastructure – up 4% from last year.</p>
</li>
<li>
<p>Four of the top five reported attack targets are cloud-based, with 68% of respondents citing <strong>credential</strong> and stolen secrets attacks as the fastest-growing cloud infrastructure attack vectors, while only 65% have implemented multifactor authentication.</p>
</li>
<li>
<p>Organizations are placing more sensitive data in the cloud (54% of cloud data is now sensitive, up from 47% last year), but encryption practices remain inadequate, with tool <strong>sprawl</strong> complicating management as 57% use five or more key management systems.</p>
</li>
</ul>
<h3 id="mitratech-study-third-party-risk-management-programs-understaffed-and-underprepared"><a href="https://drive.google.com/file/d/1GDmbVIaAtlZs1vAMNrsN0qrRt87g0Zs4/view?usp=drivesdk&ref=mandos.io">Mitratech Study: Third-Party Risk Management Programs Understaffed and Underprepared</a></h3>
<ul>
<li>
<p>Nearly 70% of TPRM programs are <strong>understaffed</strong> by about 29%, with organizations only managing 40% of their total vendor base on average – creating significant security blind spots for most companies.</p>
</li>
<li>
<p>The involvement of compliance teams in TPRM has surged from 42% in 2023 to 88% in 2025, driven by increasing <strong>regulatory</strong> pressures, particularly around data privacy and operational resilience.</p>
</li>
<li>
<p>While cybersecurity remains the most tracked third-party risk (85%), only 35% of organizations feel prepared for incident response, with 41% still relying on <strong>spreadsheets</strong> despite growing AI adoption (14% active implementation, 65% exploring).</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="books-influencing-modern-cybersecurity-leadership-styles"><a href="https://www.csoonline.com/article/4027000/the-books-shaping-todays-cybersecurity-leaders.html?ref=mandos.io">Books Influencing Modern Cybersecurity Leadership Styles</a></h3>
<ul>
<li>
<p>Top cybersecurity executives recommend books across multiple domains including <strong>risk</strong> measurement ("How to Measure Anything in Cybersecurity Risk"), decision-making psychology ("Thinking, Fast and Slow"), and social engineering ("The Art of Deception") to help security professionals improve technical and leadership capabilities.</p>
</li>
<li>
<p>Many CISOs emphasize books on human factors in security, with recommendations focusing on understanding <strong>vulnerabilities</strong> in human behavior rather than just technical systems – highlighting works that explore deception techniques, ethical hacking perspectives, and the psychology behind security breaches.</p>
</li>
<li>
<p>Leadership-focused recommendations extend beyond traditional management topics to include works on <strong>empathy</strong> and communication ("Dare to Lead," "Radical Candor"), with several security executives also valuing books that encourage work-life balance and personal fulfillment as crucial for sustainable security careers.</p>
</li>
</ul>
<h3 id="cybersecurity-director-shares-salary-range-and-work-life-balance-details"><a href="https://www.reddit.com/r/cybersecurity/comments/1m8pnzw/hows_your_salary_and_work_life_balance_as_a/?ref=mandos.io">Cybersecurity Director Shares Salary Range and Work-Life Balance Details</a></h3>
<ul>
<li>
<p>A director of a small incident response team (~10 people) reports earning between $145,000-$185,000 with variations based on sector, experience, location, and <strong>certifications</strong>, noting it took 25 years to reach this position.</p>
</li>
<li>
<p>Entry-level Cybersecurity Analyst positions at their company start at $75K-$80K with a bachelor's degree, $85K-$90K with a master's, and typically reach $100K by year 4, with requirements including background checks and <strong>drug testing</strong>.</p>
</li>
<li>
<p>The role offers exceptional <strong>training</strong> opportunities and flexibility for side projects, with work-life balance described as better than most cybersecurity positions except during major <strong>incidents</strong> when long hours are required.</p>
</li>
</ul>
<h3 id="soft-skills-identified-as-most-underrated-cybersecurity-asset-in-reddit-discussion"><a href="https://www.reddit.com/r/cybersecurity/comments/1m8aru1/what_are_some_of_the_most_underratedoverlooked/?ref=mandos.io">Soft Skills Identified As Most Underrated Cybersecurity Asset In Reddit Discussion</a></h3>
<ul>
<li>
<p>Learning to talk to people and demonstrating <strong>empathy</strong> were highlighted as critical skills in cybersecurity, with one commenter noting "People are not computers" and these soft skills being harder to learn than technical capabilities.</p>
</li>
<li>
<p>Multiple cybersecurity professionals shared experiences where <strong>communication</strong> abilities proved more valuable than technical expertise, including one person who secured a junior position primarily based on soft skills rather than technical knowledge.</p>
</li>
<li>
<p>Several commenters emphasized that effective <strong>stakeholder</strong> management is essential for implementing security measures, with one noting "you have to bring your whole org with you otherwise nothing will get done."</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-security-is-api-security-key-issues-affecting-enterprise-protection"><a href="https://drive.google.com/file/d/1JogNwwROQfx5lrrcTs19ymZGttar_9CM/view?usp=drivesdk&ref=mandos.io">AI Security Is API Security: Key Issues Affecting Enterprise Protection</a></h3>
<ul>
<li>
<p>97% of organizations report <strong>security</strong> incidents related to generative AI, with approximately 90% of AI usage classified as "shadow AI" operating outside IT oversight.</p>
</li>
<li>
<p>API <strong>vulnerabilities</strong> remain the primary attack vector for AI systems, with authorization flaws, authentication weaknesses, and parameter manipulation being the most common exploit paths.</p>
</li>
<li>
<p>Effective AI security requires comprehensive <strong>discovery</strong> of all AI assets (including third-party integrations) and adoption of emerging frameworks like OWASP LLM Top 10 and ISO 42001.</p>
</li>
</ul>
<h3 id="2025-state-of-ai-report-highlights-key-trends-in-ai-product-development-and-security"><a href="https://drive.google.com/file/d/1WdrqGMdWAsoESuwrAERroU5SBeZMwj_k/view?usp=drivesdk&ref=mandos.io">2025 State of AI Report Highlights Key Trends in AI Product Development and Security</a></h3>
<ul>
<li>
<p>The report reveals that <strong>hallucinations</strong> and explainability/trust are the top challenges when deploying AI models, with 39% and 38% of respondents citing these issues respectively, followed by proving ROI (34%).</p>
</li>
<li>
<p>AI-native companies are progressing faster through development cycles than AI-enabled peers, with 47% of AI-native products already at <strong>scaling</strong> stage compared to just 13% of AI-enabled products.</p>
</li>
<li>
<p>While 80% of companies rely on third-party AI APIs, high-growth organizations are increasingly developing <strong>proprietary</strong> models and implementing advanced security monitoring – 75% of scaled AI products now feature advanced performance monitoring with drift detection.</p>
</li>
</ul>
<h3 id="ai-agent-developer-identifies-three-critical-flaws-in-current-agent-technology"><a href="https://utkarshkanwat.com/writing/betting-against-agents/?ref=mandos.io">AI Agent Developer Identifies Three Critical Flaws in Current Agent Technology</a></h3>
<ul>
<li>
<p>Despite building multiple successful production AI agent systems, the author highlights three fundamental limitations: <strong>error</strong> rates compound exponentially in multi-step workflows (95% reliability per step = 36% success over 20 steps), making autonomous complex workflows mathematically impossible at scale.</p>
</li>
<li>
<p>Token <strong>economics</strong> create a significant barrier as context windows cause quadratic cost scaling – successful production agents are typically stateless, focused tools rather than the conversational agents being promoted.</p>
</li>
<li>
<p>The challenge isn't in AI capabilities but in <strong>tool</strong> engineering – approximately 70% of effective agent systems require carefully designed feedback interfaces, context management, and handling partial failures in ways AI can understand.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-startup-maro-secures-43m-seed-funding-to-address-human-risk"><a href="https://fintech.global/2025/07/25/maro-raises-4-3m-to-tackle-human-risk-in-cybersecurity/?ref=mandos.io">Cybersecurity Startup Maro Secures $4.3M Seed Funding to Address Human Risk</a></h3>
<ul>
<li>
<p>Maro's platform provides real-time <strong>behavioral</strong> interventions to address threats linked to human error, insider risk, and misuse of <strong>AI</strong> tools.</p>
</li>
<li>
<p>Founded by cybersecurity veterans from multiple successful startups, Maro developed its solution with input from security leaders in <strong>FinTech</strong>, healthcare, and retail industries.</p>
</li>
<li>
<p>The funding from Downing Capital Group will support team expansion, product development, and go-to-market efforts as Maro addresses challenges created by generative AI, remote work, and shadow <strong>SaaS</strong>.</p>
</li>
</ul>
<h3 id="22-cybersecurity-startups-to-watch-according-to-vcs"><a href="https://bebeez.eu/2025/07/25/22-cybersecurity-startups-to-watch-according-to-vcs/?ref=mandos.io">22 Cybersecurity Startups To Watch, According To VCs</a></h3>
<ul>
<li>
<p>VCs have identified 22 promising cybersecurity startups addressing challenges from <strong>vulnerabilities</strong> in software code to identity-based attacks, as cyber crime costs are projected to reach $10.5tn worldwide in 2025.</p>
</li>
<li>
<p>Several standout companies focus on <strong>AI</strong>-powered solutions, including Galink (third-party risk), HelmGuard (security data aggregation), Lakera (protecting against prompt injection), and Harmonic Security (safeguarding sensitive data in generative AI).</p>
</li>
<li>
<p>Key <strong>trends</strong> represented by these startups include identity protection, software supply chain security, and privacy-preserving data collaboration – with specialized solutions for industrial infrastructure and cloud environments.</p>
</li>
</ul>
<h3 id="grc-firm-vanta-raises-150-million-at-415-billion-valuation"><a href="https://www.securityweek.com/grc-firm-vanta-raises-150-million-at-4-15-billion-valuation/?ref=mandos.io">GRC Firm Vanta Raises $150 Million at $4.15 Billion Valuation</a></h3>
<ul>
<li>
<p>California-based Vanta has secured $150 million in Series D funding led by Wellington Management, bringing their total raised since 2021 to $504 million and increasing their <strong>valuation</strong> to $4.15 billion.</p>
</li>
<li>
<p>Vanta's trust platform simplifies and centralizes <strong>compliance</strong> for organizations by integrating with hundreds of third-party tools for cloud infrastructure, version control, productivity, and identity services.</p>
</li>
<li>
<p>The company announced new <strong>AI</strong> agents to help with security questionnaires and workflow automation, and plans to expand into third-party <strong>risk</strong> and government compliance with the new funding.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="threatdown-edr"><a href="https://cybersectools.com/tools/threatdown-edr?ref=mandos.io">ThreatDown EDR</a></h3>
<p>Powerfully simple endpoint security solution that takes down threats without interrupting business.</p>
<h3 id="ocaml-yara"><a href="https://cybersectools.com/tools/ocaml-yara?ref=mandos.io">ocaml-yara</a></h3>
<p>OCaml wrapper for YARA matching engine for malware identification</p>
<h3 id="cloudmatos"><a href="https://cybersectools.com/tools/cloudmatos?ref=mandos.io">CloudMatos</a></h3>
<p>An AI-powered Cloud Native Application Protection Platform (CNAPP) that provides unified cloud security with attack surface management for small and medium businesses.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #113: NVIDIA AI Containers Escaped, GitHub Malware Distribution, CISOs Are Giving Up ]]></title>
        <description><![CDATA[ Critical NVIDIA vulnerability enables container escape with 3-line Dockerfile. Amazon launches enterprise AI agent platform. Scattered Spider causes $592M damage across 11 attacks. ]]></description>
        <link>https://mandos.io/newsletter/brief-113-nvidia-ai-containers-escaped-github-malware-distribution-cisos-are-giving-up/</link>
        <guid isPermaLink="false">687b918332ecd5000160dd8b</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 20 Jul 2025 17:00:38 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/07/29.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>This week's State of AI report really caught my attention. The fact that 97% of organizations are experiencing security incidents related to generative AI tells us we're still in the early stages of figuring this out. What's particularly striking is that 90% of AI usage is happening in the shadows, outside IT oversight. It's giving me flashbacks to the early days of cloud adoption.</p><p>In this week's brief:</p><ul><li>A critical NVIDIA Container Toolkit vulnerability that lets attackers escape containers with just three lines of code</li><li>Why CISOs are burning out at record rates and how the "Don't Fire Me" chart explains the turnover pattern</li><li>How hackers are hiding malware inside DNS records to bypass traditional security controls</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">❔</div><div class="kg-callout-text">Given that 90% of AI usage in your organization is likely happening without IT oversight, how are you planning to get visibility into shadow AI without killing innovation?</div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="hackers-hide-malware-inside-dns-records-to-bypass-security-controls"><a href="https://arstechnica.com/security/2025/07/hackers-exploit-a-blind-spot-by-hiding-malware-inside-dns-records/?ref=mandos.io">Hackers Hide Malware Inside DNS Records To Bypass Security Controls</a></h3>
<ul>
<li>
<p>Threat actors are embedding malicious code within DNS TXT records, converting <strong>binaries</strong> into hexadecimal format and splitting them across multiple subdomains, effectively bypassing traditional security monitoring systems.</p>
</li>
<li>
<p>This technique exploits a security blind spot as DNS traffic is often less scrutinized than web or email traffic, with the challenge amplified by encrypted DNS protocols like <strong>DOH</strong> (DNS over HTTPS) and DOT (DNS over TLS).</p>
</li>
<li>
<p>DomainTools researchers discovered this method being used to distribute Joke Screenmate malware and also found DNS records containing text designed for <strong>prompt-injection</strong> attacks against AI chatbots.</p>
</li>
</ul>
<h3 id="critical-container-escape-vulnerability-found-in-nvidia-container-toolkit"><a href="https://www.wiz.io/blog/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape?ref=mandos.io">Critical Container Escape Vulnerability Found in NVIDIA Container Toolkit</a></h3>
<ul>
<li>
<p>Wiz Research discovered a <strong>critical</strong> vulnerability (CVE-2025-23266) in NVIDIA Container Toolkit with a CVSS score of 9.0, allowing attackers to escape container isolation with just a three-line Dockerfile and gain full <strong>root</strong> access to host machines.</p>
</li>
<li>
<p>The vulnerability affects all NVIDIA Container Toolkit versions up to v1.17.7 and GPU Operator versions up to 25.3.1, posing significant risks to <strong>AI</strong> cloud services where multiple customers share GPU infrastructure.</p>
</li>
<li>
<p>Organizations should immediately upgrade to the latest version or implement NVIDIA's provided mitigations, as this vulnerability does not require internet exposure but can be exploited through container images from untrusted sources.</p>
</li>
</ul>
<h3 id="malware-as-a-service-operation-exploits-github-to-distribute-payloads"><a href="https://arstechnica.com/security/2025/07/malware-as-a-service-caught-using-github-to-distribute-its-payloads/?ref=mandos.io">Malware-as-a-Service Operation Exploits GitHub To Distribute Payloads</a></h3>
<ul>
<li>
<p>Cisco Talos researchers discovered a <strong>MaaS</strong> operation using public GitHub accounts to distribute malicious software, providing attackers with a reliable platform that's typically whitelisted in enterprise networks with software development teams.</p>
</li>
<li>
<p>The campaign, active since February 2025, deployed the Emmenhtal (PeakLight) <strong>loader</strong> to deliver Amadey malware, which collects system information and downloads customized secondary payloads based on infected device characteristics.</p>
</li>
<li>
<p>GitHub removed the three malicious accounts after notification, but the <strong>campaign</strong> demonstrates how threat actors can bypass web filtering in environments where GitHub access is required for legitimate development purposes.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="2025-state-of-ai-report-highlights-key-trends-in-ai-product-development-and-security"><a href="https://drive.google.com/file/d/1WdrqGMdWAsoESuwrAERroU5SBeZMwj_k/view?usp=drivesdk&ref=mandos.io">2025 State of AI Report Highlights Key Trends in AI Product Development and Security</a></h3>
<ul>
<li>
<p>The report reveals that <strong>hallucinations</strong> and explainability/trust are the top challenges when deploying AI models, with 39% and 38% of respondents citing these issues respectively, followed by proving ROI (34%).</p>
</li>
<li>
<p>AI-native companies are progressing faster through development cycles than AI-enabled peers, with 47% of AI-native products already at <strong>scaling</strong> stage compared to just 13% of AI-enabled products.</p>
</li>
<li>
<p>While 80% of companies rely on third-party AI APIs, high-growth organizations are increasingly developing <strong>proprietary</strong> models and implementing advanced security monitoring – 75% of scaled AI products now feature advanced performance monitoring with drift detection.</p>
</li>
</ul>
<h3 id="cybercube-analysis-identifies-2-of-large-firms-at-highest-scattered-spider-ransomware-risk">CyberCube Analysis Identifies 2% of Large Firms at Highest Scattered Spider <strong>Ransomware</strong> Risk</h3>
<p>(<a href="https://insights.cybcube.com/en/firms-highest-scattered-spider-risk?ref=cybersecstats.com">https://insights.cybcube.com/en/firms-highest-scattered-spider-risk?ref=cybersecstats.com</a>)</p>
<ul>
<li>
<p>Scattered Spider has resurfaced with renewed intensity, conducting 11 major <strong>attacks</strong> between April-July 2025 across retail, insurance, and airline industries, causing significant financial damage (up to $592 million to UK retailers alone).</p>
</li>
<li>
<p>The threat actor exhibits a pattern of targeting multiple companies within one sector before moving to another, utilizing sophisticated social-engineering tactics to bypass <strong>authentication</strong> systems and infiltrate high-value corporate networks.</p>
</li>
<li>
<p>CyberCube's Portfolio Threat Actor Intelligence (PTI) solution has identified Manufacturing, Education, IT, and Retail sectors as having the highest concentrations of potential <strong>targets</strong> for Scattered Spider attacks.</p>
</li>
</ul>
<h3 id="ai-security-is-api-security-key-issues-affecting-enterprise-protection"><a href="https://drive.google.com/file/d/1JogNwwROQfx5lrrcTs19ymZGttar_9CM/view?usp=drivesdk&ref=mandos.io">AI Security Is API Security: Key Issues Affecting Enterprise Protection</a></h3>
<ul>
<li>
<p>97% of organizations report <strong>security</strong> incidents related to generative AI, with approximately 90% of AI usage classified as "shadow AI" operating outside IT oversight.</p>
</li>
<li>
<p>API <strong>vulnerabilities</strong> remain the primary attack vector for AI systems, with authorization flaws, authentication weaknesses, and parameter manipulation being the most common exploit paths.</p>
</li>
<li>
<p>Effective AI security requires comprehensive <strong>discovery</strong> of all AI assets (including third-party integrations) and adoption of emerging frameworks like OWASP LLM Top 10 and ISO 42001.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="the-dont-fire-me-chart-explains-ciso-turnover-pattern"><a href="https://www.philvenables.com/post/career-longevity-the-don-t-fire-me-chart-1?ref=mandos.io">The "Don't Fire Me" Chart Explains CISO Turnover Pattern</a></h3>
<ul>
<li>
<p>Security <strong>improvement</strong> cycles often appear worse before getting better - as CISOs implement better monitoring and risk assessment tools, they uncover previously hidden issues, creating a false impression of deteriorating security posture.</p>
</li>
<li>
<p>High CISO <strong>turnover</strong> occurs when leadership misinterprets the discovery of additional security issues as program failure rather than recognizing it as a necessary phase in the improvement cycle.</p>
</li>
<li>
<p>Long-term <strong>leadership</strong> commitment is essential - organizations that support security leaders through the entire improvement cycle ultimately achieve sustainable risk reduction, unlike those that repeatedly restart the process with new hires.</p>
</li>
</ul>
<h3 id="cisos-face-increasing-burnout-and-personal-liability-as-regulatory-demands-grow"><a href="https://www.csoonline.com/article/4016334/has-ciso-become-the-least-desirable-role-in-business.html?ref=mandos.io">CISOs Face Increasing Burnout And Personal Liability As Regulatory Demands Grow</a></h3>
<ul>
<li>
<p>CISOs are experiencing unprecedented levels of <strong>burnout</strong> with 91% reporting moderate to high stress, as they face increased responsibilities without proportional authority, creating what one expert calls an "unsustainable" imbalance.</p>
</li>
<li>
<p>Many security leaders are structurally <strong>underpowered</strong> within organizations, often reporting to CTOs or CFOs rather than having direct board access, while simultaneously facing growing personal accountability and legal <strong>liability</strong> for security incidents.</p>
</li>
<li>
<p>A new Professional Association of CISOs (PAC) is forming to establish standardized accreditation, advocate for legal protections, and create support networks to help address the growing challenges of the role.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-share-day-to-day-responsibilities-on-reddit-thread"><a href="https://www.reddit.com/r/cybersecurity/comments/1ly7gkp/what_is_your_current_position_and_what_do_you_do/?ref=mandos.io">Cybersecurity Professionals Share Day-To-Day Responsibilities On Reddit Thread</a></h3>
<ul>
<li>
<p>SOC Analysts describe their daily routines of triaging <strong>alerts</strong>, investigating potential threats, and using various security tools to determine if incidents require escalation.</p>
</li>
<li>
<p>Information Security professionals highlight responsibilities including <strong>vulnerability</strong> management, CIS hardening, phishing email analysis, and serving as escalation points for MSSP alerts.</p>
</li>
<li>
<p>Senior roles such as executives and department heads report spending significant time in <strong>meetings</strong>, managing organizational <strong>governance</strong>, and handling administrative tasks like budgeting and vendor management.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="amazon-launches-bedrock-agentcore-for-enterprise-grade-ai-agent-deployment"><a href="https://aws.amazon.com/blogs/aws/introducing-amazon-bedrock-agentcore-securely-deploy-and-operate-ai-agents-at-any-scale/?ref=mandos.io">Amazon Launches Bedrock AgentCore for Enterprise-Grade AI Agent Deployment</a></h3>
<ul>
<li>
<p>AWS has introduced Amazon Bedrock AgentCore in preview, a comprehensive suite of services that helps developers <strong>securely</strong> deploy and operate AI agents at scale using any framework and model, eliminating the need to build foundational infrastructure.</p>
</li>
<li>
<p>The suite includes seven key components: AgentCore Runtime (for isolated serverless environments), Memory (for context management), Observability (for visualization and debugging), Identity (for secure access to services), Gateway (for API transformation), Browser (for web automation), and Code <strong>Interpreter</strong> (for running generated code).</p>
</li>
<li>
<p>AgentCore works with open source or custom AI agent <strong>frameworks</strong>, supports AWS Marketplace integration, and is available in preview in four regions with free usage until September 2025 when <strong>pricing</strong> will begin.</p>
</li>
</ul>
<h3 id="researchers-call-for-expanded-ai-red-teaming-beyond-model-level-testing"><a href="https://drive.google.com/file/d/1XO8l8miwLzdVeZFXNN0MzojC-I9WWGTi/view?usp=share_link&ref=mandos.io">Researchers Call For Expanded AI Red Teaming Beyond Model-Level Testing</a></h3>
<ul>
<li>
<p>Current AI red teaming practices focus too narrowly on finding individual model <strong>vulnerabilities</strong>, overlooking broader sociotechnical systems and <strong>emergent</strong> behaviors that arise from interactions between models, users, and environments.</p>
</li>
<li>
<p>Authors propose a comprehensive framework with both macro-level (system) red teaming spanning the entire AI development lifecycle and micro-level (model) red teaming, drawing on <strong>cybersecurity</strong> experience and systems theory.</p>
</li>
<li>
<p>Effective AI red teaming requires multifunctional teams examining risks across seven lifecycle stages: inception, design, data, development, deployment, maintenance, and retirement.</p>
</li>
</ul>
<h3 id="cloud-security-alliance-introduces-first-vendor-agnostic-ai-controls-matrix"><a href="https://drive.google.com/file/d/1BU1b7HZH_zdN1G-gYEWo009UWtRteExv/view?usp=share_link&ref=mandos.io">Cloud Security Alliance Introduces First Vendor-Agnostic AI Controls Matrix</a></h3>
<ul>
<li>
<p>The AI Controls Matrix (AICM) is designed to help organizations develop and implement AI technologies securely, featuring 243 control objectives across 18 security <strong>domains</strong> and built on the foundation of the Cloud Control Matrix.</p>
</li>
<li>
<p>Set for release on July 10, 2025, the AICM bundle includes a control matrix, assessment questionnaire, and <strong>mappings</strong> to major standards including BSI AIC4, NIST AI 600-1, with ISO 42001 and EU AI Act mappings coming soon.</p>
</li>
<li>
<p>The framework takes an open, expert-driven, consensus-based approach to help organizations assess AI-specific <strong>risks</strong>, build trustworthy AI systems, and align with international <strong>standards</strong> in a measurable way.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="zero-networks-secures-usd-20-million-series-b-funding-for-network-segmentation-solution"><a href="https://thepaypers.com/fraud-and-fincrime/news/zero-networks-secures-usd-20-mln-series-b-funding-for-cybersecurity?ref=mandos.io">Zero Networks Secures USD 20 Million Series B Funding For Network Segmentation Solution</a></h3>
<ul>
<li>
<p>Zero Networks has raised $20M in Series B funding led by US Venture Partners (USVP), following a five-fold <strong>revenue</strong> increase, bringing total funding to $45M for their <strong>lateral</strong> movement prevention solution.</p>
</li>
<li>
<p>The company's SaaS platform automatically creates granular security policies that restrict user and machine access, requiring multi-factor authentication for accessing sensitive <strong>protocols</strong> commonly exploited by attackers.</p>
</li>
<li>
<p>Founded in 2019, Zero Networks serves diverse customers including global banks, US retailers, manufacturing corporations, and <strong>healthcare</strong> organizations across the US, Europe, and the Middle East.</p>
</li>
</ul>
<h3 id="empirical-security-raises-12m-seed-round-for-ai-powered-enterprise-cybersecurity"><a href="https://fintech.global/2025/07/18/cybersecurity-ai-firm-empirical-security-lands-12m-seed-round/?ref=mandos.io">Empirical Security Raises $12M Seed Round for AI-Powered Enterprise Cybersecurity</a></h3>
<ul>
<li>
<p>Empirical Security's platform uses a dual-model <strong>AI</strong> architecture that builds both global and local cybersecurity models tailored to each enterprise's specific <strong>infrastructure</strong> and risk profile.</p>
</li>
<li>
<p>The funding round was led by Costanoa Ventures with participation from DNX Ventures, Sixty Degree Capital, HPA, and strategic investors including former security leaders from Google and Qualys.</p>
</li>
<li>
<p>Founded by the team behind Kenna Security, Empirical aims to transform <strong>prioritization</strong> by analyzing millions of daily exploitation events and adapting that intelligence to each client's unique threat environment.</p>
</li>
</ul>
<h3 id="cybersecurity-funding-reaches-three-year-high-in-first-half-of-2025"><a href="https://news.crunchbase.com/cybersecurity/privacy-venture-funding-surged-q2-2025-ai-cyera-data/?ref=mandos.io">Cybersecurity Funding Reaches Three-Year High in First Half of 2025</a></h3>
<ul>
<li>
<p>Investors poured $9.4 billion into <strong>cybersecurity</strong> and privacy startups in H1 2025, with Q2 funding surging to $4.9 billion, marking the highest level in three years.</p>
</li>
<li>
<p><strong>AI</strong>-powered security platforms dominated large funding rounds, with Cyera securing the largest Q2 investment of $540 million at a $6 billion valuation, while 11 companies received rounds of $100 million or more.</p>
</li>
<li>
<p>Despite strong investment activity, <strong>exits</strong> remained muted in Q2 with no cybersecurity IPOs and only a few notable acquisitions of well-funded startups like Red Canary, TrueWork, and Protect AI.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="bitlyft-air-platform"><a href="https://cybersectools.com/tools/bitlyft-air-platform?ref=mandos.io">BitLyft AIR Platform</a></h3>
<p>BitLyft AIR Platform is a managed detection and response solution that combines AI-driven security monitoring with human expertise to provide comprehensive threat detection and incident response services.</p>
<h3 id="cloudflare-access"><a href="https://cybersectools.com/tools/cloudflare-access?ref=mandos.io">Cloudflare Access</a></h3>
<p>Cloudflare Access is a zero trust network access solution that secures applications and resources by implementing identity-based authentication and authorization without traditional VPN infrastructure.</p>
<h3 id="netenrich-resolution-intelligence"><a href="https://cybersectools.com/tools/netenrich-resolution-intelligence?ref=mandos.io">Netenrich Resolution Intelligence</a></h3>
<p>A security analytics platform that integrates with Google Chronicle to deliver Autonomic Security Operations through data engineering, detection engineering, and response engineering.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #112: McDonald&#x27;s 64M Data Breach, LLM Agent Attacks, AI Threatens Junior Roles ]]></title>
        <description><![CDATA[ Major breaches hit McDonald&#39;s hiring platform and Louis Vuitton UK. Researchers discover systematic LLM agent vulnerabilities. ]]></description>
        <link>https://mandos.io/newsletter/brief-112-mcdonalds-64m-data-breach-llm-agent-attacks-ai-threatens-junior-roles/</link>
        <guid isPermaLink="false">68727a6f86d4210001a3d410</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 13 Jul 2025 17:00:06 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/07/28.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I've been thinking a lot about how we measure success in cybersecurity, especially after seeing this week's research showing that customers now value security and trustworthiness over product quality and value. It's a fundamental shift that validates what we've been saying for years - security isn't just a cost center, it's a competitive advantage.</p><p>In this week's brief:</p><ul><li>McDonald's hiring platform exposed 64 million job applications using default credentials "123456" - a reminder that basic security hygiene still matters more than sophisticated threats</li><li>AI automation is eliminating entry-level cybersecurity roles, creating a skills gap problem we need to address now</li><li>New research confirms customers prioritize security and trust over product features when choosing services</li></ul><p>The stories this week really highlight the tension between advancing technology and fundamental security practices. We're seeing AI create new attack vectors while simultaneously threatening the pipeline of junior talent we need to defend against them.</p><p>What's your take - are we moving too fast with AI adoption without properly securing the foundations, or is this just the natural evolution of our field?</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="slowtempest-malware-uses-advanced-obfuscation-techniques-to-evade-detection"><a href="https://unit42.paloaltonetworks.com/slow-tempest-malware-obfuscation/?ref=mandos.io">SLOW#TEMPEST Malware Uses Advanced Obfuscation Techniques to Evade Detection</a></h3>
<ul>
<li>
<p>Unit 42 researchers discovered a SLOW#TEMPEST campaign variant using sophisticated <strong>obfuscation</strong> techniques including control flow graph manipulation and dynamic jumps to complicate analysis and evade detection.</p>
</li>
<li>
<p>The malware is distributed via ISO files and employs <strong>DLL sideloading</strong> through legitimate applications, with the payload strategically separated across multiple files requiring both to be present for execution.</p>
</li>
<li>
<p>An <strong>anti-sandbox</strong> check prevents execution on systems with less than 6 GB of RAM, allowing the malware to bypass automated analysis environments while targeting actual production systems.</p>
</li>
</ul>
<h3 id="mcdonalds-hiring-platform-exposed-64-million-job-applications-through-idor-vulnerability"><a href="https://ian.sh/mcdonalds?ref=mandos.io">McDonald's Hiring Platform Exposed 64 Million Job Applications Through IDOR Vulnerability</a></h3>
<ul>
<li>
<p>Security researchers discovered McHire (used by 90% of McDonald's franchisees) allowed access with default <strong>credentials</strong> "123456:123456" and contained an <strong>IDOR</strong> vulnerability in the candidate information API, potentially exposing personal data of over 64 million job applicants.</p>
</li>
<li>
<p>The vulnerability leaked applicants' personally identifiable information including names, email addresses, phone numbers, addresses, work preferences, and even authentication tokens that could allow unauthorized access to their chat messages.</p>
</li>
<li>
<p>After disclosure on June 30th, 2025, Paradox.ai (the platform developer) quickly remediated the issues within 24 hours, with credentials disabled within 2 hours and full confirmation of resolution the following day.</p>
</li>
</ul>
<h3 id="louis-vuitton-uk-customer-data-compromised-in-cyber-attack"><a href="https://www.theguardian.com/technology/2025/jul/11/louis-vuitton-uk-customer-data-stolen-cyber-attack?ref=mandos.io">Louis Vuitton UK Customer Data Compromised in Cyber-Attack</a></h3>
<ul>
<li>
<p>Unauthorized third parties accessed Louis Vuitton's UK systems on July 2, stealing customer data including names, contact details, and <strong>purchase</strong> history, though financial data like bank details was not compromised.</p>
</li>
<li>
<p>This is the third <strong>breach</strong> affecting LVMH brands in three months – Louis Vuitton's Korean operation experienced a similar attack last week, and Christian Dior Couture reported customer data access in May.</p>
</li>
<li>
<p>The company has notified relevant authorities including the Information Commissioner's Office and warned customers about potential <strong>phishing</strong> attempts or <strong>fraud</strong> using the stolen information.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="customer-identity-trends-report-2025-security-and-trust-trump-quality-and-value"><a href="https://drive.google.com/file/d/1y3Wy8587rdL5UoM66BnOQzGV5BFJnKHX/view?usp=drivesdk&ref=mandos.io">Customer Identity Trends Report 2025: Security and Trust Trump Quality and Value</a></h3>
<ul>
<li>
<p>When deciding to create an account with a service provider, 74% of users consider company <strong>trustworthiness</strong> and 72% consider <strong>security</strong> measures as important factors—outranking the quality and value of products or services.</p>
</li>
<li>
<p><strong>Fraud</strong> is top of mind for customers with 64% expressing concern about identity fraud, while signup friction is costly—23% of users report always or often abandoning purchases due to signup/login issues, with younger generations and tech enthusiasts being least tolerant.</p>
</li>
<li>
<p>The threat landscape is severe—46.1% of registration attempts and 16.9% of login attempts exhibit malicious behavior, with retail/ecommerce experiencing 22.2% malicious login activity and <strong>brute-force</strong> attacks exceeding legitimate signups by 120 times.</p>
</li>
</ul>
<h3 id="dragonforce-attacks-rival-ransomware-groups-including-ransomhub"><a href="https://drive.google.com/file/d/1yuUjnKd0A0XkfUz1xpK4CDt_BYSIV94c/view?usp=drivesdk&ref=mandos.io">DragonForce Attacks Rival Ransomware Groups, Including RansomHub</a></h3>
<ul>
<li>
<p>DragonForce, a minor <strong>ransomware</strong> operator, launched a defacement campaign targeting several competitors in March 2025, taking down the dark web sites of BlackLock, Mamona, and RansomHub - previously the top ransomware-as-a-service provider.</p>
</li>
<li>
<p>Despite an overall 15% increase in ransomware attacks and a 43% growth in the number of active gangs in 2024, total ransom <strong>payments</strong> dropped by 35% according to Chainalysis, suggesting diminished victim confidence in the reliability of these criminal groups.</p>
</li>
<li>
<p>RansomHub remained inactive after the DragonForce attack, which included false claims that RansomHub had voluntarily joined DragonForce's cartel, leading to a heated public exchange on the <strong>RAMP</strong> forum.</p>
</li>
</ul>
<h3 id="2025-identity-theft-resource-center-report-shows-shifting-trends-in-identity-crimes"><a href="https://drive.google.com/file/d/1VYQnN5kjxCBwwI295LL_R_YzoKC4qhbu/view?usp=drivesdk&ref=mandos.io">2025 Identity Theft Resource Center Report Shows Shifting Trends in Identity Crimes</a></h3>
<ul>
<li>
<p>The ITRC report reveals a significant shift in identity crime patterns: fewer victims are reporting <strong>compromise</strong> of personal information (35%) than actual <strong>misuse</strong> (52%), reversing previous trends where more victims reported information exposure than actual fraud.</p>
</li>
<li>
<p>Three key trends identified: <strong>AI</strong> technology is making it easier for criminals to coerce victims into revealing credentials, identity thieves are increasingly accessing various existing accounts through sophisticated techniques, and individuals are becoming more proactive about protecting their identities.</p>
</li>
<li>
<p>Most common attack vectors include impersonation scams (34% of reported scams), account takeover (53% of misuse cases), and new account fraud (36% of misuse cases), with financial accounts like credit cards and checking accounts being primary targets.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="reddit-thread-prompts-cybersecurity-professionals-to-share-career-defining-moments"><a href="https://www.reddit.com/r/cybersecurity/s/a7QWG4YE03?ref=mandos.io">Reddit Thread Prompts Cybersecurity Professionals to Share Career-Defining Moments</a></h3>
<ul>
<li>
<p>The r/cybersecurity <strong>community</strong> thread asks professionals to share their "EUREKA moments" – those pivotal realizations or experiences that shaped their understanding of the field.</p>
</li>
<li>
<p>With 1.2 million members, this discussion falls under the "Career Questions &amp; Discussion" category, highlighting the importance of knowledge sharing and <strong>mentorship</strong> in cybersecurity professional development.</p>
</li>
<li>
<p>The thread presents an opportunity for cybersecurity experts to reflect on transformative <strong>learning</strong> experiences that could benefit newcomers navigating their <strong>career</strong> paths in the industry.</p>
</li>
</ul>
<h3 id="reddit-cybersecurity-community-discusses-most-valuable-professional-tools"><a href="https://www.reddit.com/r/cybersecurity/s/9n0fyRxSLA?ref=mandos.io">Reddit Cybersecurity Community Discusses Most Valuable Professional Tools</a></h3>
<ul>
<li>
<p>A Reddit user in r/cybersecurity initiated a <strong>discussion</strong> thread asking professionals about the most helpful tools they use in their current positions, reaching the community of 1.2M members.</p>
</li>
<li>
<p>The post was tagged under "Business Security Questions &amp; Discussion," indicating its focus on <strong>professional</strong> applications rather than academic or theoretical cybersecurity topics.</p>
</li>
<li>
<p>This thread represents an opportunity for security practitioners to share <strong>tool</strong> recommendations and best practices across different job roles and specializations within the cybersecurity field.</p>
</li>
</ul>
<h3 id="ai-automation-threatens-entry-level-cybersecurity-roles"><a href="https://www.healthcareinfosecurity.com/will-ai-gut-cybersecurity-talent-pipeline-a-28906?ref=mandos.io">AI Automation Threatens Entry-Level Cybersecurity Roles</a></h3>
<ul>
<li>
<p>As AI increasingly automates low-level detection and triage tasks, junior <strong>analysts</strong> are losing critical hands-on experience needed to develop core competencies for advanced positions.</p>
</li>
<li>
<p>Industry experts recommend <strong>simulation</strong>-based training programs and apprenticeships as stopgaps to provide early-career professionals with necessary experience that automation has eliminated.</p>
</li>
<li>
<p>Cybersecurity remains a "deeply sociotechnical problem" requiring human creativity and <strong>judgment</strong>, with the best security teams using AI "as an amplifier, not a replacement" for human expertise.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="researchers-introduce-security-steerability-as-new-measure-for-llm-security"><a href="https://drive.google.com/file/d/1WXH2ToLL7nq-4kkz07-UZlZu9CBfpqeE/view?usp=drivesdk&ref=mandos.io">Researchers Introduce "Security Steerability" as New Measure for LLM Security</a></h3>
<ul>
<li>
<p>Intuit AI security researchers developed "Security Steerability" - a novel <strong>metric</strong> that measures an LLM's ability to adhere to application-specific guardrails defined in system prompts, even when users attempt to circumvent them through <strong>jailbreaks</strong> or text perturbations.</p>
</li>
<li>
<p>Their research revealed minimal correlation between conventional LLM security measures (resistance to generating prohibited content) and security steerability, indicating current security evaluation approaches fail to address application-level threats.</p>
</li>
<li>
<p>Two new evaluation datasets were introduced - VeganRibs and ReverseText - to test 14 open-source LLMs, with findings showing that models with high scores in universal security often performed poorly in enforcing application-specific boundaries.</p>
</li>
</ul>
<h3 id="researchers-identify-over-30-attack-techniques-against-llm-powered-ai-agent-workflows"><a href="https://arxiv.org/abs/2506.23260?ref=mandos.io">Researchers Identify Over 30 Attack Techniques Against LLM-Powered AI Agent Workflows</a></h3>
<ul>
<li>
<p>The paper introduces the first unified threat model for LLM-agent ecosystems, categorizing attacks into four domains: Input <strong>Manipulation</strong>, Model <strong>Compromise</strong>, System and Privacy Attacks, and Protocol <strong>Vulnerabilities</strong>.</p>
</li>
<li>
<p>Researchers document alarming success rates across attack types - adaptive prompt injections bypass defenses in over 50% of cases, composite backdoor attacks achieve 100% success rates, and protocol-level exploits can leak private repository data through seemingly benign GitHub issues.</p>
</li>
<li>
<p>The study identifies key open challenges including securing Model Context Protocol (MCP) deployments, designing hardened Agentic Web Interfaces, and achieving <strong>resilience</strong> in multi-agent and federated environments.</p>
</li>
</ul>
<h3 id="llms-generate-vulnerable-code-but-self-correction-mechanisms-show-promise"><a href="https://drive.google.com/file/d/1RjiKZ7U9nyNoEIR6pa3xnCe6HS7WycIz/view?usp=share_link&ref=mandos.io">LLMs Generate Vulnerable Code But Self-Correction Mechanisms Show Promise</a></h3>
<ul>
<li>
<p>All tested LLMs frequently generate <strong>vulnerable</strong> code, with vulnerability rates ranging from 9.8% to 42.1% across different models and datasets, sharing similar distributions of top vulnerability types despite differences in model architectures.</p>
</li>
<li>
<p>Self-generated vulnerability hints can effectively reduce vulnerabilities (by up to 13.9% in some cases), but this depends on hints being relevant, precise, and <strong>contextualized</strong> to the specific coding scenario – otherwise, they may actually increase vulnerability rates.</p>
</li>
<li>
<p>Post-hoc vulnerability repair using <strong>feedback</strong> from static analysis tools works well for advanced models like GPT-4o and DeepSeek-Coder-V2, with explained feedback providing 7-28% greater reduction in vulnerabilities compared to direct feedback alone.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cyberstarts-launches-300m-liquidity-fund-to-help-startups-retain-top-talent"><a href="https://www.securityweek.com/cyberstarts-launches-300m-liquidity-fund-to-help-startups-retain-top-talent/?ref=mandos.io">Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent</a></h3>
<ul>
<li>
<p>Early-stage cybersecurity <strong>venture</strong> firm Cyberstarts announced a $300 million Employee Liquidity Fund that allows startup employees to sell vested shares without leaving their companies.</p>
</li>
<li>
<p>The fund addresses the challenge of extended <strong>IPO</strong> timelines by providing a path to liquidity that helps align incentives and sustain long-term employee commitment at portfolio companies like Wiz, Fireblocks, Island, and Cyera.</p>
</li>
<li>
<p>This initiative brings Cyberstarts' total capital commitments to over $1 <strong>billion</strong> across six funds, with implementation handled by each company's HR team based on their specific talent needs.</p>
</li>
</ul>
<h3 id="airmdr-secures-155-million-funding-for-ai-powered-mdr-solution"><a href="https://www.securityweek.com/airmdr-raises-15-5-million-for-mdr-solution/?ref=mandos.io">AirMDR Secures $15.5 Million Funding for AI-Powered MDR Solution</a></h3>
<ul>
<li>
<p>AirMDR, an AI-native <strong>MDR</strong> startup founded in 2023, has raised $15.5 million in combined seed and infusion funding led by Race Capital with support from Foundation Capital and Storm Ventures.</p>
</li>
<li>
<p>The company's solution features an AI analyst that autonomously triages security alerts in real-time, while human experts provide verification of findings, creating a hybrid <strong>defense</strong> model suitable for both enterprises and SMBs.</p>
</li>
<li>
<p>Funds will be used to accelerate <strong>R&amp;D</strong> efforts, enhance AI analyst capabilities, and scale the company's sales and marketing team as they pursue their mission of bringing "Fortune 500 quality SOC to every enterprise at an affordable price."</p>
</li>
</ul>
<h3 id="virtru-secures-50-million-series-d-funding-doubles-valuation-to-500-million"><a href="https://fortune.com/2025/07/11/exclusive-virtru-data-security-company-raises-50-million-series-d-as-valuation-hits-500-million/?ref=mandos.io">Virtru Secures $50 Million Series D Funding, Doubles Valuation To $500 Million</a></h3>
<ul>
<li>
<p>Data <strong>security</strong> company Virtru has raised $50 million in Series D funding led by Iconiq, with participation from Bessemer Venture Partners, Foundry, and The Chertoff Group, doubling its previous <strong>valuation</strong> to $500 million.</p>
</li>
<li>
<p>Founded in 2012 by brothers John and Will Ackerly, who previously worked in the Bush Administration and NSA respectively, Virtru leverages Trusted Data Format (TDF) to provide data protection for 6,700 customers including Equifax, Capital One, JPMorganChase, and the U.S. Department of <strong>Defense</strong>.</p>
</li>
<li>
<p>The company plans to expand its platform to become a data security leader in an AI-driven landscape, focusing on its mission of "securing all data everywhere" by tagging and managing data wherever it goes.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="insights-by-inquest"><a href="https://cybersectools.com/tools/insights-by-inquest?ref=mandos.io">InSights by Inquest</a></h3>
<p>InSights by InQuest is a threat intelligence platform that delivers curated feeds of IOCs and C2 information to help security teams detect and respond to emerging threats.</p>
<h3 id="ctichefcom-detection-feeds"><a href="https://cybersectools.com/tools/ctichefcom-detection-feeds?ref=mandos.io">CTIChef.com Detection Feeds</a></h3>
<p>A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.</p>
<h3 id="plextrac"><a href="https://cybersectools.com/tools/plextrac?ref=mandos.io">PlexTrac</a></h3>
<p>PlexTrac is a centralized platform for penetration test reporting and threat exposure management that helps security teams streamline assessment workflows, prioritize remediation, and track security posture improvements.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #111: 12-Year Sudo Vulnerability, Ahold Delhaize 2.2M Breach, Ransomware Recovery Costs Drop 44% ]]></title>
        <description><![CDATA[ Attackers increasingly weaponize legitimate tools in 84% of incidents. Ransomware recovery costs plummet to $1.53M. Financial sector faces strategic DDoS campaigns with 23% spike in app-layer attacks. ]]></description>
        <link>https://mandos.io/newsletter/brief-111-12-year-sudo-vulnerability-ahold-delhaize-2-2m-breach-ransomware-recovery-costs-drop-44/</link>
        <guid isPermaLink="false">6868d946015626000176076b</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 06 Jul 2025 17:15:24 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/07/27.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I've been thinking about how we keep talking about "insider threats" but completely miss the new players in our networks. With 84% of attacks now using legitimate system tools against us, it's clear attackers have figured out something we're still catching up to - they don't need to break in when they can just blend in.</p><p>In this week's brief:</p><ul><li>A 12-year-old Sudo vulnerability that's been hiding in plain sight finally surfaces</li><li>AI agents are becoming the insider threats we never saw coming</li><li>Why executives bypassing security controls might be your biggest career lesson yet</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">❔</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">The gap between what we think we're protecting and what actually needs protection keeps widening. Are we securing the right things, or just the things we know how to secure?</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cve-2025-32462-sudo-host-option-privilege-escalation-vulnerability-found-after-12-years"><a href="https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host?ref=mandos.io">CVE-2025-32462: Sudo Host Option Privilege Escalation Vulnerability Found After 12 Years</a></h3>
<ul>
<li>
<p>Stratascale's Cyber Research Unit discovered a <strong>privilege</strong> escalation vulnerability in Sudo's host option that allows attackers to bypass hostname restrictions and gain <strong>root</strong> access by referencing unrelated remote host rules.</p>
</li>
<li>
<p>The vulnerability affects Sudo versions 1.8.8 to 1.9.17 and has been present since 2013, impacting enterprises using Host_Alias <strong>directives</strong> in their sudoers configurations.</p>
</li>
<li>
<p>Immediate remediation requires upgrading to Sudo 1.9.17p1 or later, as no workarounds exist for this <strong>vulnerability</strong> that has been verified on Ubuntu 24.04.1 and macOS Sequoia 15.3.2.</p>
</li>
</ul>
<h3 id="ahold-delhaize-hit-with-data-breach-affecting-22m-employees-inc-ransomware-claims-responsibility"><a href="https://hackread.com/ahold-delhaize-data-breach-amid-inc-ransomware-claims/?ref=mandos.io">Ahold Delhaize Hit With Data Breach Affecting 2.2M Employees, INC Ransomware Claims Responsibility</a></h3>
<ul>
<li>
<p>A data breach at Ahold Delhaize USA Services impacted over 2.2 million individuals with stolen data including <strong>SSNs</strong>, driver's license numbers, financial accounts, and health information from current and former employees.</p>
</li>
<li>
<p>The unauthorized access occurred November 5-6, 2024, but wasn't publicly attributed until April 2025 when the <strong>INC</strong> ransomware group claimed responsibility on their dark web leak site, posting sample data and threatening full release.</p>
</li>
<li>
<p>This represents the largest data breach in the food and beverage sector since tracking began in 2018, with the company offering affected individuals two years of complimentary <strong>monitoring</strong> and identity protection services.</p>
</li>
</ul>
<h3 id="azure-arc-vulnerabilities-enable-hybrid-network-privilege-escalation"><a href="https://www.ibm.com/think/x-force/identifying-abusing-azure-arc-for-hybrid-escalation-persistence?ref=mandos.io">Azure Arc Vulnerabilities Enable Hybrid Network Privilege Escalation</a></h3>
<ul>
<li>
<p>Azure Arc extends Azure management to on-premises systems, allowing attackers to potentially exploit <strong>misconfigured</strong> Service Principals with the Azure Connected Machine Resource Administrator role to execute code remotely as SYSTEM.</p>
</li>
<li>
<p>Hardcoded secrets in deployment scripts, especially when using Group Policy or SCCM deployment methods, provide attackers with credential material that can be leveraged to gain control of both cloud and on-premises <strong>infrastructure</strong>.</p>
</li>
<li>
<p>Multiple code execution vectors exist within Azure Arc, including Run Commands and Custom Script Extensions (CSE), which can be used for <strong>persistence</strong> and lateral movement between hybrid environments.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ddos-attacks-against-financial-sector-evolve-from-nuisance-to-strategic-threat"><a href="https://drive.google.com/file/d/15F8y1U0js4mH9Hne780waC3lcAEO9bC1/view?usp=drivesdk&ref=mandos.io">DDoS Attacks Against Financial Sector Evolve From Nuisance To Strategic Threat</a></h3>
<ul>
<li>
<p>The financial sector remains the top target for DDoS attacks, with a significant spike in October 2024 and a 23% increase in <strong>application-layer</strong> attacks between 2023-2024, particularly targeting APIs (58% increase).</p>
</li>
<li>
<p>Today's DDoS attacks are increasingly sophisticated, with threat actors employing methodical reconnaissance, multi-vector strategies, and dynamic tactics designed to bypass automated defenses, sometimes causing service outages lasting days.</p>
</li>
<li>
<p>Notable threat actors include BlackMeta, NoName057(16), RipperSec, and GorillaBot, with attacks often coinciding with <strong>geopolitical</strong> events, demonstrating the strategic nature of modern DDoS campaigns.</p>
</li>
</ul>
<h3 id="bitdefender-report-reveals-84-of-cyberattacks-use-living-off-the-land-techniques"><a href="https://drive.google.com/file/d/1dhynIOkI1tuK7iIQeXpZwuK93HZirpNl/view?usp=drivesdk&ref=mandos.io">Bitdefender Report Reveals 84% of Cyberattacks Use Living Off the Land <strong>Techniques</strong></a></h3>
<ul>
<li>
<p>Bitdefender's 2025 Cybersecurity Assessment Report analyzed 700,000 cyber incidents, finding that 84% of major attacks now leverage Living Off the Land (LOTL) <strong>techniques</strong> where attackers use legitimate system tools like PowerShell and WMI to evade detection.</p>
</li>
<li>
<p>68% of security leaders agree that reducing the attack <strong>surface</strong> by disabling unnecessary tools and applications is critical, as the modern risk environment is increasingly built from within rather than external perimeters.</p>
</li>
<li>
<p>Significant perception gaps exist between organizational levels, with 45% of C-level executives reporting high confidence in cyber readiness compared to only 19% of <strong>mid-level</strong> managers, potentially leading to misaligned priorities and investments.</p>
</li>
</ul>
<h3 id="sophos-state-of-ransomware-2025-data-encryption-reaches-six-year-low-as-recovery-costs-decline"><a href="https://drive.google.com/file/d/1AEPyPMF5ueBgp00eRBhCl5asYNqVlvV9/view?usp=drivesdk&ref=mandos.io">Sophos State of Ransomware 2025: Data Encryption Reaches Six-Year Low as Recovery Costs Decline</a></h3>
<ul>
<li>
<p>Data <strong>encryption</strong> in ransomware attacks dropped significantly from 70% in 2024 to 50% in 2025, while the average recovery cost (excluding ransom) fell by 44% to $1.53 million, down from $2.73 million last year.</p>
</li>
<li>
<p><strong>Vulnerabilities</strong> remain the top attack vector (32% of incidents), followed by compromised credentials (23%) and malicious emails (19%), with 40.2% of victims citing lack of expertise as the primary operational factor contributing to successful attacks.</p>
</li>
<li>
<p>The median <strong>ransom</strong> payment fell by half to $1 million (from $2 million in 2024), with organizations typically paying 85% of the initial demand, while recovery speed improved with 53% of companies fully restored within a week compared to 35% in 2024.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="executives-bypassing-mfa-requirements-lead-to-security-breach"><a href="https://www.reddit.com/r/cybersecurity/comments/1ljz35b/unaware_executives/?ref=mandos.io">Executives Bypassing MFA Requirements Lead To Security Breach</a></h3>
<ul>
<li>
<p>Security professional shares experience with executives who don't take security seriously, requiring hand-holding through security reports and questioning consequences of unaddressed <strong>risks</strong>.</p>
</li>
<li>
<p>A CEO's work email was <strong>hacked</strong> after being placed on a conditional access list that removed MFA requirements, likely due to credential breach or <strong>phishing</strong>.</p>
</li>
<li>
<p>Many business leaders, including those working with sensitive sectors like the US <strong>Military</strong>, admitted to never implementing security measures despite their leadership positions.</p>
</li>
</ul>
<h3 id="cybersecurity-hiring-manager-shares-key-interview-success-factors"><a href="https://www.reddit.com/r/cybersecurity/comments/1lnf5xn/hiring_managers_tips_interviewing_for/?ref=mandos.io">Cybersecurity Hiring Manager Shares Key Interview Success Factors</a></h3>
<ul>
<li>
<p>Beyond technical skills and certifications, hiring managers seek candidates who demonstrate an understanding of security <strong>workflows</strong> and can explain how they've solved problems using specific tools in detail.</p>
</li>
<li>
<p>Strong communication abilities are essential as security professionals must <strong>collaborate</strong> with business teams to explore risk mitigation options rather than simply dictating security requirements.</p>
</li>
<li>
<p>Professional <strong>composure</strong> – including presentation skills and corporate social etiquette – has become a critical hiring factor, with modern security roles requiring business interaction rather than isolated technical work.</p>
</li>
<li>
<p>Using AI during interviews is an automatic disqualifier, though AI can be valuable for <strong>preparation</strong> before interviews to develop more thoughtful responses to anticipated questions.</p>
</li>
</ul>
<h3 id="red-team-contractor-reports-cad-140hr-rate-with-10-years-experience"><a href="https://www.reddit.com/r/cybersecurity/comments/1logv7m/how_much_you_make_as_a_cybersecurity_contractors/?ref=mandos.io">Red Team Contractor Reports CAD 140/hr Rate With 10+ Years Experience</a></h3>
<ul>
<li>
<p>A cybersecurity professional with 10+ years of experience shared they earn CAD 140/hr as a <strong>red teamer</strong> contractor, initiating a discussion about current market rates.</p>
</li>
<li>
<p>The post appeared in r/cybersecurity, a community of 1.2M members focused on technical professionals discussing cybersecurity news, research, and <strong>threats</strong>.</p>
</li>
<li>
<p>This data point provides valuable <strong>compensation</strong> benchmark information for cybersecurity professionals considering contract work in the <strong>offensive</strong> security space.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-agents-identified-as-emerging-insider-security-threat"><a href="https://drive.google.com/file/d/1pQIgr4F5j66PkAdIyZX--w6MsTIxRu-W/view?usp=drivesdk&ref=mandos.io">AI Agents Identified As Emerging Insider Security Threat</a></h3>
<ul>
<li>
<p>AI agents are increasingly performing user-like actions (logging in, accessing systems, triggering workflows) but most security teams still treat them as static infrastructure, creating <strong>blindspots</strong> in identity governance and allowing them to operate with unchecked privileges.</p>
</li>
<li>
<p>Only 30% of organizations regularly map non-human <strong>identities</strong> to critical assets, despite 85% claiming readiness for AI in security, and AI impersonation of users ranks as the top concern for 37% of security leaders.</p>
</li>
<li>
<p>Healthcare organizations, among the fastest adopters of AI, are particularly vulnerable with 61% reporting identity-related attacks and only 23% offering <strong>passwordless</strong> authentication, significantly lagging behind other sectors in identity <strong>maturity</strong>.</p>
</li>
</ul>
<h3 id="state-of-llm-security-report-2025-reveals-highest-proportion-of-serious-vulnerabilities"><a href="https://drive.google.com/file/d/1KlINvVWZ7zrW7pqpojM9n8kAFhSRPnr8/view?usp=drivesdk&ref=mandos.io">State of LLM Security Report 2025 Reveals Highest Proportion of Serious Vulnerabilities</a></h3>
<ul>
<li>
<p>LLM pentests reveal that 32% of findings are classified as <strong>serious</strong> vulnerabilities (high or critical risk), the highest proportion among all asset types tested, yet only 21% of these get resolved – the lowest resolution rate across all pentest types.</p>
</li>
<li>
<p>Organizations struggle with <strong>remediation</strong> of complex LLM vulnerabilities, often prioritizing quicker fixes for simpler issues (19-day MTTR for resolved issues) while leaving more challenging vulnerabilities unaddressed, particularly those dependent on third-party model providers.</p>
</li>
<li>
<p>Despite 72% of security professionals citing genAI threats as a top IT risk, only 66% of organizations conduct regular security assessments for their LLM deployments, indicating a critical gap between risk awareness and <strong>testing</strong> practices.</p>
</li>
</ul>
<h3 id="cisos-approaching-tipping-point-in-ai-adoption-for-security-operations"><a href="https://www.chemistry.vc/post/ai-for-security?ref=mandos.io">CISOs Approaching Tipping Point in AI Adoption for Security Operations</a></h3>
<ul>
<li>
<p>While CISOs have enabled other departments to adopt AI tools, they've been more <strong>hesitant</strong> about implementing these technologies within security operations due to understandable trust concerns.</p>
</li>
<li>
<p>Security is an ideal candidate for AI adoption as it handles text-heavy, high-volume, time-sensitive tasks across multiple domains including <strong>vulnerability</strong> management, security data pipelines, and application security.</p>
</li>
<li>
<p>New AI-native security companies are emerging in key areas like identity management, digital risk protection, and automated pentesting, offering solutions that can finally help security teams achieve "inbox zero."</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cato-networks-raises-359m-to-enhance-ai-powered-sase-platform"><a href="https://www.thesaasnews.com/news/cato-networks-raises-359m-at-a-4-8b-valuation?ref=mandos.io">Cato Networks Raises $359M to Enhance AI-Powered SASE Platform</a></h3>
<ul>
<li>
<p>Tel Aviv-based Cato Networks secured $359 million in Series G funding at a $4.8B+ valuation, led by Vitruvian Partners and ION Crossover Partners, to enhance their <strong>SASE</strong> cloud platform that unifies enterprise networking and security.</p>
</li>
<li>
<p>The company will use the funding to accelerate <strong>AI</strong> security capabilities, platform innovation, and expand global operations across its customer and partner ecosystem serving over 3,500 enterprise customers.</p>
</li>
<li>
<p>Founded by Shlomo Kramer and Gur Shatz, Cato's cloud-native platform offers comprehensive security features including SD-WAN, SSE, <strong>ZTNA</strong>, XDR, and LAN security with real-time visibility and <strong>automation</strong>.</p>
</li>
</ul>
<h3 id="zero-networks-secures-55m-series-c-funding-for-microsegmentation-technology"><a href="https://www.sdxcentral.com/news/zero-networks-now-hero-with-55m-series-c-funding/?ref=mandos.io">Zero Networks Secures $55M Series C Funding for Microsegmentation Technology</a></h3>
<ul>
<li>
<p>Tel Aviv-based <strong>cybersecurity</strong> startup Zero Networks raised $55M in Series C funding led by Highland Europe, bringing total funding to over $100M for its <strong>microsegmentation</strong> solutions.</p>
</li>
<li>
<p>The company will use funding to increase go-to-market investments across North America, EMEA, and APAC regions while developing its automated <strong>zero trust</strong> architecture that prevents lateral movement at the source.</p>
</li>
<li>
<p>Zero Networks offers Zero Trust Network Access and Identity Least Privilege solutions on a unified platform, using an MFA-driven approach that ensures privilege access across users, devices, and workloads.</p>
</li>
</ul>
<h3 id="cybersecurity-market-expected-to-reach-550-billion-by-2033"><a href="https://www.marketdataforecast.com/market-reports/cyber-security-market?ref=mandos.io">Cybersecurity Market Expected To Reach $550 Billion By 2033</a></h3>
<ul>
<li>
<p>The global cybersecurity market is projected to grow from $262.23 billion in 2025 to $549.96 billion by 2033, at a <strong>CAGR</strong> of 9.7%, driven by increasing targeted attacks and evolving cyber threats.</p>
</li>
<li>
<p>North America currently holds the largest market share (36%) while Asia Pacific represents the fastest-growing region, with the <strong>healthcare</strong> sector expected to see the highest growth rate among end-users.</p>
</li>
<li>
<p>Services segment dominates the market as organizations, especially <strong>SMEs</strong> with limited budgets, seek consultative approaches before implementing specific cybersecurity solutions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="appgate-sdp"><a href="https://cybersectools.com/tools/appgate-sdp?ref=mandos.io">Appgate SDP</a></h3>
<p>Appgate SDP is a Zero Trust Network Access solution that provides secure, context-aware access to resources across hybrid environments while eliminating traditional VPN limitations.</p>
<h3 id="strobes-security-consulting-services"><a href="https://cybersectools.com/tools/strobes-security-consulting-services?ref=mandos.io">Strobes Security Consulting Services</a></h3>
<p>Strobes Security Consulting Services provides an integrated cybersecurity platform that combines attack surface management, penetration testing, vulnerability management, and application security with expert consulting services.</p>
<h3 id="socradar-digital-risk-protection-platform"><a href="https://cybersectools.com/tools/socradar-digital-risk-protection-platform?ref=mandos.io">SOCRadar Digital Risk Protection Platform</a></h3>
<p>A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #110: Microsoft 365 Exploit, 8M Developers At Risk, 47% Fear Cyber ]]></title>
        <description><![CDATA[ Major development platforms compromised via extensions marketplace. AI systems vulnerable to data exfiltration attacks. Global leaders rank cyber as top business threat. ]]></description>
        <link>https://mandos.io/newsletter/brief-110-microsoft-365-phishing-8m-developers-at-risk-47-fear-cyber/</link>
        <guid isPermaLink="false">685ea37fd9b23f0001cd659f</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 29 Jun 2025 17:15:14 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/06/26.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Cybersecurity officially claim the top spot as the biggest business challenge for 2025 - something we've all felt building over the past few years. What strikes me most is that despite this recognition, nearly half of organizations still don't feel prepared. There's clearly a gap between awareness and action that we need to bridge.</p><p>In this week's brief:</p><ul><li>A sneaky Microsoft 365 Direct Send vulnerability that's letting attackers send spoofed internal emails without compromising any accounts</li><li>Survey data showing cybersecurity has become the #1 business concern globally, yet most organizations feel unprepared</li><li>The ongoing debate about whether professionals should pay out-of-pocket for certification renewals when employers cut funding</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">❔</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">If you had to choose between investing your own money in maintaining certifications or spending that same budget on hands-on learning experiences, which would you pick and why?</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="threat-actors-exploit-microsoft-365-direct-send-feature-to-deliver-phishing-emails"><a href="https://www.varonis.com/blog/direct-send-exploit?ref=mandos.io">Threat Actors Exploit Microsoft 365 Direct Send Feature to Deliver Phishing Emails</a></h3>
<ul>
<li>
<p>Varonis researchers discovered a phishing campaign targeting over 70 organizations by exploiting Microsoft 365's Direct Send feature, allowing attackers to send <strong>spoofed</strong> internal emails without needing to compromise accounts.</p>
</li>
<li>
<p>The attack requires no authentication and bypasses typical email security controls by using PowerShell to send emails through the predictable smart host format (company-name.mail.protection.outlook.com) with <strong>forged</strong> sender addresses.</p>
</li>
<li>
<p>Organizations can protect themselves by enabling "Reject Direct Send" in Exchange Admin Center, implementing strict <strong>DMARC</strong> policies, and flagging unauthenticated internal emails for review.</p>
</li>
</ul>
<h3 id="critical-vulnerability-in-open-vsx-marketplace-exposed-8-million-developers-to-supply-chain-attack"><a href="https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44?ref=mandos.io">Critical Vulnerability in Open VSX Marketplace Exposed 8 Million Developers to Supply-Chain Attack</a></h3>
<ul>
<li>
<p>Researchers discovered a <strong>vulnerability</strong> in Open VSX extensions marketplace that would allow attackers to steal a privileged access token, giving them ability to publish malicious updates to every extension used by popular VSCode forks like Cursor, Windsurf, and VSCodium.</p>
</li>
<li>
<p>The flaw existed in the auto-publishing mechanism where NPM install commands ran with access to a <strong>privileged</strong> token, exposing over 8 million developers to potential compromise through silent extension updates functioning as <strong>malware</strong>.</p>
</li>
<li>
<p>The affected marketplace serves as the primary extension source for dozens of development environments including Google Cloud Shell Editor, GitLab Web IDE, and Arduino IDE 2.x, creating an unprecedented supply-chain risk across the development ecosystem.</p>
</li>
</ul>
<h3 id="anthropics-slack-mcp-server-vulnerable-to-data-exfiltration-via-link-unfurling"><a href="https://embracethered.com/blog/posts/2025/security-advisory-anthropic-slack-mcp-server-data-leakage/?ref=mandos.io">Anthropic's Slack MCP Server Vulnerable to Data Exfiltration via Link Unfurling</a></h3>
<ul>
<li>
<p>A <strong>deprecated</strong> Anthropic Slack MCP Server is vulnerable to data exfiltration when posting messages, allowing attackers to leak data via hyperlink unfurling by exploiting <strong>prompt injection</strong> attacks.</p>
</li>
<li>
<p>The vulnerability creates a "lethal trifecta" when AI agents use the Slack MCP server, have access to private data, and process untrusted content, enabling attackers to exfiltrate sensitive information including API keys and internal communications.</p>
</li>
<li>
<p>A simple patch is available by adding two lines of code to disable link unfurling, but the server is no longer maintained by Anthropic despite its wide usage (14k+ weekly downloads), leaving thousands of installations potentially <strong>vulnerable</strong>.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-threats-rank-as-top-business-challenge-in-2025-global-survey"><a href="https://drive.google.com/file/d/1H7pX6c_YHqFBuuRpEQew/view?usp=drivesdk&ref=mandos.io">Cybersecurity Threats Rank as Top Business Challenge in 2025 Global Survey</a></h3>
<ul>
<li>
<p>Nearly half (47%) of global business leaders identify <strong>cybersecurity</strong> threats as their leading challenge in 2025, with 74% reporting increased concerns over the past year primarily due to <strong>malware</strong> (44%), data extortion (37%), and website breaches (37%).</p>
</li>
<li>
<p>Despite growing threats, only 45% of organizations feel "very prepared" to address cybersecurity and data privacy issues, with just 12% ranking themselves as "extremely prepared" for global data privacy compliance across jurisdictions.</p>
</li>
<li>
<p>AI-powered attacks are emerging as a significant concern (28%), yet organizations show critical governance gaps - 63% lack AI transparency practices, 59% have no AI policies, and 67% haven't engaged their boards on AI risks.</p>
</li>
</ul>
<h3 id="transportation-logistics-sector-faces-mounting-network-security-challenges"><a href="https://drive.google.com/file/d/17dtLkLlI3NVCQ5tDWMdm1TtVlKtx1ox1/view?usp=drivesdk&ref=mandos.io">Transportation &amp; Logistics Sector Faces Mounting Network Security Challenges</a></h3>
<ul>
<li>
<p>Survey reveals that staying ahead of cybersecurity threats (81%) is the top operational challenge for transportation and logistics companies, with <strong>ransomware</strong> attacks (77%) being the primary security concern, followed by consistent policy enforcement (66%).</p>
</li>
<li>
<p>Only 28% of organizations have implemented solutions to address <strong>GenAI</strong>-related network security issues, while 49% see value in converging networking and security functions for more robust operations.</p>
</li>
<li>
<p>Despite the increasing importance of edge security for distributed operations, only 40% of respondents consider it mission-critical, and just 19% have implemented <strong>SASE</strong> solutions, highlighting significant gaps in modern security adoption.</p>
</li>
</ul>
<h3 id="security-and-network-visibility-top-priorities-for-enterprise-it-leaders"><a href="https://drive.google.com/file/d/1FCEIbgRdkSncCgqfstjZV9jQ-Au_QKPV/view?usp=drivesdk&ref=mandos.io">Security and Network Visibility Top Priorities for Enterprise IT Leaders</a></h3>
<ul>
<li>
<p>A recent study of 120 US-based IT leaders reveals that <strong>security</strong> concerns and complexity of network management are their primary challenges, with nearly half planning cybersecurity investments within the next 12 months due to rapid innovation in security technologies.</p>
</li>
<li>
<p>Improving <strong>visibility</strong> into network traffic and diagnostics has emerged as a key focus area, as IT departments aim to better understand network activity, proactively mitigate security threats, and optimize network performance and costs.</p>
</li>
<li>
<p>While many enterprises completed major LAN and WAN infrastructure upgrades during the pandemic, evolving from software-defined WAN (SD-WAN) to <strong>SASE</strong> (Secure Access Service Edge) is now a priority focus area, especially for securing remote workforces.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="experienced-cybersecurity-analyst-struggles-with-soc-role-transitions-despite-7-years-of-experience"><a href="https://www.reddit.com/r/CyberSecurityJobs/comments/1ldvevb/tired_of_failing/?ref=mandos.io">Experienced Cybersecurity Analyst Struggles With SOC Role Transitions Despite 7 Years Of Experience</a></h3>
<ul>
<li>
<p>A cybersecurity professional with 7 years of experience (2 years as InfoSec analyst, 5 years as <strong>Threat/Malware</strong> analyst) and a Masters degree reports consistent rejection when attempting to return to <strong>SOC</strong> roles.</p>
</li>
<li>
<p>Despite progressing through multiple interview rounds (3-8 rounds) with various companies over the past year, the candidate faces vague rejection reasons, impacting their confidence despite addressing feedback from previous interviews.</p>
</li>
<li>
<p>The professional currently works in a niche cybersecurity position with limited compensation and is considering pursuing <strong>CISSP</strong> certification to improve job prospects after their Security+ <strong>certification</strong> expired in December 2024.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-debate-value-of-maintaining-certifications-when-employers-cut-renewal-funding"><a href="https://www.reddit.com/r/cybersecurity/comments/1llbjcr/how_do_you_handle_outofpocket_certification/?ref=mandos.io">Cybersecurity Professionals Debate Value of Maintaining Certifications When Employers Cut Renewal Funding</a></h3>
<ul>
<li>
<p>A cybersecurity professional with 10 years of experience faces difficult decisions about maintaining <strong>certifications</strong> as their company implements cost-cutting measures and stops covering renewal fees that can cost several hundred dollars.</p>
</li>
<li>
<p>The professional distinguishes between entry-level certifications like GIAC GSEC that may have diminishing returns with experience, and advanced certifications like <strong>CISSP</strong> that justify personal investment due to their demanding qualification process.</p>
</li>
<li>
<p>The discussion highlights the emotional <strong>investment</strong> attached to certifications that represent months of studying and preparation, with many professionals reluctant to let credentials expire despite unclear <strong>ROI</strong> when paying out-of-pocket.</p>
</li>
</ul>
<h3 id="ex-bug-bounty-engineer-developing-challenge-based-cybersecurity-hiring-tool"><a href="https://www.reddit.com/r/cybersecurity/comments/1ljkrw8/curious_how_others_are_assessing_cybersecurity/?ref=mandos.io">Ex-Bug Bounty Engineer Developing Challenge-Based Cybersecurity Hiring Tool</a></h3>
<ul>
<li>
<p>A former HackerOne/Bugcrowd engineer is creating a tool to assess <strong>skills</strong> through hands-on, challenge-based tasks rather than relying on resumes and traditional interviews.</p>
</li>
<li>
<p>The developer is seeking input from security <strong>hiring</strong> managers, consultancy operators, and professionals frustrated with current methods of evaluating technical ability.</p>
</li>
<li>
<p>The initiative focuses on practical <strong>assessment</strong> techniques for security roles including analysts and penetration testers, with sample challenges available upon request.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="owasp-launches-comprehensive-ai-testing-guide-to-address-unique-security-challenges"><a href="https://owasp.org/www-project-ai-testing-guide/?ref=mandos.io">OWASP Launches Comprehensive AI Testing Guide To Address Unique Security Challenges</a></h3>
<ul>
<li>
<p>The guide aims to become the definitive reference for identifying <strong>security</strong>, privacy, ethical, and compliance vulnerabilities inherent in AI applications, with a technology-agnostic approach applicable across various implementation scenarios.</p>
</li>
<li>
<p>Unlike traditional software, AI systems require specialized testing methodologies to address unique challenges including non-deterministic behavior, data dependencies, and vulnerability to <strong>adversarial</strong> attacks that can compromise system integrity.</p>
</li>
<li>
<p>Development roadmap shows the guide will be completed in phases through September 2025, with contributions welcomed from the <strong>OWASP</strong> and AI communities to establish a structured framework for <strong>bias</strong>, robustness, and security validation.</p>
</li>
</ul>
<h3 id="model-context-protocol-details-key-security-risks-and-mitigations"><a href="https://modelcontextprotocol.io/specification/2025-06-18/basic/security_best_practices?ref=mandos.io">Model Context Protocol Details Key Security Risks and Mitigations</a></h3>
<ul>
<li>
<p>The specification identifies <strong>confused deputy</strong> vulnerabilities in MCP proxy servers, where attackers can exploit authorization servers using static client IDs to bypass user consent and gain unauthorized API access.</p>
</li>
<li>
<p>Token <strong>passthrough</strong> is explicitly forbidden as it enables security control circumvention, compromises audit trails, creates trust boundary issues, and introduces risks of unauthorized access across connected services.</p>
</li>
<li>
<p>To prevent <strong>session</strong> hijacking attacks, MCP servers must verify all inbound requests, avoid using sessions for authentication, implement secure non-deterministic session IDs, and bind sessions to user-specific information.</p>
</li>
</ul>
<h3 id="mcp-a2a-and-ag-ui-technologies-could-create-true-single-pane-of-glass-for-secops"><a href="https://www.cybersec-automation.com/p/will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops-c12d22215aa28244?ref=mandos.io">MCP, A2A, and AG-UI Technologies Could Create True Single Pane of Glass for SecOps</a></h3>
<ul>
<li>
<p>Three emerging technologies – Model Context Protocol (MCP), Agent-to-Agent communication (A2A), and Agentic User Interface (AG-UI) – together offer a promising solution to the <strong>integration</strong> challenges that have historically prevented a unified security operations view.</p>
</li>
<li>
<p>MCP standardizes how AI agents interact with security tools, A2A enables specialized AI agents to collaborate on complex tasks, and AG-UI provides an <strong>interactive</strong> human-AI interface that presents contextualized findings rather than just raw data.</p>
</li>
<li>
<p>This approach could move SecOps beyond rigid, rule-based <strong>playbooks</strong> toward more adaptive, context-aware automation while maintaining human oversight for critical judgment and reducing alert <strong>fatigue</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="revengai-raises-415-million-to-secure-software-supply-chain"><a href="https://www.securityweek.com/reveng-ai-raises-4-15-million-to-secure-software-supply-chain/?ref=mandos.io">RevEng.ai Raises $4.15 Million to Secure Software Supply Chain</a></h3>
<ul>
<li>
<p>British startup RevEng.ai secured $4.15M in <strong>seed</strong> funding for its AI platform that automatically detects <strong>malicious</strong> code and vulnerabilities in software without requiring source code access.</p>
</li>
<li>
<p>The company's proprietary <strong>BinNet</strong> AI model verifies software supply chain integrity through deep analysis of capabilities, security assessments, and automatic YARA rule creation for Linux, Windows, and Android platforms.</p>
</li>
<li>
<p>Investment was led by Sands Capital with support from Episode, In-Q-Tel Capital, and IQ Capital, with funds earmarked to accelerate growth, improve AI models, hire talent, and expand <strong>US</strong> presence.</p>
</li>
</ul>
<h3 id="databahn-secures-17m-to-deploy-ai-agents-for-data-pipeline-management"><a href="https://siliconangle.com/2025/06/26/databahn-raises-17m-automate-data-pipeline-management-ai-agents/?ref=mandos.io">DataBahn Secures $17M to Deploy AI Agents for Data Pipeline Management</a></h3>
<ul>
<li>
<p>DataBahn has raised $17M in Series A funding led by Forgepoint Capital to develop its <strong>autonomous</strong> AI agent-based platform for data pipeline management and telemetry.</p>
</li>
<li>
<p>The company's "Phantom" AI agents collect telemetry without deploying legacy software, parsing and enriching data while suppressing noise - reducing <strong>telemetry</strong> costs by over 50% for Fortune 50 clients.</p>
</li>
<li>
<p>The platform combines <strong>federated</strong> search capabilities with security-focused features, enabling faster threat detection while providing deeper context and control without traditional agent overheads.</p>
</li>
</ul>
<h3 id="nexus-it-secures-60-million-for-cybersecurity-services-expansion"><a href="https://pulse2.com/nexus-it-60-million-raised-for-cybersecurity-services/?ref=mandos.io">Nexus IT Secures $60 Million For Cybersecurity Services Expansion</a></h3>
<ul>
<li>
<p>Nexus IT, a Managed Services and <strong>Cybersecurity</strong> provider, received a $60 million capital commitment from Metropolitan Partners Group to accelerate nationwide growth through strategic MSP acquisitions.</p>
</li>
<li>
<p>The company will focus on acquiring MSPs that serve highly regulated <strong>industries</strong> including healthcare, finance, and legal, with several acquisition deals already in the pipeline for U.S. <strong>expansion</strong> over the next three years.</p>
</li>
<li>
<p>Rather than pursuing scale at all costs, Nexus IT is implementing a founder-led approach focused on long-term value creation, cultural fit, and client-centric <strong>innovation</strong> in IT services.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="trellix-insights"><a href="https://cybersectools.com/tools/trellix-insights?ref=mandos.io">Trellix Insights</a></h3>
<p>A GenAI-powered security platform that integrates endpoint, email, network, data, cloud, and security operations capabilities for comprehensive threat detection and response.</p>
<h3 id="zscaler-internet-access"><a href="https://cybersectools.com/tools/zscaler-internet-access?ref=mandos.io">Zscaler Internet Access</a></h3>
<p>Zscaler Internet Access is a cloud-based zero trust security platform that secures internet traffic by providing threat protection, data loss prevention, and secure web gateway capabilities without traditional VPN infrastructure.</p>
<h3 id="ping-identity-platform"><a href="https://cybersectools.com/tools/ping-identity-platform?ref=mandos.io">Ping Identity Platform</a></h3>
<p>The Ping Identity Platform is an enterprise identity and access management solution that provides authentication, authorization, and identity governance capabilities with flexible deployment options for securing customer, workforce, and partner identities.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #109: Cloudflare 7.3 Tbps DDoS Record, Salesforce Config Risks, 6x Increase in Security Incidents ]]></title>
        <description><![CDATA[ Cloudflare mitigates largest DDoS attack ever recorded. Salesforce Industry Cloud exposes 20 configuration vulnerabilities. Cyentia IRIS 2025 Report Reveals Sixfold Increase in Security Incidents with Median Losses Rising to $3 Million ]]></description>
        <link>https://mandos.io/newsletter/brief-109-cloudflare-7-3-tbps-ddos-record-salesforce-config-risks-6x-increase-in-security-incidents/</link>
        <guid isPermaLink="false">6857b503d5ca3100016939ee</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 22 Jun 2025 17:00:30 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/06/25.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I've was reading Cyentia report showing cyber incidents have increased sixfold over 15 years. It's staggering when you step back and realize we're not just dealing with more sophisticated attacks - we're dealing with exponentially more of them. The median loss jumping from $190K to $3 million tells the whole story about where we are as an industry.</p><p>In this week's brief:</p><ul><li>Cloudflare just mitigated a monster 7.3 Tbps DDoS attack - the largest on record</li><li>New research reveals 60% of cybersecurity professionals are eyeing the exit door</li><li>AI secrets are dominating code repository leaks, creating a whole new category of exposure</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Given the massive increase in both attack frequency and financial impact, do you think we're finally at the tipping point where boards will start treating cybersecurity as a core business function rather than a cost center?</strong></b><br><br><i><em class="italic" style="white-space: pre-wrap;">I'd love to hear your thoughts. Reply directly to this email or share your thoughts in comments section below.</em></i></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cloudflare-blocks-record-breaking-73-tbps-ddos-attack"><a href="https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/?ref=mandos.io">Cloudflare Blocks Record-Breaking 7.3 Tbps DDoS Attack</a></h3>
<ul>
<li>
<p>In mid-May 2025, Cloudflare autonomously mitigated the largest DDoS attack ever recorded at 7.3 Tbps, targeting a hosting provider client. The <strong>multivector</strong> attack delivered 37.4 terabytes in just 45 seconds and carpet-bombed over 21,000 destination ports.</p>
</li>
<li>
<p>The attack was primarily UDP floods (99.996%) with traces of reflection and amplification attacks including QOTD, Echo, NTP, and Mirai. It originated from over 122,145 source IPs across 5,433 <strong>autonomous systems</strong> in 161 countries, with Brazil and Vietnam accounting for half the traffic.</p>
</li>
<li>
<p>Cloudflare's global <strong>anycast</strong> network distributed the attack traffic across 477 data centers in 293 locations, enabling autonomous detection and mitigation through real-time fingerprinting without human intervention or service disruption.</p>
</li>
</ul>
<h3 id="salesforce-industry-cloud-contains-20-configuration-risks-that-could-expose-customer-data"><a href="https://appomni.com/blog/low-code-high-stakes-salesforce-security/?ref=mandos.io">Salesforce Industry Cloud Contains 20 Configuration Risks That Could Expose Customer Data</a></h3>
<ul>
<li>
<p>AppOmni researchers discovered 20 insecure configurations in Salesforce Industry Cloud's low-code OmniStudio platform that could allow attackers to access encrypted customer information, session data, credentials, and business logic through misconfigurations.</p>
</li>
<li>
<p>Salesforce issued five CVEs addressing critical vulnerabilities in FlexCards and Data Mappers components, including field-level security bypasses and unauthorized access to encrypted data, while leaving 15 other configuration risks for customers to mitigate.</p>
</li>
<li>
<p>The vulnerabilities primarily affect low-code components that don't enforce access controls by default, allow external user execution of workflows, and contain caching mechanisms that can bypass security controls in enterprise deployments.</p>
</li>
</ul>
<h3 id="over-46000-grafana-instances-exposed-to-account-takeover-vulnerability"><a href="https://www.ox.security/confirmed-critical-the-grafana-ghost-exposes-36-of-public-facing-instances-to-malicious-account-takeover/?ref=mandos.io">Over 46,000 Grafana Instances Exposed to Account Takeover Vulnerability</a></h3>
<ul>
<li>
<p>More than 46,000 internet-facing <strong>Grafana</strong> instances remain unpatched against CVE-2025-4123, a client-side open redirect vulnerability that enables malicious plugin execution and account takeover attacks.</p>
</li>
<li>
<p>The vulnerability allows attackers to hijack user sessions, change account credentials, and perform <strong>server-side request forgery</strong> (SSRF) attacks without requiring elevated privileges or authentication.</p>
</li>
<li>
<p>Despite security patches being released on May 21, approximately 36% of the 128,864 publicly accessible Grafana instances continue running vulnerable versions, creating a significant attack surface for threat actors.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cyentia-iris-2025-report-shows-sixfold-increase-in-security-incidents-over-15-years"><a href="https://drive.google.com/file/d/1coEOCoUUL3peJ5NNJmmd1-NqOBQwNzqc/view?usp=drivesdk&ref=mandos.io">Cyentia IRIS 2025 Report Shows Sixfold Increase In Security Incidents Over 15 Years</a></h3>
<ul>
<li>
<p>The annual probability of an organization experiencing a cyber event has almost <strong>quadrupled</strong> since 2008, with approximately 3,000 significant security incidents reported quarterly in 2024, compared to just 450 in 2008.</p>
</li>
<li>
<p>Financial impacts have grown dramatically, with median losses increasing 15-fold from $190K to almost $3 million, while costs as a proportion of annual <strong>revenue</strong> have seen an 8-fold increase.</p>
</li>
<li>
<p>Despite growing <strong>ransomware</strong> threats, system intrusion remains the most common incident type, with credential compromise continuing as the leading intrusion method (43-60% of all incidents).</p>
</li>
</ul>
<h3 id="8-things-cisos-have-learned-from-cyber-incidents"><a href="https://www.csoonline.com/article/4002175/8-things-cisos-have-learnt-from-cyber-incidents.html?ref=mandos.io">8 Things CISOs Have Learned From Cyber Incidents</a></h3>
<ul>
<li>
<p>Post-incident CISOs shift from defense to offense, developing an attack-minded perspective that focuses on understanding their <strong>attack surface</strong> better than adversaries and implementing robust <strong>response plans</strong> with clear roles and communication protocols.</p>
</li>
<li>
<p>CISOs must verify backup systems are isolated, functioning, and clean as modern <strong>ransomware</strong> attacks specifically target backups first to disable restoration capabilities and force ransom payments.</p>
</li>
<li>
<p>While cyber incidents temporarily increase executive attention and funding, this focus often diminishes over time, forcing CISOs to balance immediate security improvements with the reality of potential <strong>budget</strong> cuts once the crisis fades.</p>
</li>
</ul>
<h3 id="cisos-struggle-to-transition-from-reactive-to-proactive-threat-intelligence"><a href="https://drive.google.com/file/d/1X_5i3kOvNeCuoPJFSYUlqt0t8rkS3TBO/view?usp=drivesdk&ref=mandos.io">CISOs Struggle to Transition from Reactive to Proactive Threat Intelligence</a></h3>
<ul>
<li>
<p>Despite 98% of organizations experiencing a <strong>cyberattack</strong> in the past year, only 44% report taking a proactive approach to threat intelligence – leaving most CISOs stuck in reactive postures that limit strategic planning and response capabilities.</p>
</li>
<li>
<p>Traditional threats remain dominant, with <strong>malware</strong>, ransomware, and phishing continuing as primary concerns, though now enhanced by AI capabilities that accelerate attack sophistication and make detection more challenging.</p>
</li>
<li>
<p>While 95% of CISOs agree that participating in threat intelligence sharing <strong>communities</strong> improves their preparedness, success requires embedding threat intelligence throughout security operations – something 60% of organizations have yet to fully achieve.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisos-implement-retention-strategies-as-60-of-cyber-professionals-consider-job-changes"><a href="https://www.csoonline.com/article/4004003/what-cisos-are-doing-to-lock-in-cyber-talent-before-they-bolt.html?ref=mandos.io">CISOs Implement Retention Strategies as 60% of Cyber Professionals Consider Job Changes</a></h3>
<ul>
<li>
<p>More than 60% of cybersecurity professionals are contemplating switching jobs within the next 12 months, with dissatisfaction with career progression emerging as a key driver for potential departures.</p>
</li>
<li>
<p>Mid-career professionals with 6-10 years of experience represent the most critical talent gap, as they are embedded in good organizations but highly sought after for new roles requiring proven expertise.</p>
</li>
<li>
<p>CISOs are implementing retention strategies including internal recruitment and training programs, certification support, mentorship initiatives, and regular career development conversations to build loyalty and reduce turnover.</p>
</li>
</ul>
<h3 id="dfir-professional-faces-career-uncertainty-after-layoff-from-incident-response-company"><a href="https://www.reddit.com/r/cybersecurity/comments/1lgzhpy/cybersecurity_was_my_dream_now_im_lost/?ref=mandos.io">DFIR Professional Faces Career Uncertainty After Layoff From Incident Response Company</a></h3>
<ul>
<li>
<p>A cybersecurity professional with 4+ years of experience progressed from technical support to SOC Analyst to <strong>DFIR</strong> Technical Examiner, before being caught in a round of company layoffs.</p>
</li>
<li>
<p>After reaching a six-figure salary (Philippines-based) in their last position, the professional is struggling to find comparable employment and questioning whether to hold out for similar compensation or pivot to a different role.</p>
</li>
<li>
<p>The post highlights common <strong>career</strong> challenges in cybersecurity, including the impact of false positive management in SOC roles and the significant knowledge expansion required when transitioning to incident response specializations.</p>
</li>
</ul>
<h3 id="experienced-software-engineer-raises-questions-about-ageism-in-cybersecurity-industry"><a href="https://www.reddit.com/r/SecurityCareerAdvice/comments/1lft3cu/ageism_in_cyber_security/?ref=mandos.io">Experienced Software Engineer Raises Questions About Ageism in Cybersecurity Industry</a></h3>
<ul>
<li>
<p>A software engineer with 20 years of experience has observed <strong>ageism</strong> in tech environments, particularly in startups with younger workforce demographics, and is concerned about similar issues in cybersecurity.</p>
</li>
<li>
<p>The individual, who previously worked as a Principal Engineer at a consultancy, is transitioning to <strong>cybersecurity</strong> while wanting to maintain technical roles rather than moving into management.</p>
</li>
<li>
<p>The post raises questions about which <strong>organizations</strong> and cybersecurity roles might be more or less affected by age discrimination as experienced professionals transition into the security field.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cloud-security-alliance-releases-guide-for-red-teaming-agentic-ai-systems"><a href="https://drive.google.com/file/d/1b1B_khUze69DW4TMcMp_u2WpbLBnTpfC/view?usp=drivesdk&ref=mandos.io">Cloud Security Alliance Releases Guide for Red Teaming Agentic AI Systems</a></h3>
<ul>
<li>
<p>The CSA document provides a comprehensive framework for <strong>red teaming</strong> Agentic AI systems across 12 critical vulnerability categories, addressing unique challenges posed by AI systems with planning, reasoning, and autonomous action capabilities.</p>
</li>
<li>
<p>The guide emphasizes that Agentic AI introduces novel security issues beyond traditional GenAI models, including emergent behavior, unstructured communication, interpretability challenges, and significantly expanded <strong>attack surfaces</strong>.</p>
</li>
<li>
<p>Red teaming methodologies include specific tests for authorization hijacking, human oversight failures, critical system interaction risks, and multiple other <strong>exploitation</strong> vectors unique to autonomous agents that make decisions with limited human oversight.</p>
</li>
</ul>
<h3 id="novel-zero-trust-identity-framework-for-agentic-ai-proposes-decentralized-authentication"><a href="https://drive.google.com/file/d/1f2QKW3Mdbdof0nXUgSHJ1srRZ2zgvqTS/view?usp=drivesdk&ref=mandos.io">Novel Zero-Trust Identity Framework For Agentic AI Proposes Decentralized Authentication</a></h3>
<ul>
<li>
<p>Researchers present a comprehensive framework for managing identity and access of AI agents, highlighting how traditional protocols like OAuth and SAML are inadequate for <strong>autonomous</strong> agents operating in Multi-Agent Systems (MAS).</p>
</li>
<li>
<p>The proposed architecture employs Decentralized Identifiers (DIDs), Verifiable Credentials (VCs), and Zero-Knowledge Proofs (ZKPs) to create rich, verifiable agent identities that include capabilities, provenance, and <strong>behavioral</strong> scope.</p>
</li>
<li>
<p>Key innovations include an Agent Naming Service (ANS) for capability-aware discovery, fine-grained access control mechanisms, and a unified global session management layer that enables consistent <strong>revocation</strong> across heterogeneous agent communications.</p>
</li>
</ul>
<h3 id="ai-related-secrets-dominate-public-code-repository-leaks"><a href="https://www.wiz.io/blog/leaking-ai-secrets-in-public-code?ref=mandos.io">AI-Related Secrets Dominate Public Code Repository Leaks</a></h3>
<ul>
<li>
<p>Wiz Research found that AI-related secrets constitute a disproportionate majority of leaked credentials in public code repositories, with 4 out of the top 5 discovered secrets being <strong>AI-related</strong>.</p>
</li>
<li>
<p>Python <strong>notebooks</strong> (.ipynb files) are the most leak-prone file type, containing exposed credentials through code snippets, execution outputs, and debug functions that reveal sensitive information.</p>
</li>
<li>
<p>AI coding assistants frequently recommend hardcoding secrets in configuration files like mcp.json, while current secret scanning tools fail to detect many newer AI platform <strong>credentials</strong> from vendors like Perplexity, WeightsAndBiases, and Chinese AI platforms.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="tadaweb-raises-%E2%82%AC173m-to-enhance-osint-capabilities-for-security-teams"><a href="https://www.eu-startups.com/2025/06/tadaweb-secures-e17-3-million-to-arm-cybersecurity-and-defense-teams-with-smarter-osint/?ref=mandos.io">Tadaweb Raises €17.3M to Enhance OSINT Capabilities for Security Teams</a></h3>
<ul>
<li>
<p>Luxembourg-based Tadaweb secured funding to scale its Small Data <strong>Operating</strong> System for publicly available information (PAI) and open-source intelligence (OSINT), reducing analysis time from "days to minutes."</p>
</li>
<li>
<p>The <strong>platform</strong> combines technology with human intuition, focusing on transparency rather than being "another black box" AI solution, prioritizing keeping humans in control of intelligence gathering.</p>
</li>
<li>
<p>Their SaaS solution is used by <strong>defense</strong>, national security, and <strong>cybersecurity</strong> organizations across Europe and the US, with OSINT estimated to account for 80-90% of information gathering by law enforcement and government entities.</p>
</li>
</ul>
<h3 id="spanish-industrial-cybersecurity-startup-steryon-secures-11m-seed-funding"><a href="https://www.techinasia.com/news/spanish-cybersecurity-startup-steryon-bags-11m-seed-funding?ref=mandos.io">Spanish Industrial Cybersecurity Startup Steryon Secures $1.1M Seed Funding</a></h3>
<ul>
<li>
<p>Barcelona-based Steryon has raised €1 million ($1.1M) in seed funding co-led by 4Founders Capital and Abac Nest Ventures to develop their <strong>industrial</strong> cybersecurity risk management platform.</p>
</li>
<li>
<p>Funds will be used to enhance technology development and expand both technical and commercial teams, with plans to scale <strong>deployment</strong> across industrial sectors both nationally and internationally.</p>
</li>
<li>
<p>Steryon is one of only three Spanish startups selected for Google's "Google for Startups Growth Academy: <strong>AI</strong> for Cybersecurity" program, highlighting their innovative approach in the growing OT security market.</p>
</li>
</ul>
<h3 id="hypernative-raises-40-million-series-b-for-web3-threat-prevention-platform"><a href="https://pulse2.com/hypernative-40-million-series-b-raised-for-threat-prevention-platform/?ref=mandos.io">Hypernative Raises $40 Million Series B For Web3 Threat Prevention Platform</a></h3>
<ul>
<li>
<p>Hypernative secured $40 million in Series B funding to expand their AI-based <strong>detection</strong> platform that protects over $100 billion in assets across 60+ blockchain networks, including recent additions of Solana and THORChain.</p>
</li>
<li>
<p>The company launched Guardian, a real-time transaction security solution that prevents blind signing by simulating outcomes before approval, serving over 200 <strong>Web3</strong> customers including Aptos, Ethereum, and ZKsync.</p>
</li>
<li>
<p>Funding will support expansion into <strong>fraud</strong> prevention and wallet-level protection, following a year where Hypernative detected $2.2 billion in losses from <strong>hacks</strong>, exploits, and phishing – a 22% increase from the previous year.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="finite-state-platform"><a href="https://cybersectools.com/tools/finite-state-platform?ref=mandos.io">Finite State Platform</a></h3>
<p>A device security analysis platform that provides comprehensive vulnerability scanning, SBOM management, and supply chain security monitoring for connected devices and their components.</p>
<h3 id="reveelium-ueba"><a href="https://cybersectools.com/tools/reveelium-ueba?ref=mandos.io">Reveelium UEBA</a></h3>
<p>Reveelium UEBA is a French-developed User and Entity Behavior Analytics solution that uses artificial intelligence to detect abnormal behaviors and security threats by analyzing user and entity activities within an organization's network.</p>
<h3 id="conviso"><a href="https://cybersectools.com/tools/conviso?ref=mandos.io">Conviso</a></h3>
<p>A comprehensive application security platform combining specialized services and software tools to help organizations manage vulnerabilities throughout the software development lifecycle.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #108: Apple Zero-Click Exploit, Microsoft Entra Breach, Cloud Database Exposure ]]></title>
        <description><![CDATA[ Zero-click iPhone exploit hits journalists. 80K+ Microsoft accounts compromised. Enterprise AI governance fails across industries. ]]></description>
        <link>https://mandos.io/newsletter/brief-108-apple-zero-click-exploit-microsoft-entra-breach-cloud-database-exposure/</link>
        <guid isPermaLink="false">684d045418734c0001757c32</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 15 Jun 2025 19:00:03 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/06/24.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I've read the Orca Security report this week showing that 38% of organizations have publicly exposed databases containing sensitive data. It's one of those findings that makes you pause and wonder how we're still dealing with such fundamental security gaps in 2025. The challenge isn't just technical anymore - it's about execution and getting the basics right consistently.</p><p>In this week's brief:</p><ul><li>Apple patched a zero-click Messages vulnerability that was actively exploited to target journalists with spyware</li><li>A major survey reveals that over 93% of organizations lack confidence in securing their AI-driven data, with nearly half having no AI-specific controls</li><li>A seasoned cybersecurity professional with two decades of experience shares their struggle finding remote work despite applying to over 1,000 positions</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Given that we're seeing both sophisticated zero-click attacks and basic database exposures happening simultaneously, what do you think is the bigger threat to most organizations right now - advanced persistent threats or fundamental security hygiene failures?</strong></b><br><br><i><em class="italic" style="white-space: pre-wrap;">I'd love to hear your thoughts. Reply directly to this email or share your thoughts in comments section below.</em></i></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="apple-zero-click-vulnerability-in-messages-app-exploited-to-deploy-paragon-spyware-against-journalists"><a href="https://thehackernews.com/2025/06/apple-zero-click-flaw-in-messages.html?ref=mandos.io">Apple Zero-Click Vulnerability in Messages App Exploited to Deploy Paragon Spyware Against Journalists</a></h3>
<ul>
<li>
<p>Apple patched CVE-2025-43200, a zero-click vulnerability in Messages app that was actively exploited to target Italian journalist Ciro Pellegrino and another European journalist with Paragon's Graphite spyware.</p>
</li>
<li>
<p>The attacks occurred through maliciously crafted photos or videos shared via iCloud Links, requiring no user interaction and making detection extremely difficult for victims.</p>
</li>
<li>
<p>Paragon has terminated its contracts with Italy citing the government's refusal to allow independent verification, while Italian intelligence confirmed limited use of Graphite for national security purposes.</p>
</li>
</ul>
<h3 id="fog-ransomware-uses-unusual-mix-of-legitimate-and-open-source-tools"><a href="https://www.security.com/threat-intelligence/fog-ransomware-attack?ref=mandos.io">Fog Ransomware Uses Unusual Mix of Legitimate and Open-Source Tools</a></h3>
<ul>
<li>
<p>Fog ransomware operators deployed an atypical toolset including <strong>Syteca</strong> employee monitoring software for credential harvesting and <strong>GC2</strong> backdoor that uses Google Sheets for command-and-control communications.</p>
</li>
<li>
<p>The attack targeted a financial institution in Asia using open-source tools like <strong>Stowaway</strong> proxy, <strong>Adapt2x C2</strong>, and <strong>SMBExec</strong> for lateral movement and post-exploitation activities.</p>
</li>
<li>
<p>Researchers noted this unusual combination of legitimate software and open-source pentesting tools helps threat actors evade detection compared to traditional ransomware attack methods.</p>
</li>
</ul>
<h3 id="over-80000-microsoft-entra-id-accounts-targeted-using-open-source-teamfiltration-tool"><a href="https://www.proofpoint.com/us/blog/threat-insight/attackers-unleash-teamfiltration-account-takeover-campaign?ref=mandos.io">Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Tool</a></h3>
<ul>
<li>
<p>Threat actors leveraged the open-source TeamFiltration penetration testing framework to conduct large-scale account takeover attacks against Microsoft Entra ID, affecting over 80,000 user accounts across hundreds of organizations since December 2024.</p>
</li>
<li>
<p>The UNK_SneakyStrike campaign utilized AWS servers across multiple geographic regions (primarily US, Ireland, and Great Britain) to launch coordinated password spraying and user enumeration attacks in concentrated bursts followed by 4-5 day lulls.</p>
</li>
<li>
<p>Successful compromises granted attackers access to Microsoft Teams, OneDrive, Outlook, and other native applications, enabling data exfiltration and persistent access through malicious file uploads to victims' cloud storage.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="prowler-survey-reveals-high-cloud-security-confidence-despite-persistent-challenges"><a href="https://prowler.com/blog/cloud-security-report-2025?ref=mandos.io">Prowler Survey Reveals High Cloud Security Confidence Despite Persistent Challenges</a></h3>
<ul>
<li>
<p>While 96% of security teams report confidence in their cloud security, the 4% who aren't highlight significant concerns around <strong>shadow IT</strong>, inadequate tooling, and high operational costs.</p>
</li>
<li>
<p>Open-source cloud security tools are dominating with 88% adoption, delivering measurable security improvements (86%), enhanced collaboration (83%), and cost savings (80%) through better <strong>visibility</strong>.</p>
</li>
<li>
<p>Organizations using <strong>automation</strong> save 19 hours weekly, yet 37% failed compliance audits last year despite having appropriate frameworks, indicating an execution rather than tooling problem.</p>
</li>
</ul>
<h3 id="orca-security-report-reveals-38-of-organizations-have-publicly-exposed-databases-containing-sensitive-data"><a href="https://drive.google.com/file/d/1Ds0VYpE7nsiXUsOViEC6i9G1mXzws6S2/view?usp=drivesdk&ref=mandos.io">Orca Security Report Reveals 38% of Organizations Have Publicly Exposed Databases Containing Sensitive Data</a></h3>
<ul>
<li>
<p>Multi-cloud adoption has reached 55% of organizations, with each cloud asset containing an average of 115 <strong>vulnerabilities</strong>, creating expanded attack surfaces and increasingly interconnected risks.</p>
</li>
<li>
<p>13% of organizations have a single cloud asset responsible for creating more than 1,000 attack paths, while 76% have at least one public-facing asset that enables <strong>lateral</strong> movement to high-value targets.</p>
</li>
<li>
<p>84% of organizations are now using <strong>AI</strong> in the cloud, with 62% having at least one vulnerable AI package, while 93% have at least one privileged Kubernetes service account, significantly expanding potential attack surfaces.</p>
</li>
</ul>
<h3 id="ciso-rick-bohm-discusses-ai-integration-and-api-security-challenges-in-modern-cybersecurity"><a href="https://lab.wallarm.com/ciso-spotlight-rick-bohm-building-bridges-taming-ai-future-api-security/?ref=mandos.io">CISO Rick Bohm Discusses AI Integration and API Security Challenges in Modern Cybersecurity</a></h3>
<ul>
<li>
<p>Veteran CISO Rick Bohm emphasizes that successful security leaders must bridge the gap between technical teams and business executives through <strong>storytelling</strong> and empathy, treating AI as both an assistant and adversary in cybersecurity operations.</p>
</li>
<li>
<p>Organizations commonly lack visibility into their <strong>API</strong> attack surface, with companies believing they have three APIs when security assessments reveal 300, highlighting the critical need for comprehensive API inventory and security integration.</p>
</li>
<li>
<p>Modern CISOs must combine technical expertise with business acumen, using <strong>incident response</strong> muscle memory and treating cybersecurity education as positive manipulation rather than fear-based compliance enforcement.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-professional-with-advanced-credentials-reports-severe-burnout-despite-industry-success"><a href="https://www.reddit.com/r/cybersecurity/comments/1l8aa3w/3_years_in_cybersecurity_masters_degree_big_name/?ref=mandos.io">Cybersecurity Professional With Advanced Credentials Reports Severe Burnout Despite Industry Success</a></h3>
<ul>
<li>
<p>A cybersecurity professional with 3 years of experience, a Master's degree, and employment at prestigious companies reports significant <strong>burnout</strong> despite having strong paper credentials.</p>
</li>
<li>
<p>The individual describes struggling with unrealistic <strong>expectations</strong> in the workplace, specifically being required to compress multiple days of work into 8-hour shifts while maintaining constant self-improvement.</p>
</li>
<li>
<p>While still expressing interest in cybersecurity work theoretically, the professional questions whether their experience reflects issues specific to their <strong>role</strong> or indicates broader systemic problems within the technology sector.</p>
</li>
</ul>
<h3 id="computer-science-student-inquires-about-value-of-google-cybersecurity-certification"><a href="https://www.reddit.com/r/SecurityCareerAdvice/comments/1l8qcot/is_a_google_certification_in_cybersecurity_worth/?ref=mandos.io">Computer Science Student Inquires About Value Of Google Cybersecurity Certification</a></h3>
<ul>
<li>
<p>A second-year <strong>CompSci</strong> major posted in r/SecurityCareerAdvice seeking guidance on whether Google's cybersecurity certification would be valuable for breaking into the cybersecurity field.</p>
</li>
<li>
<p>The student expressed they are "extremely interested" in cybersecurity and is evaluating this certification as a potential step toward building relevant <strong>credentials</strong> alongside their bachelor's degree.</p>
</li>
<li>
<p>The post has garnered attention from the security career community with 72K members, showing the prevalent interest in <strong>entry-level</strong> pathways into cybersecurity careers among college students.</p>
</li>
</ul>
<h3 id="senior-cybersecurity-professional-with-20-years-experience-struggles-to-find-remote-work"><a href="https://www.reddit.com/r/cybersecurity/comments/1l9pl7z/recommendations_to_transition_out_of_cybersecurity/?ref=mandos.io">Senior Cybersecurity Professional With 20+ Years Experience Struggles To Find Remote Work</a></h3>
<ul>
<li>
<p>A <strong>veteran</strong> cybersecurity professional with over 20 years of experience in defensive security, advanced degrees, and industry certifications (CISSP, CEH) has applied to 1,000+ positions over six months with minimal interview success.</p>
</li>
<li>
<p>Despite strong credentials including a Computer Science BS, Cybersecurity Masters, and network infrastructure background, the individual cites lack of <strong>Cloud</strong> and AI experience as possible barriers to employment.</p>
</li>
<li>
<p>The professional is not experiencing <strong>burnout</strong> but is seeking career transition recommendations after becoming discouraged with the cybersecurity job market despite passion for the field and keeping current with security trends.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisos-evaluate-security-implications-of-emerging-agentic-ai-technology"><a href="https://www.helpnetsecurity.com/2025/06/13/ciso-agentic-ai/?ref=mandos.io">CISOs Evaluate Security Implications of Emerging Agentic AI Technology</a></h3>
<ul>
<li>
<p>Agentic AI systems now account for 15% of IT use cases in cybersecurity, with agents capable of autonomous monitoring, anomaly detection, and incident remediation without human intervention.</p>
</li>
<li>
<p>Multi-agent systems coordinate specialized functions across detection, response, and recovery, offering speed advantages against increasingly complex threats through orchestrated automation.</p>
</li>
<li>
<p>Enterprise adoption faces challenges with legacy data infrastructure, as more than half of organizations struggle with data quality issues that could cause agents to make harmful decisions based on incomplete information.</p>
</li>
</ul>
<h3 id="enterprise-ai-risk-survey-shows-major-governance-gaps"><a href="https://drive.google.com/file/d/1TaYuIwHA9qtISO2k_oZ0cBJRLUhDR5tS/view?usp=drivesdk&ref=mandos.io">Enterprise AI Risk Survey Shows Major Governance Gaps</a></h3>
<ul>
<li>
<p>Survey of 233 security and data leaders reveals 93.2% lack full confidence in securing AI-driven data, with 47.2% having no AI-specific <strong>controls</strong> in place and only 6.4% possessing advanced AI security strategies.</p>
</li>
<li>
<p>AI-powered data <strong>leaks</strong> (69.5%), unstructured data exposure (58.4%), and shadow AI (48.5%) are identified as the top security concerns for 2025, while 80.2% of organizations remain unprepared for AI regulatory <strong>compliance</strong>.</p>
</li>
<li>
<p>Organizational <strong>responsibility</strong> for AI governance is fragmented, with 21.9% reporting no clear ownership, creating significant barriers to implementing effective AI risk management frameworks.</p>
</li>
</ul>
<h3 id="researchers-propose-etdi-framework-to-prevent-tool-poisoning-and-rug-pull-attacks-in-mcp"><a href="https://drive.google.com/file/d/1NwbuxxLtP86PNSVpCuAj3axRo_3vjVps/view?usp=drivesdk&ref=mandos.io">Researchers Propose ETDI Framework to Prevent Tool Poisoning and Rug Pull Attacks in MCP</a></h3>
<ul>
<li>
<p>Researchers introduced the Enhanced Tool Definition Interface (ETDI), a security extension for the Model Context Protocol (MCP) that addresses critical <strong>vulnerabilities</strong> in how Large Language Models interact with external tools.</p>
</li>
<li>
<p>The ETDI framework uses <strong>cryptographic</strong> verification, immutable versioned tool definitions, and explicit permission management to mitigate Tool Poisoning attacks (where malicious tools masquerade as legitimate ones) and Rug Pull attacks (when approved tools are maliciously modified).</p>
</li>
<li>
<p>The paper proposes enhancing ETDI with <strong>OAuth</strong> 2.0 integration and policy-based access control using systems like Cedar or Open Policy Agent to enable fine-grained, context-aware authorization beyond static permissions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="zerorisc-raises-10-million-for-open-source-silicon-security-solutions"><a href="https://www.securityweek.com/zerorisc-raises-10-million-for-open-source-silicon-security-solutions/?ref=mandos.io">ZeroRISC Raises $10 Million for Open Source Silicon Security Solutions</a></h3>
<ul>
<li>
<p>ZeroRISC secured $10 million in seed funding to accelerate adoption of production-grade open source silicon security solutions based on Google's OpenTitan root of trust project.</p>
</li>
<li>
<p>The company's Integrity Management Platform enables organizations to define their own security policies for data centers, industrial control systems, and IoT devices without relying on manufacturers.</p>
</li>
<li>
<p>Founded by former Google OpenTitan team members, ZeroRISC addresses critical silicon supply chain integrity challenges affecting cloud infrastructure and operational technology systems.</p>
</li>
</ul>
<h3 id="eu-invests-%E2%82%AC1455-million-to-strengthen-cybersecurity-across-healthcare-systems"><a href="https://industrialcyber.co/regulation-standards-and-compliance/eu-invests-e145-5-million-to-strengthen-cybersecurity-across-healthcare-systems-and-public-institutions/?ref=mandos.io">EU Invests €145.5 Million To Strengthen Cybersecurity Across Healthcare Systems</a></h3>
<ul>
<li>
<p>The European Commission is allocating €145.5 million through two funding calls to help public administrations and SMEs adopt cybersecurity solutions, with €30 million specifically earmarked for strengthening <strong>ransomware</strong> protection in hospitals and healthcare providers.</p>
</li>
<li>
<p>The first funding call (€55 million) will support pilot projects that develop technical plans and demonstration implementations across member states, helping healthcare institutions comply with the <strong>NIS2</strong> Directive and providing cybersecurity education to staff.</p>
</li>
<li>
<p>The second call (€90.5 million) focuses on advancing <strong>AI</strong> applications in cybersecurity, developing new operational tools, improving privacy-enhancing technologies, and supporting research in <strong>post-quantum</strong> cryptography, with application deadlines set for October 7 and November 12 respectively.</p>
</li>
</ul>
<h3 id="horizon3ai-secures-100m-series-d-funding-for-autonomous-security-platform"><a href="https://financialit.net/news/fundraising-news/horizon3ai-raises-100m-cement-leadership-autonomous-security?ref=mandos.io">Horizon3.ai Secures $100M Series D Funding for Autonomous Security Platform</a></h3>
<ul>
<li>
<p>Horizon3.ai raised $100M in Series D funding led by NEA to expand its NodeZero® <strong>Autonomous</strong> Security Platform, which uses AI to conduct penetration tests with no human involvement.</p>
</li>
<li>
<p>NodeZero demonstrated its effectiveness by compromising a bank in just 4 minutes and accessing sensitive US aircraft carrier design data through a third-party supplier, highlighting critical <strong>vulnerabilities</strong> in even well-protected systems.</p>
</li>
<li>
<p>The company will use funding to expand partner ecosystems across Americas, EMEA, and APAC, enhance product capabilities including web application <strong>pentesting</strong>, and scale federal market presence through NSA's Continuous Autonomous Pentesting program.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="todyl"><a href="https://cybersectools.com/tools/todyl?ref=mandos.io">Todyl</a></h3>
<p>Todyl is a modular cybersecurity platform that consolidates SASE, SIEM, EDR/NGAV, MXDR, and GRC capabilities into a single-agent solution with centralized management.</p>
<h3 id="varonis-data-security-platform"><a href="https://cybersectools.com/tools/varonis-data-security-platform?ref=mandos.io">Varonis Data Security Platform</a></h3>
<p>A unified data security platform that discovers, classifies, monitors, and protects sensitive data across cloud, SaaS, and on-premises environments while ensuring compliance and automating security processes.</p>
<h3 id="osintleak"><a href="https://cybersectools.com/tools/osintleak?ref=mandos.io">OSINTLeak</a></h3>
<p>OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #107: Salesforce Data Breach, CISO Budget Cuts, Unit 42 AI Attacks ]]></title>
        <description><![CDATA[ Palo Alto&#39;s AI executes ransomware in 25 minutes. Fake Cloudflare CAPTCHAs deliver malware while Meta automates security reviews. ]]></description>
        <link>https://mandos.io/newsletter/brief-107-salesforce-data-breach-ciso-budget-cuts-unit-42-ai-attacks/</link>
        <guid isPermaLink="false">68440976acf07d00018ed440</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 08 Jun 2025 17:00:03 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/06/23.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I've been thinking about the paradox many of us face - while CISOs are finally getting the executive recognition we've fought for years to achieve, our budgets keep shrinking. It's like being promoted to captain of a ship while being handed a smaller crew and less fuel. The data showing cybersecurity budgets dropping from 1.1% to 0.6% of revenue really hits home for anyone trying to defend their organization.</p><p>In this week's brief:</p><ul><li>How recent layoffs are creating unexpected security backdoors through dormant accounts and insider threats</li><li>Research showing AI can now execute complete ransomware attacks 100x faster than traditional methods</li><li>Why CISOs are gaining executive status but losing budget battles, and what successful leaders are doing differently</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Did your security budget also shrink? How are you handling this?</strong></b><br><br><i><em class="italic" style="white-space: pre-wrap;">I'd love to hear your thoughts. Reply directly to this email or share your thoughts in comments section below.</em></i></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="layoffs-create-cybersecurity-vulnerabilities-through-dormant-accounts-and-disgruntled-employees"><a href="https://www.darkreading.com/cybersecurity-operations/prep-layoffs-before-compromise-security?ref=mandos.io">Layoffs Create Cybersecurity Vulnerabilities Through Dormant Accounts And Disgruntled Employees</a></h3>
<ul>
<li>
<p>Mass layoffs leave behind <strong>dormant</strong> accounts that can become backdoors for attackers, with CrowdStrike reporting a 50% year-over-year increase in access broker advertisements promoting these credentials as entry points into enterprises.</p>
</li>
<li>
<p>Disgruntled employees pose serious <strong>insider</strong> threats, with 1 in 20 employees admitting to engaging in rage deletion before leaving, and younger workers twice as likely to do so according to CrashPlan research.</p>
</li>
<li>
<p>Organizations should implement proactive measures including zero-trust network access, <strong>automation</strong> of credential decommissioning, and establishing clear communication channels between HR and IT to quickly disable access when layoffs occur.</p>
</li>
</ul>
<h3 id="new-phishing-campaign-hijacks-clipboard-via-fake-captcha-for-malware-delivery"><a href="https://www.csoonline.com/article/4003056/new-phishing-campaign-hijacks-clipboard-via-fake-captcha-for-malware-delivery.html?ref=mandos.io">New Phishing Campaign Hijacks Clipboard Via Fake CAPTCHA For Malware Delivery</a></h3>
<ul>
<li>
<p>Attackers are cloning Cloudflare Turnstile interfaces to trick users into executing hidden <strong>PowerShell</strong> commands through clipboard manipulation, requiring no file downloads and exploiting users' verification fatigue.</p>
</li>
<li>
<p>The ClickFix campaign delivers various payloads including information stealers like Lumma and Stealc, as well as <strong>RATs</strong> such as NetSupport Manager designed for complete system compromise.</p>
</li>
<li>
<p>This technique has been adopted by nation-state <strong>threat actors</strong> including North Korea's Kimsuky group, Iran's MuddyWater, and Russia's APT28, with traditional endpoint protection solutions often missing these browser-based attacks.</p>
</li>
</ul>
<h3 id="hackers-steal-salesforce-data-through-vishing-campaign"><a href="https://cloud.google.com/blog/topics/threat-intelligence/technical-analysis-vishing-threats?hl=en&ref=mandos.io">Hackers Steal Salesforce Data Through Vishing Campaign</a></h3>
<ul>
<li>
<p>Threat group UNC6040 is targeting Salesforce users across hospitality, retail, and education sectors through <strong>vishing</strong> attacks where they impersonate IT support staff and convince victims to install a modified version of Salesforce Data Loader.</p>
</li>
<li>
<p>The attackers exploit Salesforce's OAuth-based "Connected Apps" feature to gain access to victim data, then move <strong>laterally</strong> through the infrastructure to target additional cloud services including Okta and Microsoft 365.</p>
</li>
<li>
<p>Google Threat Intelligence Group (GTIG) believes UNC6040 has partnered with another threat actor to <strong>monetize</strong> the stolen data through extortion attempts, which sometimes occur months after the initial breach.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ciso-stature-rises-but-security-budgets-remain-tight"><a href="https://www.darkreading.com/cybersecurity-operations/ciso-stature-rises-budgets-tight?ref=mandos.io">CISO Stature Rises, but Security Budgets Remain Tight</a></h3>
<ul>
<li>
<p>While CISOs at large US companies earn an average <strong>compensation</strong> of $532,000 and increasingly gain executive status, cybersecurity budgets have decreased from 1.1% to 0.6% of annual revenue over the past two years.</p>
</li>
<li>
<p>59% of CISOs report they are not consulted or consulted too late during strategic <strong>business</strong> decisions, despite their expanded responsibilities now often including risk assessment, product security, and digital strategy.</p>
</li>
<li>
<p>Effective CISOs are shifting from positioning security as a cost center to demonstrating its role in value creation, with initiatives involving cybersecurity teams resulting in a median value of $36 million across surveyed <strong>organizations</strong>.</p>
</li>
</ul>
<h3 id="ai-agents-emerge-as-critical-security-threat-with-80-of-organizations-reporting-unauthorized-actions"><a href="https://drive.google.com/file/d/1b7jGrVYxlgZSelsGx3n4BHvpWnb3TveZ/view?usp=drivesdk&ref=mandos.io">AI Agents Emerge As Critical Security Threat With 80% Of Organizations Reporting Unauthorized Actions</a></h3>
<ul>
<li>
<p>SailPoint research reveals 82% of companies now use AI agents with 53% accessing <strong>sensitive</strong> data daily, yet only 44% have implemented governance policies despite 96% of professionals identifying them as security threats.</p>
</li>
<li>
<p>AI agents have performed unintended actions in 80% of organizations, including accessing unauthorized systems (39%), handling sensitive data inappropriately (33%), and being <strong>coerced</strong> into revealing access credentials (23%).</p>
</li>
<li>
<p>Unlike traditional identities, AI agents typically require multiple <strong>credentials</strong> with broader system access (54%), are provisioned faster with less oversight, and 98% of organizations plan to deploy new AI agent solutions within the next year despite the <strong>risks</strong>.</p>
</li>
</ul>
<h3 id="state-and-local-cybersecurity-rising-threats-meet-federal-support-cuts"><a href="https://drive.google.com/file/d/1nT2vddkl_50LHumx_p2k6rLOsWOthBrO/view?usp=drivesdk&ref=mandos.io">State and Local Cybersecurity: Rising Threats Meet Federal Support Cuts</a></h3>
<ul>
<li>
<p>State and local government entities face a 51% increase in <strong>ransomware</strong> attacks and a 148% surge in malware incidents, with average ransom demands reaching $872,656 per attack and total costs often exceeding $1 million.</p>
</li>
<li>
<p>More than 80% of State, Local, Tribal, and Territorial (SLTT) organizations operate with fewer than five dedicated <strong>cybersecurity</strong> employees, leaving critical infrastructure vulnerable to increasingly sophisticated threats from both criminal groups and nation-states.</p>
</li>
<li>
<p>Recent federal <strong>CISA</strong> cuts have eliminated $10 million in funding for the Multi-State Information Sharing and Analysis Center (MS-ISAC), leaving municipalities to defend against attacks without vital threat intelligence and support systems.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ciso-stature-rises-but-security-budgets-remain-tight"><a href="https://www.darkreading.com/cybersecurity-operations/ciso-stature-rises-budgets-tight?ref=mandos.io">CISO Stature Rises, but Security Budgets Remain Tight</a></h3>
<ul>
<li>
<p>While CISOs at large US companies earn an average <strong>compensation</strong> of $532,000 and increasingly gain executive status, cybersecurity budgets have decreased from 1.1% to 0.6% of annual revenue over the past two years.</p>
</li>
<li>
<p>59% of CISOs report they are not consulted or consulted too late during strategic <strong>business</strong> decisions, despite their expanded responsibilities now often including risk assessment, product security, and digital strategy.</p>
</li>
<li>
<p>Effective CISOs are shifting from positioning security as a cost center to demonstrating its role in value creation, with initiatives involving cybersecurity teams resulting in a median value of $36 million across surveyed <strong>organizations</strong>.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-share-strategies-for-maintaining-skills-in-a-fast-moving-field"><a href="https://www.reddit.com/r/cybersecurity/comments/1l444lm/how_do_you_keep_your_skills_sharp_in_such_a/?ref=mandos.io">Cybersecurity Professionals Share Strategies for Maintaining Skills in a Fast-Moving Field</a></h3>
<ul>
<li>
<p>Cybersecurity experts recommend focusing on <strong>work-life balance</strong> by dedicating specific time during work hours for learning, which prevents burnout in a field that can demand 24/7/365 attention.</p>
</li>
<li>
<p>Many professionals advise following a targeted approach to learning, focusing on areas that align with personal interests or career directions rather than trying to master the entire <strong>cybersecurity</strong> field.</p>
</li>
<li>
<p>Strategic prioritization methods like the <strong>Eisenhower Matrix</strong> help professionals decide what to learn, while understanding fundamental concepts makes it easier to adapt to new <strong>vulnerabilities</strong> as they emerge.</p>
</li>
</ul>
<h3 id="network-engineers-can-successfully-transition-to-cybersecurity-roles-with-existing-skills"><a href="https://www.reddit.com/r/SecurityCareerAdvice/comments/1l2hu62/network_engineer_to_cybersecurity_feasibility_and/?ref=mandos.io">Network Engineers Can Successfully Transition To Cybersecurity Roles With Existing Skills</a></h3>
<ul>
<li>
<p>Network engineers typically make excellent <strong>firewall</strong> engineers, with many able to skip SOC analyst roles and move directly into security admin or engineering positions.</p>
</li>
<li>
<p>Professionals with networking backgrounds are valued in security because they understand the "front door" to systems, with some reaching <strong>CISO</strong> roles after transitioning from network/system engineering.</p>
</li>
<li>
<p>Rather than bootcamps (which industry pros generally consider scams), focus on targeted certifications like CompTIA Security+, vendor-specific <strong>certifications</strong> (Palo Alto, Fortinet), and developing scripting skills in Python, PowerShell, and Bash.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="unit-42-develops-agentic-ai-attack-framework-that-accelerates-cyberattacks-100x"><a href="https://www.paloaltonetworks.com/blog/2025/05/unit-42-develops-agentic-ai-attack-framework/?ref=mandos.io">Unit 42 Develops Agentic AI Attack Framework That Accelerates Cyberattacks 100x</a></h3>
<ul>
<li>
<p>Palo Alto Networks' Unit 42 simulated a complete <strong>ransomware</strong> attack in just 25 minutes using AI agents across every stage of the attack chain – a 100x increase in speed compared to traditional attacks.</p>
</li>
<li>
<p>The research demonstrates how <strong>autonomous</strong> AI systems can make decisions without human intervention, executing adaptive multi-step operations that constantly self-prompt to overcome obstacles during attacks.</p>
</li>
<li>
<p>Unit 42 created purpose-built AI agents for each attack stage (reconnaissance, initial access, execution, persistence, defense evasion, discovery, and exfiltration) that will be integrated into their <strong>purple teaming</strong> exercises to help organizations test defenses.</p>
</li>
</ul>
<h3 id="meta-to-replace-human-risk-assessors-with-ai-for-product-safety-evaluation"><a href="https://mashable.com/article/meta-ai-replacing-humans-risk-assessment?ref=mandos.io">Meta To Replace Human Risk Assessors With AI For Product Safety Evaluation</a></h3>
<ul>
<li>
<p>According to internal documents reviewed by NPR, Meta is planning to <strong>automate</strong> 90% of its privacy and integrity reviews using AI, moving beyond the previously stated scope of only "low-risk" releases.</p>
</li>
<li>
<p>The new system will use AI to make decisions on <strong>safety</strong> features, youth risk, and integrity (including misinformation and violent content moderation), with product teams submitting questionnaires and receiving instant risk decisions.</p>
</li>
<li>
<p>While the automation may speed up app updates in line with Meta's <strong>efficiency</strong> goals, insiders warn it could pose greater risks to billions of users, including unnecessary threats to data <strong>privacy</strong>.</p>
</li>
</ul>
<h3 id="shadow-ai-adoption-poses-data-security-risks-despite-blocking-efforts"><a href="https://thehackernews.com/2025/06/empower-users-and-protect-against-genai.html?ref=mandos.io">Shadow AI Adoption Poses Data Security Risks Despite Blocking Efforts</a></h3>
<ul>
<li>
<p>Zscaler ThreatLabz reports a 36x increase in AI and ML traffic across enterprises in 2024, identifying over 800 different AI applications in use despite organizational <strong>blocking</strong> attempts.</p>
</li>
<li>
<p>Employees are circumventing restrictions through <strong>workarounds</strong> like emailing files to personal accounts or using personal devices, creating a growing "Shadow AI" blind spot that puts sensitive data at risk.</p>
</li>
<li>
<p>Rather than simply blocking access, organizations should implement context-aware, <strong>policy-driven</strong> governance with data loss prevention tools – Zscaler detected over 4 million DLP violations where sensitive enterprise data was prevented from being sent to AI applications.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="zero-networks-raises-55-million-for-microsegmentation-solution"><a href="https://www.securityweek.com/zero-networks-raises-55-million-for-microsegmentation-solution/?ref=mandos.io">Zero Networks Raises $55 Million For Microsegmentation Solution</a></h3>
<ul>
<li>
<p>Israeli firm Zero Networks has secured $55 million in Series C funding led by Highland Europe, bringing its total funding to over $100 million for its <strong>agentless</strong> microsegmentation solution that prevents lateral movement after initial compromise.</p>
</li>
<li>
<p>The company's unified platform combines Zero Trust Network Access (ZTNA) and Identity Least Privilege solutions to enforce least privilege access across devices, users, and workloads while dividing enterprise environments into isolated <strong>micro-segments</strong>.</p>
</li>
<li>
<p>With offices in Tel Aviv and Orlando, Zero Networks will use the funding to expand R&amp;D, sales, marketing, and customer support teams, while investing in <strong>go-to-market</strong> strategies across North America, EMEA, and APAC regions.</p>
</li>
</ul>
<h3 id="mind-raises-30-million-for-data-loss-prevention-platform"><a href="https://www.securityweek.com/mind-raises-30-million-for-data-loss-prevention-platform/?ref=mandos.io">MIND Raises $30 Million for Data Loss Prevention Platform</a></h3>
<ul>
<li>
<p>Seattle-based MIND has secured $30 million in Series A funding led by Paladin Capital Group and Crosspoint Capital Partners, bringing their total funding to $41 million since their founding in 2023.</p>
</li>
<li>
<p>The company's DLP platform combines <strong>AI</strong> and smart automations to provide real-time detection capabilities that instantly block <strong>exfiltration</strong> attempts across endpoints, email, SaaS, gen-AI applications, and on-premises systems.</p>
</li>
<li>
<p>MIND's platform is already being used by numerous <strong>Fortune</strong> 1000 organizations and has prevented data losses across hundreds of thousands of <strong>endpoints</strong>, with the new funding aimed at expanding R&amp;D and go-to-market teams.</p>
</li>
</ul>
<h3 id="cellebrite-acquires-corellium-for-200-million-in-controversial-merger"><a href="https://www.securityweek.com/controversial-firms-cellebrite-and-corellium-announce-200-million-acquisition-deal/?ref=mandos.io">Cellebrite Acquires Corellium For $200 Million In Controversial Merger</a></h3>
<ul>
<li>
<p>Israel-based Cellebrite has agreed to acquire US-based Corellium for $170 million in cash, with $20 million converted to equity at closing and up to $30 million in additional <strong>performance</strong>-based payments over two years.</p>
</li>
<li>
<p>The merger combines Cellebrite's forensic investigation tools with Corellium's device <strong>virtualization</strong> solutions to enhance capabilities for vulnerability identification, virtual device interaction, and mobile penetration testing.</p>
</li>
<li>
<p>Both companies have controversial histories – Cellebrite's tools have been linked to <strong>spyware</strong> campaigns exploiting zero-days, while Corellium was previously sued by Apple for iOS copyright infringement and has connections to <strong>NSO Group</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="levoai"><a href="https://cybersectools.com/tools/levoai?ref=mandos.io">Levo.ai</a></h3>
<p>An API security platform that provides automated discovery, documentation, and continuous security testing throughout the API lifecycle.</p>
<h3 id="panorays"><a href="https://cybersectools.com/tools/panorays?ref=mandos.io">Panorays</a></h3>
<p>Panorays is a third-party cyber risk management platform that combines external attack surface monitoring with automated security questionnaires to assess, remediate, and continuously monitor vendor security postures.</p>
<h3 id="check-point-cloudguard"><a href="https://cybersectools.com/tools/check-point-cloudguard?ref=mandos.io">Check Point CloudGuard</a></h3>
<p>A comprehensive cloud security platform that provides threat prevention, posture management, and risk prioritization across cloud applications, networks, and workloads.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #106: GitHub AI Exploit, TikTok Malware Campaign, Zscaler Acquires Red Canary ]]></title>
        <description><![CDATA[ GitHub MCP exploit allows AI agent data exfiltration. DoD operates 50+ software factories delivering rapid deployment. CISOs earn $532K average compensation. ]]></description>
        <link>https://mandos.io/newsletter/brief-106-github-ai-exploit-tiktok-malware-campaign-zscaler-acquires-red-canary/</link>
        <guid isPermaLink="false">683a9bf4e823ba0001016b85</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 01 Jun 2025 18:00:18 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/05/22.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>The DoD's first DevSecOps report caught my eye this week - seeing 50+ software factories delivering code to production shows real momentum in modernizing government security practices, even as many orgs face tightening budgets.</p><p>In this week's brief:</p><ul><li>A concerning GitHub MCP vulnerability allowing attackers to exfiltrate data from private repositories</li><li>New research showing multi-layered defenses can stop 99% of prompt injection attacks</li><li>Insights on how SOC roles are evolving toward advanced skills rather than facing AI displacement</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Question of the week:</strong></b> <br>For those using AI agents in your security workflows, have you implemented specific guardrails against prompt injection attacks? What's working best?</div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="github-mcp-vulnerability-allows-data-exfiltration-from-private-repositories"><a href="https://invariantlabs.ai/blog/mcp-github-vulnerability?ref=mandos.io">GitHub MCP Vulnerability Allows Data Exfiltration From Private Repositories</a></h3>
<ul>
<li>
<p>Invariant discovered a critical <strong>vulnerability</strong> in GitHub MCP integration where attackers can create malicious issues on public repositories that when viewed by a user's AI agent can coerce it into leaking data from private repositories through a <strong>toxic agent flow</strong> attack.</p>
</li>
<li>
<p>The attack succeeds even with modern AI models like Claude 4 Opus, as the <strong>exfiltration</strong> occurs when users view issues with their agent, which then creates pull requests containing the stolen private data in public repositories accessible to attackers.</p>
</li>
<li>
<p>Researchers recommend implementing granular permission controls limiting agents to accessing only one repository per session and deploying continuous <strong>monitoring</strong> solutions like Invariant's MCP-scan to detect potential security violations in real-time.</p>
</li>
</ul>
<h3 id="tiktok-videos-distribute-infostealer-malware-through-clickfix-attacks"><a href="https://www.bleepingcomputer.com/news/security/tiktok-videos-now-push-infostealer-malware-in-clickfix-attacks/?ref=mandos.io">TikTok Videos Distribute Infostealer Malware Through ClickFix Attacks</a></h3>
<ul>
<li>
<p>Cybercriminals are using AI-generated TikTok videos to trick viewers into running PowerShell commands that install <strong>Vidar</strong> and <strong>StealC</strong> information-stealing malware, with one video reaching nearly 500,000 views.</p>
</li>
<li>
<p>The videos masquerade as tutorials for activating premium features in legitimate software like Spotify and CapCut, but actually execute scripts that download malware capable of stealing credentials, credit cards, cookies, cryptocurrency wallets, and 2FA authenticator databases.</p>
</li>
<li>
<p>This campaign represents an evolution of the <strong>ClickFix</strong> social engineering tactic that has previously targeted Windows, macOS, and Linux users, and has also been adopted by state-sponsored threat groups from Russia, North Korea, and Iran.</p>
</li>
</ul>
<h3 id="chinese-threat-actor-vicioustrap-turns-5500-edge-devices-into-honeypot-network"><a href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/?ref=mandos.io">Chinese Threat Actor "ViciousTrap" Turns 5,500+ Edge Devices Into Honeypot Network</a></h3>
<ul>
<li>
<p>Sekoia.io researchers discovered a threat actor compromising over 5,500 <strong>edge devices</strong> across 84 countries, transforming them into a distributed honeypot-like network using a malicious script called <strong>NetGhost</strong>.</p>
</li>
<li>
<p>The attacker targets vulnerable equipment from 60+ manufacturers including <strong>SOHO routers</strong>, SSL VPNs, and enterprise-grade controllers, exploiting CVE-2023-20118 in Cisco devices and other vulnerabilities to intercept network traffic and collect <strong>exploitation attempts</strong>.</p>
</li>
<li>
<p>Evidence suggests a <strong>Chinese-speaking</strong> origin, with primary infrastructure hosted in Malaysia (Shinjiru AS45839) and targeting predominantly focused on devices in Taiwan and the United States while avoiding China.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="dod-released-first-ever-state-of-devsecops-report-highlighting-modernization-progress"><a href="https://drive.google.com/file/d/1HXMSG1TwYZIeVhZu-eMAzbyHSUcTH2fz/view?usp=drivesdk&ref=mandos.io">DoD Released First-Ever State of DevSecOps Report Highlighting Modernization Progress</a></h3>
<ul>
<li>
<p>DoD has made significant progress in <strong>DevSecOps</strong> adoption with over 50 software factories delivering code into production, and approximately 78 acquisition programs using the Software Acquisition Pathway, with 75% delivering software in less than six months.</p>
</li>
<li>
<p>The report identifies several key themes including how software factories serve as DoD's "Digital Arsenal," the need for continuous Authority to Operate (cATO), and the critical importance of developing a skilled <strong>workforce</strong> to support modernization efforts.</p>
</li>
<li>
<p>Software factories emerged organically across DoD and fall into distinct categories including Mission-Critical, Training and Education, Infrastructure as Code/CI/CD pipelines, and Innovation Pipelines—each with unique cultural attributes aligned to their specific missions.</p>
</li>
</ul>
<h3 id="ciso-compensation-rises-while-security-budgets-remain-constrained"><a href="https://www.darkreading.com/cybersecurity-operations/ciso-stature-rises-budgets-tight?ref=mandos.io">CISO Compensation Rises While Security Budgets Remain Constrained</a></h3>
<ul>
<li>
<p>CISOs at large US companies now earn an average of $532,000 in total compensation, with increasing <strong>responsibilities</strong> including business risk assessment and digital strategy, though salary growth has slowed compared to COVID-era gains.</p>
</li>
<li>
<p>Cybersecurity budgets have decreased from 1.1% to 0.6% of annual revenue according to EY, with IANS reporting even lower figures at 0.35% of revenue, creating challenges for security leaders despite their elevated status.</p>
</li>
<li>
<p>59% of CISOs report not being consulted or being consulted too late during strategic business decisions, highlighting the need to better demonstrate security's value beyond risk <strong>mitigation</strong> and connect cybersecurity to enterprise-wide <strong>growth</strong> initiatives.</p>
</li>
</ul>
<h3 id="pentera-survey-reveals-gaps-in-exposure-management-despite-maturing-practices"><a href="https://pentera.io/resources/reports/global-state-of-pentesting-2025-survey-report/?ref=mandos.io">Pentera Survey Reveals Gaps in Exposure Management Despite Maturing Practices</a></h3>
<ul>
<li>
<p>Pentera's 2025 State of Pentesting report surveyed 500 CISOs globally, finding that web-facing assets are perceived as most <strong>vulnerable</strong> (45%), tested the most (57%), and breached most frequently (30%).</p>
</li>
<li>
<p>While 67% of enterprises reported a breach in the past two years, only 36% faced downtime and 30% suffered data <strong>exposure</strong>, highlighting that not all breaches have operational consequences.</p>
</li>
<li>
<p>APIs show a concerning gap between perception and reality with a 21% <strong>breach</strong> rate despite similar testing rates to internal networks (48%), suggesting current testing approaches may be insufficient for these complex systems.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-career-trends-soc-roles-evolving-toward-advanced-skills-rather-than-facing-ai-displacement"><a href="https://www.reddit.com/r/SecurityCareerAdvice/s/XDaG6wRjyU?ref=mandos.io">Cybersecurity Career Trends: SOC Roles Evolving Toward Advanced Skills Rather Than Facing AI Displacement</a></h3>
<ul>
<li>
<p>Cybersecurity is returning to its roots as a mid-to-senior level career path, with the days of entry-level professionals getting certifications and high salaries without continued learning coming to an end. The field demands constant <strong>automation</strong> skills development.</p>
</li>
<li>
<p>The primary threat to SOC positions isn't AI but <strong>offshoring</strong> to lower-cost countries, with companies increasingly hiring technical staff from regions like the Philippines and Mexico instead of local talent.</p>
</li>
<li>
<p>Success in cybersecurity requires broad technical knowledge spanning LDAP, firewalls, networking, servers, databases, and proxies - professionals must understand multiple domains rather than specializing too narrowly in a single area.</p>
</li>
</ul>
<h3 id="grc-vs-soc-it-professional-weighs-career-path-options-for-technical-growth"><a href="https://www.reddit.com/r/cybersecurity/s/vriSHFg3lA?ref=mandos.io">GRC vs SOC: IT Professional Weighs Career Path Options for Technical Growth</a></h3>
<ul>
<li>
<p>A cybersecurity professional with 2 years of GRC experience and a law/compliance background is considering an offer to move to a <strong>SOC</strong> role to gain technical skills, despite having no operational security experience.</p>
</li>
<li>
<p>Industry professionals warn that SOC roles often lead to <strong>burnout</strong> due to on-call requirements, while GRC positions typically offer better work-life balance and potentially faster career advancement opportunities.</p>
</li>
<li>
<p>Several respondents noted that early career professionals (under 2 years) may benefit from diverse experiences, but cautioned that the entry-level SOC work can be <strong>mundane</strong> (alert triage, artifact collection, report writing) and potentially represent a backward career move.</p>
</li>
</ul>
<h3 id="ethical-hackers-reach-millionaire-status-through-bug-bounty-programs"><a href="https://www.darkreading.com/remote-workforce/hacker-millionaire-class-built?ref=mandos.io">Ethical Hackers Reach Millionaire Status Through Bug Bounty Programs</a></h3>
<ul>
<li>
<p>HackerOne has created 50 millionaires over the past six years through its bug <strong>bounty</strong> platform, marking a cultural shift that transformed ethical hacking from a fringe activity to a financially viable profession.</p>
</li>
<li>
<p>Major corporations including Google, OpenAI, and Salesforce have embraced bug bounty programs, with Google paying $12 million in 2024 and OpenAI increasing its top reward to $100,000, creating opportunities for hackers from <strong>diverse</strong> backgrounds.</p>
</li>
<li>
<p>Success stories like Nieko "Specters" Rivera, who went from homelessness to house hunting through bug bounties, demonstrate how the <strong>inclusive</strong> nature of ethical hacking provides career paths regardless of formal education or traditional credentials.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="pangea-research-99-of-prompt-injection-attacks-stopped-with-multi-layered-defenses"><a href="https://drive.google.com/file/d/17WBwnOr1Fa9r5Kf5LHpoQDRKu8rnpgrT/view?usp=drivesdk&ref=mandos.io">Pangea Research: 99% of Prompt Injection Attacks Stopped With Multi-Layered Defenses</a></h3>
<ul>
<li>
<p>Pangea's global AI prompt injection challenge analyzed 330,000 <strong>attacks</strong> across 30 days, revealing that 99% of attempts failed when using a defense-in-depth approach combining system prompts, content inspection, and active prompt injection detection.</p>
</li>
<li>
<p>System prompt guardrails alone proved insufficient with a 19% room escape rate, but adding content inspection reduced successful attacks by an order of magnitude, and further adding behavioral detection reduced success to just 0.003%.</p>
</li>
<li>
<p>Even single-token prompts like ".uuid" could bypass defenses, demonstrating that <strong>non-deterministic</strong> responses from LLMs make prompt injection particularly challenging to prevent consistently.</p>
</li>
</ul>
<h3 id="mit-researchers-propose-new-zero-trust-identity-framework-for-ai-agents"><a href="https://drive.google.com/file/d/1FsRbp9fEAr5nnOdH-j5FtAOMt7cSzAvd/view?usp=drivesdk&ref=mandos.io">MIT Researchers Propose New Zero-Trust Identity Framework for AI Agents</a></h3>
<ul>
<li>
<p>A team of researchers from MIT, Cloud Security Alliance, and other institutions have published research proposing a novel framework for <strong>authentication</strong> and <strong>access control</strong> in multi-agent AI systems, citing current IAM protocols like OAuth and SAML as fundamentally inadequate for autonomous AI agents.</p>
</li>
<li>
<p>The proposed framework leverages Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) to create rich, verifiable Agent IDs that encapsulate an agent's capabilities, provenance, and security posture – enabling fine-grained, context-aware authorization across heterogeneous agent communication protocols.</p>
</li>
<li>
<p>The architecture includes an Agent Naming Service (ANS) for capability-aware discovery and a unified global session management layer for consistent policy enforcement and rapid <strong>revocation</strong> across all agent sessions – crucial for containing compromised agents in zero-trust environments.</p>
</li>
</ul>
<h3 id="ai-agents-vs-agentic-ai-taxonomy-applications-and-security-implications"><a href="https://drive.google.com/file/d/1iN2eRZRdhKCta6VitGrPvXiL6KnUf6gZ/view?usp=drivesdk&ref=mandos.io">AI Agents vs. Agentic AI: Taxonomy, Applications and Security Implications</a></h3>
<ul>
<li>
<p>This academic paper distinguishes between AI Agents (modular systems driven by LLMs for narrow, task-specific automation) and Agentic AI (multi-agent systems with <strong>collaboration</strong>, dynamic task decomposition, and persistent memory for complex workflows).</p>
</li>
<li>
<p>Applications of AI Agents include customer support, email filtering, and scheduling, while Agentic AI enables more sophisticated use cases such as research automation, robotic coordination, and <strong>healthcare</strong> decision support systems.</p>
</li>
<li>
<p>Key security challenges include <strong>hallucination</strong> in AI Agents and more complex issues in Agentic AI like inter-agent error propagation, emergent behavior unpredictability, and <strong>vulnerabilities</strong> in multi-agent coordination.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="zscaler-to-acquire-red-canary-expanding-mdr-capabilities"><a href="https://www.darkreading.com/threat-intelligence/zscaler-announces-deal-acquire-red-canary?ref=mandos.io">Zscaler To Acquire Red Canary, Expanding MDR Capabilities</a></h3>
<ul>
<li>
<p>Cloud security company Zscaler plans to acquire managed detection and response specialist Red Canary in a deal expected to close in August, combining Zscaler's zero-trust cloud with Red Canary's 24/7 threat <strong>monitoring</strong> capabilities.</p>
</li>
<li>
<p>Red Canary's SOAR platform will continue to integrate with its existing 200+ technology partners including CrowdStrike, Microsoft, and SentinelOne, while gaining access to Zscaler's 500 billion daily <strong>transactions</strong> from its secure web gateway services.</p>
</li>
<li>
<p>This acquisition represents a "natural expansion" of Zscaler's recent moves into MDR and threat intelligence, following their $350 million <strong>acquisition</strong> of risk management platform Avalor last year.</p>
</li>
</ul>
<h3 id="tenable-to-acquire-ai-security-startup-apex-to-enhance-ungoverned-ai-detection"><a href="https://www.darkreading.com/cyber-risk/tenable-acquire-ai-security-apex?ref=mandos.io">Tenable to Acquire AI Security Startup Apex to Enhance Ungoverned AI Detection</a></h3>
<ul>
<li>
<p>Tenable is acquiring Israel-based Apex to integrate with its Tenable One platform, enhancing its AI Aware tool by providing capabilities to <strong>mitigate</strong> threats from ungoverned AI applications and enforce existing security policies.</p>
</li>
<li>
<p>Research from Tenable found that over one-third of security teams had <strong>unsanctioned</strong> AI applications in their environments, highlighting the need for better governance as organizations rapidly adopt AI tools while overlooking potential risks.</p>
</li>
<li>
<p>This acquisition marks Tenable's second in 2025 following Vulcan Cyber, continuing its <strong>expansion</strong> strategy that has included six acquisitions in the past three years including Eureka (data security posture management) and Ermetic (CNAPP).</p>
</li>
</ul>
<h3 id="breachrx-secures-15m-to-scale-incident-response-platform"><a href="https://siliconangle.com/2025/05/19/breachrx-raises-15m-expand-intelligent-incident-response-platform/?ref=mandos.io">BreachRx Secures $15M to Scale Incident Response Platform</a></h3>
<ul>
<li>
<p>Incident response startup BreachRx has raised $15 million in Series A funding led by Ballistic Ventures to expand its go-to-market and <strong>engineering</strong> teams.</p>
</li>
<li>
<p>The platform offers a centralized workspace for security, legal, compliance, and communications teams, automating <strong>response</strong> plans and defining clear roles and responsibilities during an incident.</p>
</li>
<li>
<p>BreachRx recently launched Rex <strong>AI</strong>, a generative artificial intelligence engine that streamlines incident response by providing real-time recommendations and automating administrative tasks.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="phantom-threat-inteliigence"><a href="https://cybersectools.com/tools/phantom-threat-inteliigence?ref=mandos.io">Phantom Threat Inteliigence</a></h3>
<p>A threat intelligence platform that collects, analyzes, and operationalizes threat data from multiple sources to help organizations identify and respond to security threats</p>
<h3 id="apisec"><a href="https://cybersectools.com/tools/apisec?ref=mandos.io">APISec</a></h3>
<p>An automated API security testing platform that provides continuous vulnerability assessment, validation, and educational resources for API endpoint security.</p>
<h3 id="equixly-api-security-platform"><a href="https://cybersectools.com/tools/equixly-api-security-platform?ref=mandos.io">Equixly API Security Platform</a></h3>
<p>An AI-powered API security testing platform that performs continuous vulnerability assessment, attack surface mapping, and compliance monitoring of API endpoints.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #105: npm Package Attacks, Cybersecurity Offshoring Trend, AWS Strands Agents ]]></title>
        <description><![CDATA[ Socket discovers 60 malicious npm packages exfiltrating network data. Meta releases open-source LlamaFirewall to protect AI agents. FBI reports record $16.6B in cybercrime losses. ]]></description>
        <link>https://mandos.io/newsletter/brief-105-npm-package-attacks-cybersecurity-offshoring-trend-aws-strands-agents/</link>
        <guid isPermaLink="false">683220022d8c8100014b4c8e</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 25 May 2025 17:00:38 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/05/21.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>The FBI's latest IC3 report caught my eye, showing a 33% jump in cybercrime losses to $16.6 billion is sobering - especially seeing investment fraud taking the top spot. Human psychology is still one of the major target points.</p><p>In this week's brief:</p><ul><li>60 malicious npm packages discovered exfiltrating network data through Discord webhooks</li><li>Third-party involvement in data breaches has doubled to 30% according to Verizon's DBIR</li><li>Companies are increasingly offshoring cybersecurity roles while expecting remaining staff to "do more with less"</li></ul><p>What's your take - are we approaching a breaking point where security teams simply can't keep up with both traditional threats and new AI-powered attacks using current staffing models? Let me know in comments or by replying to this email.</p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="threat-actor-claims-12-billion-facebook-records-for-sale-with-suspicious-inconsistencies"><a href="https://hackread.com/threat-actor-selling-1-2-billion-facebook-records/?ref=mandos.io">Threat Actor Claims 1.2 Billion Facebook Records For Sale With Suspicious Inconsistencies</a></h3>
<ul>
<li>
<p>Threat actor "ByteBreaker" claims to have <strong>scraped</strong> 1.2 billion Facebook records by abusing an API, offering sensitive data including full names, email addresses, phone numbers, and location information.</p>
</li>
<li>
<p>Multiple <strong>inconsistencies</strong> in the listing raise doubts about its legitimacy - including mismatched record counts (claims of 1.2B records but sample data showing "Total Rows are 200 million") and conflicting Telegram contact information.</p>
</li>
<li>
<p>Despite questionable claims, <strong>API</strong> abuse remains a serious threat vector that has affected numerous platforms including LinkedIn, Chess.com, and Trello - requiring organizations to continuously monitor for unusual activity.</p>
</li>
</ul>
<h3 id="60-malicious-npm-packages-leak-network-and-host-data-in-active-campaign"><a href="https://socket.dev/blog/60-malicious-npm-packages-leak-network-and-host-data?ref=mandos.io">60 Malicious npm Packages Leak Network and Host Data in Active Campaign</a></h3>
<ul>
<li>
<p>Socket's Threat Research Team discovered 60 malicious npm packages across three accounts that collect and <strong>exfiltrate</strong> network data through a Discord webhook, with over 3,000 downloads targeting developer environments.</p>
</li>
<li>
<p>The malicious packages use install-time scripts to gather internal/external IPs, hostnames, DNS servers, and directory paths while using <strong>sandbox</strong>-evasion techniques to specifically target real production environments.</p>
</li>
<li>
<p>All packages contain identical <strong>reconnaissance</strong> code designed to map organization networks for future intrusions, with the campaign remaining active as packages are still available on the npm <strong>registry</strong>.</p>
</li>
</ul>
<h3 id="seo-poisoning-attack-redirects-employee-paychecks-through-hijacked-routers"><a href="https://reliaquest.com/blog/threat-spotlight-payroll-fraud-attackers-stealing-paychecks-seo-poisoning/?ref=mandos.io">SEO Poisoning Attack Redirects Employee Paychecks Through Hijacked Routers</a></h3>
<ul>
<li>
<p>Attackers used <strong>SEO poisoning</strong> to create fake login pages targeting mobile devices, stealing employee credentials to access payroll portals and redirect paychecks to attacker-controlled accounts.</p>
</li>
<li>
<p>The campaign utilized compromised home <strong>routers</strong> and residential IP addresses as proxies, making detection difficult while allowing attackers to bypass security measures that would normally flag suspicious login locations.</p>
</li>
<li>
<p>The attackers leveraged <strong>Pusher</strong> service for real-time notification of compromised credentials, enabling immediate reuse before passwords could be changed or suspicious activity detected.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="fbis-ic3-reports-record-166-billion-in-cybercrime-losses-for-2024"><a href="https://drive.google.com/file/d/1zYa368XpDP5Nk0dkqzTCl1g3K39E7-Z5/view?usp=drivesdk&ref=mandos.io">FBI's IC3 Reports Record $16.6 Billion in Cybercrime Losses for 2024</a></h3>
<ul>
<li>
<p>The FBI's Internet Crime Complaint Center (IC3) received 859,532 complaints in 2024, with a <strong>record</strong> $16.6 billion in reported losses – a 33% increase from 2023, with <strong>investment</strong> fraud being the top category ($6.57 billion).</p>
</li>
<li>
<p><strong>Ransomware</strong> complaints increased 9% from 2023, remaining the most pervasive threat to critical infrastructure, with IC3 identifying 67 new variants. The Recovery Asset Team successfully froze $561.6 million through the Financial Fraud Kill Chain process.</p>
</li>
<li>
<p>Adults over age 60 were the most targeted demographic, submitting the highest number of complaints (147,127) and suffering the greatest financial losses ($4.8 billion), while <strong>cryptocurrency</strong> was involved in $9.32 billion of reported losses.</p>
</li>
</ul>
<h3 id="netwrix-research-77-of-organizations-now-operate-in-hybrid-it-environments"><a href="https://drive.google.com/file/d/1rF3rxg5ZPm2L6m9kxbbD4HhURGbBk1t6/view?usp=drivesdk&ref=mandos.io">Netwrix Research: 77% of Organizations Now Operate in Hybrid IT Environments</a></h3>
<ul>
<li>
<p>Netwrix survey of 2,150 IT professionals reveals 60% of organizations already leverage <strong>AI</strong> tools in their infrastructure, with 37% reporting that AI-driven threats have forced them to adjust their security approach.</p>
</li>
<li>
<p>Cloud security incidents are increasingly identity-driven, with user/admin account <strong>compromise</strong> affecting 46% of organizations in 2025 compared to only 16% in 2020, while targeted attacks on premises rose from 19% in 2023 to 28% in 2025.</p>
</li>
<li>
<p>Financial damage from security incidents increased dramatically, with 75% of organizations reporting monetary impact (up from 60% in 2024) and organizations estimating damages of $200,000+ nearly doubled to 13%, highlighting growing <strong>ransomware</strong> concerns.</p>
</li>
</ul>
<h3 id="third-parties-involved-in-30-of-data-breaches-according-to-verizon-dbir"><a href="https://drive.google.com/file/d/1OEUKRkPvIRDMuVyZqCsCC83ZzB_LeL2S/view?usp=drivesdk&ref=mandos.io">Third Parties Involved in 30% of Data Breaches According to Verizon DBIR</a></h3>
<ul>
<li>
<p>Third-party involvement in breaches doubled from 15% to 30% in the past year, with notable incidents involving stolen credentials accessing platforms like Snowflake where the median time to remediate leaked secrets in GitHub repositories was 94 days.</p>
</li>
<li>
<p><strong>Ransomware</strong> grew 37% from last year, now present in 44% of all breaches, with small businesses disproportionately affected (88% of SMB breaches vs 39% in larger organizations), though median ransom payments decreased to $115,000.</p>
</li>
<li>
<p>Exploitation of <strong>vulnerabilities</strong> as an initial access vector increased by 34%, reaching 20% and approaching stolen credential usage rates, with edge devices and VPNs becoming primary targets (22% of exploits, up from 3% last year).</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="us-cybersecurity-job-market-faces-offshoring-and-ai-pressures"><a href="https://www.reddit.com/r/cybersecurity/s/5bGyWxYe8s?ref=mandos.io">U.S. Cybersecurity Job Market Faces Offshoring and AI Pressures</a></h3>
<ul>
<li>
<p>Companies are increasingly <strong>offshoring</strong> cybersecurity roles to Latin America, Eastern Europe, and South Asia, with some organizations reporting 70% of their security staff now located overseas.</p>
</li>
<li>
<p>The "do more with less" mentality has led to significant <strong>reductions</strong> in force, with some professionals handling work that should require entire teams, while relying heavily on automation to manage workloads.</p>
</li>
<li>
<p>Executive <strong>hype</strong> around AI capabilities is driving additional layoffs, though industry professionals predict this may reverse as organizations discover AI cannot perform at expected levels.</p>
</li>
</ul>
<h3 id="new-security-engineer-faces-limited-mentorship-and-training-in-contract-position"><a href="https://www.reddit.com/r/cybersecurity/comments/1kmzpfl/feeling_stuck_as_a_new_security_engineer_should_i/?ref=mandos.io">New Security Engineer Faces Limited Mentorship and Training in Contract Position</a></h3>
<ul>
<li>
<p>A new <strong>contractor</strong> with three months experience as a security engineer expressed frustration about minimal training, being told to "read documentation," "email account owners," or "copy similar tickets" rather than receiving proper guidance on tools like CrowdStrike, Splunk, and Palo Alto.</p>
</li>
<li>
<p>Industry professionals responded that <strong>self-sufficiency</strong> is critical in cybersecurity careers, with most recommending the engineer leverage available resources to learn independently rather than waiting for formal training that may never materialize.</p>
</li>
<li>
<p>Multiple commenters advised sticking with the position at least six months, as this timeframe typically represents when employees become fully comfortable in their roles, while using the access to enterprise <strong>tools</strong> as an opportunity for self-directed learning.</p>
</li>
</ul>
<h3 id="2025-cyber-security-salary-survey-shows-shifting-market-dynamics-and-priorities"><a href="https://www.barclaysimpson.com/salary-guides/2025-cyber-security-data-privacy-salary-guide/?ref=mandos.io">2025 Cyber Security Salary Survey Shows Shifting Market Dynamics and Priorities</a></h3>
<ul>
<li>
<p>Cyber security recruitment faced challenges in 2024 due to economic uncertainty, with candidate supply outweighing employer <strong>demand</strong>, particularly at senior levels, though 57% of employers plan to hire additional staff in 2025.</p>
</li>
<li>
<p><strong>Remote</strong> working has emerged as a critical factor in recruitment, with 74% of professionals stating they would consider changing jobs if not permitted flexible arrangements, and 40% valuing it more than annual bonuses.</p>
</li>
<li>
<p>The <strong>AI</strong> governance field is experiencing growth, with demand rising for professionals with relevant skillsets as organizations navigate data privacy and security challenges posed by artificial intelligence implementation.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="anthropic-develops-method-to-monitor-ai-value-expressions-in-real-world-conversations"><a href="https://www.anthropic.com/research/values-wild?ref=mandos.io">Anthropic Develops Method to Monitor AI Value Expressions in Real-World Conversations</a></h3>
<ul>
<li>
<p>Anthropic's researchers have created a privacy-preserving system that analyzes how their AI assistant Claude expresses values during real-world user interactions, examining 700,000 anonymized conversations to build the first large-scale empirical <strong>taxonomy</strong> of AI values.</p>
</li>
<li>
<p>The study found Claude generally follows its intended "helpful, honest, harmless" training, but researchers detected some instances where values like "dominance" and "amorality" appeared, likely resulting from user <strong>jailbreak</strong> attempts to bypass AI safety guardrails.</p>
</li>
<li>
<p>This monitoring approach offers a new <strong>method</strong> for AI alignment evaluation that could detect problematic behaviors emerging only in real-world settings, though it cannot be used pre-deployment and requires substantial conversation data to implement effectively.</p>
</li>
</ul>
<h3 id="meta-releases-llamafirewall-an-open-source-guardrail-system-for-ai-agents"><a href="https://ai.meta.com/research/publications/llamafirewall-an-open-source-guardrail-system-for-building-secure-ai-agents/?ref=mandos.io">Meta Releases LlamaFirewall: An Open Source Guardrail System for AI Agents</a></h3>
<ul>
<li>
<p>Meta has released LlamaFirewall, an open-source <strong>security</strong> framework designed as a final layer of defense against risks associated with AI agents by addressing prompt injection, agent misalignment, and <strong>code</strong> vulnerabilities.</p>
</li>
<li>
<p>The system includes three main guardrails: PromptGuard 2 (a universal jailbreak detector), Agent Alignment Checks (a chain-of-thought auditor), and CodeShield (an online static analysis engine to prevent generation of <strong>insecure</strong> code).</p>
</li>
<li>
<p>Already in <strong>production</strong> at Meta, LlamaFirewall includes customizable scanners that allow developers with basic regex or prompting skills to quickly update security guardrails for their AI agents.</p>
</li>
</ul>
<h3 id="aws-releases-strands-agents-an-open-source-ai-agents-sdk"><a href="https://aws.amazon.com/blogs/opensource/introducing-strands-agents-an-open-source-ai-agents-sdk/?ref=mandos.io">AWS Releases Strands Agents, An Open Source AI Agents SDK</a></h3>
<ul>
<li>
<p>AWS has released Strands Agents, an open source SDK that enables building and running AI agents in just a few lines of code, with a <strong>model-driven</strong> approach that leverages LLMs' reasoning capabilities.</p>
</li>
<li>
<p>The SDK is already used in <strong>production</strong> by multiple AWS teams including Amazon Q Developer, AWS Glue, and VPC Reachability Analyzer, and is designed to scale from simple to complex agent use cases.</p>
</li>
<li>
<p>Strands supports multiple LLM providers including Amazon Bedrock, Anthropic, Ollama, Meta, and others, with companies like Accenture, Anthropic, Langfuse, mem0.ai, Meta, PwC, Ragas.io, and Tavily joining as <strong>contributors</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="stackhawk-raises-12-million-to-address-ai-powered-development-security-challenges"><a href="https://www.helpnetsecurity.com/2025/05/22/stackhawk-additional-funding-12-million/?ref=mandos.io">StackHawk Raises $12 Million To Address AI-Powered Development Security Challenges</a></h3>
<ul>
<li>
<p>The shift-left API security platform secured funding from Sapphire and Costanoa Ventures to help <strong>AppSec</strong> teams cope with the increasing pace of AI-driven development, bringing total funding to $47.3 million.</p>
</li>
<li>
<p>Developers now deploy code 70% faster using AI, but 30% contains security <strong>vulnerabilities</strong>, creating a widening productivity gap that hackers exploit as security teams struggle with the 100:1 developer-to-security professional ratio.</p>
</li>
<li>
<p>StackHawk will focus on developing solutions that help identify and remediate critical <strong>API</strong> security issues during development, particularly for data-sensitive <strong>industries</strong> like healthcare and fintech.</p>
</li>
</ul>
<h3 id="rhino-federated-computing-raises-15m-series-a-for-secure-ai-collaboration-platform"><a href="https://www.techinasia.com/news/us-ai-tools-startup-rhino-federated-computing-nets-15m-series-a?ref=mandos.io">Rhino Federated Computing Raises $15M Series A For Secure AI Collaboration Platform</a></h3>
<ul>
<li>
<p>Boston-based Rhino has secured $15M in Series A funding led by AlleyCorp to expand its <strong>federated</strong> AI platform, bringing total funding to $30M since its 2020 founding.</p>
</li>
<li>
<p>The company's technology enables organizations in <strong>regulated</strong> industries to collaborate on AI model development without sharing sensitive data, addressing critical data privacy concerns.</p>
</li>
<li>
<p>Founded by Dr. Ittai Dayan, former AI leader at Mass General Brigham, and Yuval Baror, the company employs 20 people with half based in <strong>Israel</strong>, positioning itself at the intersection of AI development and regulatory compliance.</p>
</li>
</ul>
<h3 id="breachrx-secures-15m-to-scale-incident-response-platform"><a href="https://siliconangle.com/2025/05/19/breachrx-raises-15m-expand-intelligent-incident-response-platform/?ref=mandos.io">BreachRx Secures $15M to Scale Incident Response Platform</a></h3>
<ul>
<li>
<p>Incident response startup BreachRx has raised $15 million in Series A funding led by Ballistic Ventures to expand its go-to-market and <strong>engineering</strong> teams.</p>
</li>
<li>
<p>The platform offers a centralized workspace for security, legal, compliance, and communications teams, automating <strong>response</strong> plans and defining clear roles and responsibilities during an incident.</p>
</li>
<li>
<p>BreachRx recently launched Rex <strong>AI</strong>, a generative artificial intelligence engine that streamlines incident response by providing real-time recommendations and automating administrative tasks.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="blackpanda-managed-security-services"><a href="https://cybersectools.com/tools/blackpanda-managed-security-services?ref=mandos.io">Blackpanda Managed Security Services</a></h3>
<p>Blackpanda Managed Security Services offers a comprehensive cybersecurity solution through their IR-1 subscription model that combines incident response, vulnerability scanning, and cyber insurance access.</p>
<h3 id="cyver-core"><a href="https://cybersectools.com/tools/cyver-core?ref=mandos.io">Cyver Core</a></h3>
<p>Cyver Core is a pentest reporting and management platform designed to streamline the entire penetration testing workflow. The platform supports the complete pentest journey from scoping to remediation through five key phases:</p>
<h3 id="symbiotic-security"><a href="https://cybersectools.com/tools/symbiotic-security?ref=mandos.io">Symbiotic Security</a></h3>
<p>Symbiotic Security is an AI-powered code security solution that integrates directly into the IDE to detect, remediate, and educate developers about security vulnerabilities in real-time.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #104: Coinbase $400m Breach, Wiz&#x27;s Zero-CVE OS, Cisco Readiness Index ]]></title>
        <description><![CDATA[ Chinese threat actors exploit critical SAP vulnerability across 581 systems. Anthropic CISO predicts AI virtual employees within a year. AI virtual employees pose new security challenges. ]]></description>
        <link>https://mandos.io/newsletter/brief-104-coinbase-400m-breach-wizs-zero-cve-os-cisco-readiness-index/</link>
        <guid isPermaLink="false">68282fc1ba00690001e0b259</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 18 May 2025 16:00:13 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/05/20.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>The gap between cybersecurity awareness and actual readiness continues to widen. Cisco's latest report shows only 4% of companies have reached mature security readiness despite growing threats. I'm seeing this constantly with orgs who understand the risks but struggle to implement effective defenses.</p><p>In this week's brief:</p><ul><li>Chinese threat actors are actively exploiting a critical SAP NetWeaver vulnerability across hundreds of systems</li><li>Anthropic's CISO predicts AI virtual employees with their own accounts will appear on corporate networks within a year</li><li>The cybersecurity job market remains strong for experienced professionals, with application security roles in particularly high demand</li></ul><p>Dive in for the full stories and more insights to start your week prepared.</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">💬</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">How is your organization preparing for the potential security implications of AI agents?</strong></b><br><br><i><em class="italic" style="white-space: pre-wrap;">I'd love to hear your thoughts. Reply directly to this email or share your thoughts in comments section below.</em></i></div></div><div class="kg-card kg-cta-card kg-cta-bg-grey kg-cta-minimal    " data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">BECOME A SPONSOR</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Get your product or service in front of 1200+ cybersecurity leaders and professionals.</span></p>
                        </div>
                    
                    
                        <a href="https://mandos.io/contact/" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Learn more
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="chinese-nation-state-actors-exploit-critical-sap-netweaver-vulnerability-across-581-systems"><a href="https://thehackernews.com/2025/05/china-linked-apts-exploit-sap-cve-2025.html?m=1&ref=mandos.io">Chinese Nation-State Actors Exploit Critical SAP NetWeaver Vulnerability Across 581 Systems</a></h3>
<ul>
<li>
<p>Multiple China-linked threat groups are actively exploiting the <strong>unauthenticated</strong> SAP NetWeaver vulnerability (CVE-2025-31324) that enables remote code execution to compromise critical <strong>infrastructure</strong> systems across UK, US, and Saudi Arabia.</p>
</li>
<li>
<p>Attackers deploy web shells for persistent access and drop various malware including KrustyLoader (Rust-based), SNOWLIGHT, VShell (Go-based RAT), and GOREVERSE backdoor; EclecticIQ found exposed attacker infrastructure containing logs of compromised systems and 800 domains targeted for future <strong>exploitation</strong>.</p>
</li>
<li>
<p>SAP has released patches for this vulnerability and a newly discovered critical flaw (CVE-2025-42999, CVSS 9.1) in NetWeaver's Visual Composer Metadata Uploader component; immediate <strong>patching</strong> is strongly recommended.</p>
</li>
</ul>
<h3 id="wiz-launches-wizos-hardened-container-base-images-with-near-zero-cves"><a href="https://www.wiz.io/blog/introducing-wizos-hardened-near-zero-cve-base-images?ref=mandos.io">Wiz Launches WizOS: Hardened Container Base Images With Near-Zero CVEs</a></h3>
<ul>
<li>
<p>Wiz has released WizOS, a <strong>hardened</strong> Linux distribution designed as a minimal container base image with near-zero CVEs to address the problem of developers being slowed down by critical vulnerabilities in base images.</p>
</li>
<li>
<p>Built as a drop-in replacement compatible with Alpine but using glibc instead of musl, WizOS features a reproducible <strong>pipeline</strong> with controlled environments, deterministic output, and components built from source with signing and provenance.</p>
</li>
<li>
<p>The implementation reduced critical and high CVEs to near zero, resulting in fewer blocked builds, smaller <strong>container</strong> sizes, and faster CI pipelines, while now being available in private preview for Wiz customers.</p>
</li>
</ul>
<h3 id="coinbase-breach-exposes-customer-data-after-rogue-support-agents-steal-information"><a href="https://www.bleepingcomputer.com/news/security/coinbase-discloses-breach-faces-up-to-400-million-in-losses/?ref=mandos.io">Coinbase Breach Exposes Customer Data After Rogue Support Agents Steal Information</a></h3>
<ul>
<li>
<p>Cybercriminals bribed overseas support agents to steal personal data from approximately 1 million Coinbase customers (1% of their user base), including names, addresses, government IDs, and account <strong>transaction</strong> history.</p>
</li>
<li>
<p>While no passwords, private keys, or funds were directly compromised, Coinbase estimates potential losses between $180-400 million from <strong>remediation</strong> costs and reimbursements to customers who were subsequently tricked into sending funds.</p>
</li>
<li>
<p>Coinbase refused to pay the $20 million <strong>extortion</strong> demand and instead established a reward fund of the same amount for information leading to the attackers' identification.</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="smbs-face-critical-cybersecurity-gaps-despite-awareness-kinetic-business-reports"><a href="https://drive.google.com/file/d/1JJrT5bOkoyTxEOV-GADvsIId5IM9VGJU/view?usp=drivesdk&ref=mandos.io">SMBs Face Critical Cybersecurity Gaps Despite Awareness, Kinetic Business Reports</a></h3>
<ul>
<li>
<p>52% of small and medium-sized businesses lack confidence in their cybersecurity preparedness, despite 59% recognizing it as a key priority – creating a significant <strong>vulnerability</strong> gap that cybercriminals can exploit.</p>
</li>
<li>
<p>Economic constraints are the primary challenge with 66% of SMBs citing budget limitations for technology adoption, while 43% of all <strong>cyberattacks</strong> target SMBs at an average cost of $25,000 per incident.</p>
</li>
<li>
<p>SMBs are primarily seeking affordable security solutions with 61% citing price as the deciding factor for switching providers, while only 36% express interest in advanced or <strong>AI-powered</strong> tools due to limited IT resources.</p>
</li>
</ul>
<h3 id="ciscos-2025-cybersecurity-readiness-index-shows-flat-progress-despite-rising-ai-threats"><a href="https://drive.google.com/file/d/1ooE_VRSK2mWRdII7jNph1ariIUzeYjnm/view?usp=drivesdk&ref=mandos.io">Cisco's 2025 Cybersecurity Readiness Index Shows Flat Progress Despite Rising AI Threats</a></h3>
<ul>
<li>
<p>Cisco's third annual survey of 8,000 businesses across 30 global markets reveals only 4% of companies reached <strong>Mature</strong> cybersecurity readiness (up from 3% in 2023), while 70% remain in the bottom two categories (Formative 61%, Beginner 9%).</p>
</li>
<li>
<p>Nearly 9 out of 10 (86%) business leaders reported at least one AI-related <strong>incident</strong> in the past year, with the most common being model theft (43%), AI-enhanced social engineering (42%), and data poisoning attempts (38%).</p>
</li>
<li>
<p>Despite widespread AI adoption, there's a concerning security gap – only 49% of respondents believe employees understand AI-related cybersecurity threats, while 22% allow <strong>unrestricted</strong> access to publicly available GenAI tools without security oversight.</p>
</li>
</ul>
<h3 id="bitsight-state-of-the-underground-2025-reveals-25-rise-in-ransomware-attacks"><a href="https://drive.google.com/file/d/1uPwayyS0RRLwOcF5TrsubymzG6IZ9wQs/view?usp=drivesdk&ref=mandos.io">Bitsight State of the Underground 2025 Reveals 25% Rise in Ransomware Attacks</a></h3>
<ul>
<li>
<p>Ransomware attacks increased nearly 25% in 2024, with a 53% rise in <strong>leak</strong> sites, while data breaches on underground forums grew 43% with US organizations comprising 20% of victims.</p>
</li>
<li>
<p>Compromised credentials surged to 2.9 billion unique sets in 2024 (up from 2.2 billion), and <strong>stealer</strong> logs from 7.7 million endpoints were listed on underground markets, with Lumma and Risepro replacing Raccoon as leading malware.</p>
</li>
<li>
<p>Underground markets listed 14.5 million compromised credit cards in 2024 (20% increase), with US cards accounting for 80.7% of all listings, while the most <strong>vulnerable</strong> devices were found in Information and Professional Services sectors.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="sans-giac-2025-cybersecurity-workforce-report-redefines-talent-challenge"><a href="https://drive.google.com/file/d/165NCnYcLMFuyuzxxp4ethV9VtO_xsL2D/view?usp=drivesdk&ref=mandos.io">SANS | GIAC 2025 Cybersecurity Workforce Report Redefines Talent Challenge</a></h3>
<ul>
<li>
<p>Organizations are shifting focus from merely filling <strong>headcount</strong> vacancies to finding professionals with the right skills, with 52% identifying "not having the right staff" as their primary challenge compared to 48% citing "not enough staff."</p>
</li>
<li>
<p>Technical capability has emerged as the top hiring criterion (19%), followed by <strong>certifications</strong> (14%), with 65% of organizations requiring skill validation for client requirements and 58% using certifications for internal decisions.</p>
</li>
<li>
<p>Workplace culture significantly impacts retention, with 34% of organizations identifying "working well within a team" as the most crucial cultural value, while new <strong>regulatory</strong> requirements like NIS II, DORA, and CMMC already influence hiring practices for 40% of organizations globally.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-report-growing-skills-gap-between-interviews-and-job-performance"><a href="https://www.reddit.com/r/cybersecurity/s/4TwGN4jFYY?ref=mandos.io">Cybersecurity Professionals Report Growing Skills Gap Between Interviews and Job Performance</a></h3>
<ul>
<li>
<p>Cybersecurity practitioners observe that recent hires often interview well using <strong>buzzwords</strong> but lack practical skills, with some candidates misrepresenting online learning platforms as actual work experience.</p>
</li>
<li>
<p>The fundamental issue isn't inexperience but unwillingness to learn, with veteran industry professionals noting that teaching <strong>fundamentals</strong> and troubleshooting skills has become increasingly neglected in modern training approaches.</p>
</li>
<li>
<p>Multiple commenters suggest the <strong>hiring</strong> process has become "gamified," with companies selecting candidates based on interview performance rather than technical aptitude, while experienced professionals recommend focusing on building comprehensive onboarding and <strong>mentorship</strong> programs.</p>
</li>
</ul>
<h3 id="experienced-cybersecurity-professionals-finding-job-market-remains-strong-despite-economic-concerns"><a href="https://www.reddit.com/r/SecurityCareerAdvice/s/oS3vMom6Rv?ref=mandos.io">Experienced Cybersecurity Professionals Finding Job Market Remains Strong Despite Economic Concerns</a></h3>
<ul>
<li>
<p>Experienced cybersecurity professionals report relative ease in finding positions, with many stating that the <strong>market</strong> remains strong for those with practical skills and proper job search techniques.</p>
</li>
<li>
<p>Application <strong>security</strong> roles were specifically highlighted as remaining in high demand, with one commenter noting these positions command some of the highest salaries in the cybersecurity field.</p>
</li>
<li>
<p>Breaking into the industry without experience remains <strong>exceptionally</strong> difficult, with recommendations to gain security-related experience in current roles before transitioning to dedicated security positions.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="anthropic-ciso-warns-of-ai-virtual-employees-coming-within-a-year"><a href="https://www.axios.com/2025/04/22/ai-anthropic-virtual-employees-security?ref=mandos.io">Anthropic CISO Warns of AI Virtual Employees Coming Within a Year</a></h3>
<ul>
<li>
<p>Anthropic's Chief Information Security Officer Jason Clinton predicts AI-powered virtual employees with their own accounts, roles, and <strong>memories</strong> will begin operating on corporate networks within a year, requiring companies to reassess their cybersecurity strategies.</p>
</li>
<li>
<p>These virtual employees present unique security challenges including account security, appropriate network <strong>access</strong>, potential rogue behavior, and questions of responsibility when AI systems perform unauthorized actions in corporate environments.</p>
</li>
<li>
<p>Several cybersecurity vendors are already developing solutions for managing non-human identities, with Okta recently releasing a unified control platform to monitor <strong>unauthorized</strong> activity from AI accounts and provide better <strong>visibility</strong> into system access.</p>
</li>
</ul>
<h3 id="camel-system-defeats-prompt-injections-by-design-using-control-and-data-flow-security"><a href="https://drive.google.com/file/d/15YkHlMeznCDQP9yPLWdoMrl9sZZqA7n_/view?usp=drivesdk&ref=mandos.io">CaMeL System Defeats Prompt Injections by Design Using Control and Data Flow Security</a></h3>
<ul>
<li>
<p>Researchers introduce CaMeL, a novel defense against prompt <strong>injection</strong> attacks that creates a protective layer around LLMs without modifying the models themselves. CaMeL explicitly extracts control and data flows from trusted queries and uses capabilities-based security to prevent untrusted data from impacting program flow.</p>
</li>
<li>
<p>In evaluation on the AgentDojo benchmark, CaMeL successfully solved 67% of tasks with provable security while stopping all 949 attacks that compromised undefended models. The system maintains <strong>capabilities</strong> (metadata tags) for each value to restrict data flows based on fine-grained security policies.</p>
</li>
<li>
<p>CaMeL implements a dual-LLM architecture with a Privileged LLM that plans actions and a Quarantined LLM that processes potentially malicious data, along with a custom Python <strong>interpreter</strong> that tracks data provenance and enforces security policies, requiring about 2.8× more tokens than native tool calling.</p>
</li>
</ul>
<h3 id="openai-shares-seven-enterprise-ai-adoption-strategies-for-organizations"><a href="https://drive.google.com/file/d/1zSSDfSL-eQwrVvB6EPDtQr3SUuPbYZ6f/view?usp=drivesdk&ref=mandos.io">OpenAI Shares Seven Enterprise AI Adoption Strategies For Organizations</a></h3>
<ul>
<li>
<p>OpenAI recommends starting with <strong>evals</strong> – systematic evaluation processes that measure how AI models perform against specific use cases, as demonstrated by Morgan Stanley who achieved 98% daily AI adoption among advisors after implementing rigorous evaluation frameworks.</p>
</li>
<li>
<p>The company emphasizes embedding AI directly into products to create enhanced customer experiences, while also advising organizations to customize and <strong>fine-tune</strong> models to dramatically increase value for specific organizational contexts.</p>
</li>
<li>
<p>For successful implementation, OpenAI suggests putting AI tools in the hands of domain <strong>experts</strong>, unblocking developers through automating the software development lifecycle, and setting bold <strong>automation</strong> goals for routine operations to free staff for higher-value activities.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="kovrai-emerges-from-stealth-with-36m-to-automate-cybersecurity-compliance"><a href="https://www.citybiz.co/article/695577/stealth-cybersecurity-startup-kovr-ai-emerges-with-3-6m-in-funding-from-hack-factory-ooda-and-others/?ref=mandos.io">Kovr.Ai Emerges From Stealth With $3.6M To Automate Cybersecurity Compliance</a></h3>
<ul>
<li>
<p>Reston, VA-based Kovr.ai secured $3.6 million in funding led by IronGate and Xfund, with participation from Hack Factory, <strong>OODA</strong> Ventures, and McLean Capital, to expand its go-to-market, AI engineering, and product development teams.</p>
</li>
<li>
<p>Founded in 2018, Kovr.ai claims to be the only AI-native cyber <strong>compliance</strong> automation platform, using real-time code-driven intelligence to automate frameworks like FedRAMP and cybersecurity maturity model certification.</p>
</li>
<li>
<p>The platform reportedly reduces the time required for Authorization to Operate (<strong>ATO</strong>) readiness from months to minutes, addressing the typical "$2 million barrier" companies face when seeking government <strong>deployments</strong>.</p>
</li>
</ul>
<h3 id="cybersecurity-market-projected-to-reach-usd-56272-billion-by-2032"><a href="https://www.openpr.com/news/4017169/cybersecurity-market-usd-562-72-billion-by-2032-owing?ref=mandos.io">Cybersecurity Market Projected to Reach USD 562.72 Billion by 2032</a></h3>
<ul>
<li>
<p>Global cybersecurity market valued at USD 172.24 billion in 2023 is expected to grow at a <strong>CAGR</strong> of 14.3% through 2032, driven by increasing volume and complexity of cyber <strong>attacks</strong> targeting organizations across sectors.</p>
</li>
<li>
<p>Key market trends include the rise of <strong>AI</strong> and machine learning in cybersecurity solutions for real-time threat detection, and growing adoption of cloud-based security solutions that provide scalability and centralized management capabilities.</p>
</li>
<li>
<p>Leading market players include Cisco Systems, IBM, Microsoft, Fortinet, Palo Alto Networks, and other major technology companies competing in the rapidly expanding <strong>industry</strong>.</p>
</li>
</ul>
<h3 id="orca-security-acquires-agentic-ai-startup-opus"><a href="https://www.bizjournals.com/portland/inno/stories/news/2025/05/13/orca-security-opus-agentic-ai.html?ref=mandos.io">Orca Security Acquires Agentic AI Startup Opus</a></h3>
<ul>
<li>
<p>Cybersecurity <strong>unicorn</strong> Orca Security has acquired AI security startup Opus, strengthening its capabilities in <strong>agentic</strong> artificial intelligence security.</p>
</li>
<li>
<p>Orca Security plans to expand its Portland office and <strong>workforce</strong> following the acquisition, showing continued investment in the region's tech ecosystem.</p>
</li>
<li>
<p>This acquisition follows other strategic moves in the <strong>cybersecurity</strong> industry, including previous executive role changes at Orca Security and significant investments in other Portland-based security firms.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="mend"><a href="https://cybersectools.com/tools/mend?ref=mandos.io">Mend</a></h3>
<p>An application security platform that combines SCA, SAST, container security, dependency management, and AI model risk analysis with integrated workflows for development and security teams.</p>
<h3 id="microsoft-entra-verified-id"><a href="https://cybersectools.com/tools/microsoft-entra-verified-id?ref=mandos.io">Microsoft Entra Verified ID</a></h3>
<p>A decentralized identity verification solution that enables organizations to issue, manage, and verify digital credentials for user-owned identity scenarios.</p>
<h3 id="pago-networks-managed-security-services"><a href="https://cybersectools.com/tools/pago-networks-managed-security-services?ref=mandos.io">PAGO Networks Managed Security Services</a></h3>
<p>PAGO Networks delivers AI-powered managed security services including MDR, integrated EPP/EDR, dark web monitoring, Open XDR, and OT-oriented endpoint protection.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Principled Pragmatism: How to Balance Security Ideals With Legacy System Realities ]]></title>
        <description><![CDATA[ Stop choosing between ideal security and operational constraints. Learn how to implement a staged security roadmap that bridges the gap between legacy systems and modern protection standards. ]]></description>
        <link>https://mandos.io/blog/principled-pragmatism-how-to-balance-security-ideals-with-legacy-system-realities/</link>
        <guid isPermaLink="false">68122055793f34000151ed0b</guid>
        <category><![CDATA[ Cybersecurity ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 13 May 2025 16:00:55 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/principled-pragmatism-in-cybersecurity.png" medium="image"/>
        <content:encoded><![CDATA[ <p>You're standing at a crossroads. In one hand, you hold the blueprint for your perfect security architecture – modern, robust, and aligned with every industry best practice. In the other, you clutch a stack of reports about legacy systems that power critical business functions but haven't seen updates since Obama's first term.</p><p>Sound familiar?</p><p>If you're a security leader caught between idealism and operational constraints, you're not alone. I've spent over a decade navigating this exact tension. The question that haunts many of us remains: Should we aim for security perfection and make exceptions when needed, or should we build our security approach around existing business constraints from the start?</p><p>Your answer to this dilemma shapes your entire security program, team culture, and the value you deliver to your organization.</p><h2 id="the-idealists-trap-and-why-i-fell-into-it">The Idealist's Trap (And Why I Fell Into It)</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-12.png" class="kg-image" alt="idealist cybersecurity professional" loading="lazy" width="1472" height="832" srcset="https://mandos.io/content/images/size/w600/2025/04/image-12.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-12.png 1000w, https://mandos.io/content/images/2025/04/image-12.png 1472w" sizes="(min-width: 720px) 720px"></figure><p>Early in my career, I was the definition of a security purist. I'd walk into meetings with vendors and business stakeholders armed with a comprehensive security wish list. "We need zero trust architecture," I'd declare. "We need to segment all networks, implement strong encryption everywhere, and replace anything older than three years."</p><p>People would nod, seeming to agree. Then came implementation time.</p><p>"That legacy ERP system? It can't support modern authentication protocols."</p><p>"That specialized manufacturing software? The vendor went out of business in 2014."</p><p>"That custom-built application? The developer who built it retired years ago."</p><p>My perfect security vision crashed against the rocks of operational reality. Business units pushed back. Relationships grew tense. Eventually, I realized my approach was fundamentally flawed.</p><p>I was building security castles in the sky without understanding the ground beneath them.</p><h2 id="the-operational-realist-and-why-thats-not-enough-either">The Operational Realist (And Why That's Not Enough Either)</h2><p>Some security leaders take the opposite approach. They begin with business needs and build security measures around existing constraints. This approach has merits – it acknowledges reality, minimizes business disruption, and often faces less resistance.</p><p>But it comes with serious downsides.</p><p>When you start by accepting all operational limitations as fixed, you often end up with inadequate security. You stop pushing for necessary changes. You stop challenging the status quo. And most dangerously, you become the department of "no, we can't secure that properly" rather than "yes, and here's how."</p><p>As&nbsp;<a href="https://www.helpnetsecurity.com/2024/09/20/michael-oberlaender-flexible-cybersecurity-strategy/?ref=mandos.io">Michael Oberlaender notes</a>, security needs to "blend into the overall business processes and operational efficiency – so, instead of becoming a roadblock in every single undertaking, ensure that security is becoming part of the process." But that doesn't mean accepting every limitation.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-third-way-principled-pragmatism">The Third Way: Principled Pragmatism</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/principled-pragmatism-steps.png" class="kg-image" alt="steps to principled pragmatism" loading="lazy" width="1442" height="1056" srcset="https://mandos.io/content/images/size/w600/2025/04/principled-pragmatism-steps.png 600w, https://mandos.io/content/images/size/w1000/2025/04/principled-pragmatism-steps.png 1000w, https://mandos.io/content/images/2025/04/principled-pragmatism-steps.png 1442w" sizes="(min-width: 720px) 720px"></figure><p>After years of wrestling with this dilemma, I've discovered there's a third path. I call it Principled Pragmatism. It combines the best of both approaches while avoiding their pitfalls.</p><p>Here's how it works:</p><!--members-only--><ol><li>Start with your ideal security vision – be ambitious and forward-thinking</li><li>Map this vision against your current operational reality</li><li>Create a staged roadmap to bridge the gap</li><li>Partner with the business to move forward together</li></ol><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Legacy systems aren't the problem. The lack of a plan to secure them properly is.</div></div><h2 id="securing-legacy-systems-without-losing-your-mind">Securing Legacy Systems Without Losing Your Mind</h2><p>Legacy systems aren't going anywhere. According to research from&nbsp;<a href="https://insights.sei.cmu.edu/blog/cybersecurity-engineering-for-legacy-systems-6-recommendations/?ref=mandos.io">Carnegie Mellon University</a>, "Legacy systems continue to play a key role across many organizations. Engineering cybersecurity into these legacy systems presents some unique challenges."</p><p>But "challenging" doesn't mean "impossible." Here's my practical framework for securing legacy systems without compromising your security principles:</p><h3 id="1-segment-and-contain">1. Segment and Contain</h3><p>First, contain the risk. Legacy systems should operate in isolated network segments with strict access controls. By implementing microsegmentation, you limit the potential damage if these systems are compromised.</p><p>I once worked with a manufacturing company running critical machines on Windows XP long after support ended. Rather than fighting a losing battle to upgrade immediately, we isolated those systems on separate VLANs, implemented application whitelisting, and controlled all connections in and out. This bought us time to plan a proper upgrade path.</p><h3 id="2-compensate-where-you-cant-eliminate">2. Compensate Where You Can't Eliminate</h3><p>For every security gap in a legacy system, implement compensating controls around it.</p><p>If your legacy system can't support modern authentication, implement strict network access controls, enhanced logging, and behavioral monitoring. If it can't be patched, use application firewalls and regular vulnerability scanning.</p><p>The key is to be honest about the gaps while creative about addressing them.</p><h3 id="3-document-your-exceptions-and-their-expiration-dates">3. Document Your Exceptions (And Their Expiration Dates)</h3><p>Every security exception should be documented with three critical elements:</p><ul><li>The specific security requirement being excepted</li><li>The business justification for the exception</li><li>An expiration date or trigger for review</li></ul><p>This creates accountability and prevents "temporary" exceptions from becoming permanent security gaps. It also forces honest conversations about when legacy systems need to be replaced.</p><h3 id="4-build-modernization-into-your-security-roadmap">4. Build Modernization Into Your Security Roadmap</h3><p>Security isn't just about protection – it's about enabling safe business operations. That means your security strategy must include plans for modernization.</p><p>According to one industry study on system modernization, "Many legacy systems were likely built with limited or no concern for cybersecurity. Software engineering processes for cybersecurity change often." Your job is to help the business understand when modernization becomes a security imperative, not just a nice-to-have.</p><h2 id="security-architecture-top-down-or-bottom-up">Security Architecture: Top-Down or Bottom-Up?</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/security-architecture-choices-and-steps-to-take.png" class="kg-image" alt="security architecture choices and steps to take" loading="lazy" width="1752" height="1178" srcset="https://mandos.io/content/images/size/w600/2025/04/security-architecture-choices-and-steps-to-take.png 600w, https://mandos.io/content/images/size/w1000/2025/04/security-architecture-choices-and-steps-to-take.png 1000w, https://mandos.io/content/images/size/w1600/2025/04/security-architecture-choices-and-steps-to-take.png 1600w, https://mandos.io/content/images/2025/04/security-architecture-choices-and-steps-to-take.png 1752w" sizes="(min-width: 720px) 720px"></figure><p>Now let's return to our original question. Should we start from the ideal and work backwards, or build from the current reality upwards?</p><p>After years in the trenches, my answer is: both, but in the right sequence.</p><p>Start with your north star – a clear, ideal security architecture based on current best practices and a deep understanding of your organization's risk profile. This gives you direction and purpose.</p><p>Then, conduct a clear-eyed assessment of where you are today. Map all systems, data flows, and dependencies. Identify the gaps between current and ideal states.</p><p>Finally – and this is the critical part – create a staged roadmap that moves you from current reality to your ideal vision through practical, achievable steps.</p><p>This isn't compromising your security principles. It's applying them intelligently within the constraints of business reality.</p><h2 id="the-practical-middle-path-a-case-study">The Practical Middle Path: A Case Study</h2><p>Let me share a real example from my own experience that illustrates this approach.</p><p>I joined a firm that had grown through acquisitions, resulting in four different identity systems. None of them talked to each other. User provisioning was manual. Deprovisioning was inconsistent. </p><p>It was a disaster waiting to happen.</p><p>The ideal solution was clear: a unified identity platform with centralized governance, automated provisioning/deprovisioning, and strong authentication. But simply declaring "we need to rebuild everything" would have been rejected immediately.</p><p>Instead, we took a strategic approach:</p><ol><li>We created our ideal reference architecture for identity</li><li>We mapped all existing systems and identified the highest risk gaps</li><li>We implemented a unified governance layer that sat on top of existing systems first</li><li>We prioritized connecting the most critical applications to this governance layer</li><li>We created a three-year roadmap to gradually replace legacy identity systems</li></ol><p>With each phase, we reduced risk while moving toward our ideal architecture. Business leaders supported the approach because it delivered incremental value without disrupting operations.</p><h2 id="when-to-push-back-on-operational-constraints">When to Push Back on Operational Constraints</h2><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Not all operational constraints deserve equal respect. Some need to be challenged directly. But how do you know which ones?</div></div><p>I use a simple framework:</p><ol><li><strong>High risk, high business value</strong>: Partner on risk reduction. When critical business systems have security flaws, work closely with business leaders on compensating controls while developing upgrade paths.</li><li><strong>High risk, low business value</strong>: Challenge these constraints aggressively. If a legacy system creates significant security risk but delivers minimal business value, push hard for replacement.</li><li><strong>Low risk, any business value</strong>: Focus elsewhere. Not every legacy system needs immediate attention. Prioritize your efforts where risks are highest.</li></ol><p>The&nbsp;<a href="https://www.mccarygroup.com/automation/navigating-legacy-system-modernization-strategies-and-risks-for-2025/?ref=mandos.io">McCary Group</a>&nbsp;points out that strategic modernization requires understanding that "legacy systems have historically served as the backbone of many organizations, yet they now present significant challenges." The key is to identify which challenges represent genuine security risks.</p><h2 id="building-a-culture-of-security-pragmatism">Building A Culture of Security Pragmatism</h2><p>For this approach to succeed, you need more than just a strategy – you need a culture of security pragmatism throughout your team.</p><p>This starts with how you hire. Look for security professionals who understand both technical security and business realities. Value those who can translate complex security concepts into business terms.</p><p>Next, set clear expectations. Make it clear that "perfect" security isn't the goal – effective risk management is. Recognize team members who find creative solutions to secure legacy systems, not just those who identify problems.</p><p>Finally, invest in relationship building. Security teams that have strong relationships with IT operations and business units can accomplish far more than those who remain isolated.</p><h2 id="the-bottom-line">The Bottom Line</h2><p>The tension between security idealism and operational reality isn't going away. But you don't have to choose one over the other.</p><p>By setting a clear security vision, understanding your current reality, and building a pragmatic roadmap between them, you can deliver real security improvements without ignoring business constraints.</p><p>Remember that securing legacy systems isn't a temporary problem to solve – it's an ongoing challenge to manage. Every organization has legacy systems, and there will always be operational constraints on security. Your job isn't to eliminate these constraints, but to work effectively within and around them.</p><p>As security leaders, our ultimate measure isn't how perfect our security architecture looks on paper. It's how effectively we reduce risk while enabling the business to thrive.</p><p>So yes, be an idealist about where you want to go. But be a pragmatist about how you get there. Your perfect security architecture might take years to fully realize, but with the right approach, you can make meaningful progress every step of the way.</p><p>That's not just effective security leadership – it's how you deliver lasting value to your organization.</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #103: Cisco Perfect 10 Vulnerability, CrowdStrike Layoffs, Cybersecurity Budget Increases ]]></title>
        <description><![CDATA[ Cisco IOS XE controllers face CVSS 10.0 vulnerability allowing root access. GitHub Actions security recommendations following supply chain attacks. New Shadow MCP servers creating AI governance gaps. ]]></description>
        <link>https://mandos.io/newsletter/brief-103-cisco-perfect-10-vulnerability-crowdstrike-layoffs-cybersecurity-budget-increases/</link>
        <guid isPermaLink="false">681f21da50ab450001853050</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 11 May 2025 13:00:18 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/05/19.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>The budget increases reported in this week's threat management report (71% of orgs boosting security spending) show we're responding to growing threats, but I wonder if we're investing in the right places when only 29% feel prepared for AI-powered attacks.</p><p>In this week's brief:</p><ul><li>GitHub Actions security hardening recommendations to protect against supply chain attacks</li><li>The emerging risk of "Shadow MCP Servers" giving AI tools unchecked access to systems</li><li>Insights from a cybersecurity manager who quit their Fortune 100 role over corporate politics</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Are you seeing AI tools being deployed in your organization without proper security oversight?</strong></b><br><br><i><em class="italic" style="white-space: pre-wrap;">I'd love to hear your thoughts. Reply directly to this email or share your thoughts in comments section below.</em></i></div></div><div class="kg-card kg-cta-card kg-cta-bg-grey kg-cta-minimal   " data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">BECOME A SPONSOR</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Get your product or service in front of 1200+ cybersecurity leaders and professionals.</span></p>
                        </div>
                    
                    
                        <a href="https://mandos.io/contact/" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Learn more
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="critical-github-actions-security-hardening-recommendations-following-supply-chain-attacks"><a href="https://www.wiz.io/blog/github-actions-security-guide?ref=mandos.io">Critical GitHub Actions Security Hardening Recommendations Following Supply Chain Attacks</a></h3>
<ul>
<li>
<p>Recent <strong>supply chain</strong> attacks including the tj-actions compromise demonstrate how attackers exploit GitHub Actions vulnerabilities through compromised Personal Access Tokens and poisoned workflows.</p>
</li>
<li>
<p>Configure organization-level protections by setting default workflow permissions to read-only, limiting to verified actions, using repository allowlists, and implementing proper <strong>secrets</strong> management to prevent credential exposure.</p>
</li>
<li>
<p>Mitigate <strong>Poisoned Pipeline Execution</strong> risks by avoiding dangerous triggers like pull_request_target, hash-pinning third-party actions, and isolating self-hosted runners by trust level with ephemeral infrastructure where possible.</p>
</li>
</ul>
<h3 id="critical-vulnerability-in-cisco-ios-xe-wireless-controllers-allows-file-upload-and-root-access"><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC?ref=mandos.io">Critical Vulnerability In Cisco IOS XE Wireless Controllers Allows File Upload And Root Access</a></h3>
<ul>
<li>
<p>A <strong>critical</strong> vulnerability (CVE-2025-20188) with CVSS 10.0 in Cisco IOS XE Wireless LAN Controllers allows unauthenticated attackers to upload arbitrary files and execute commands with <strong>root</strong> privileges due to a hard-coded JWT.</p>
</li>
<li>
<p>The vulnerability affects multiple Catalyst 9800 series controllers but only impacts systems with the Out-of-Band AP Image Download feature enabled, which is not enabled by default.</p>
</li>
<li>
<p>Cisco has released patches and recommends disabling the vulnerable feature as a temporary <strong>mitigation</strong> until updates can be applied, as no other workarounds are available.</p>
</li>
</ul>
<h3 id="sophisticated-rat-malware-campaign-uses-geo-fencing-and-legitimate-services"><a href="https://www.fortinet.com/blog/threat-research/multilayered-email-attack-how-a-pdf-invoice-and-geofencing-led-to-rat-malware?ref=mandos.io">Sophisticated RAT Malware Campaign Uses Geo-Fencing and Legitimate Services</a></h3>
<ul>
<li>
<p>FortiMail discovered a multilayered email attack distributing <strong>RAT</strong> malware targeting organizations in Spain, Italy, and Portugal through fake invoice emails that bypass SPF checks by exploiting the legitimate serviciodecorreo email service.</p>
</li>
<li>
<p>The attack employs sophisticated evasion techniques including <strong>geofencing</strong> that serves malicious content only to Italian IP addresses while showing harmless decoy files to others, allowing it to bypass security scanners operating from non-targeted regions.</p>
</li>
<li>
<p>The malware leverages multiple legitimate services (Dropbox, MediaFire, Google Drive) and <strong>Ngrok</strong> tunneling to deliver a Java-based Remote Access Trojan that can execute commands, log keystrokes, and steal data on systems with Java Runtime Environment installed.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="2025-cybersecurity-threat-and-risk-management-report-shows-budget-increases-amid-rising-incidents"><a href="https://drive.google.com/file/d/1bA3XG6HWs2COy7adSUKCLHKtyaNu7ljp/view?usp=drivesdk&ref=mandos.io">2025 Cybersecurity Threat and Risk Management Report Shows Budget Increases Amid Rising Incidents</a></h3>
<ul>
<li>
<p>71% of organizations are increasing their cybersecurity <strong>budgets</strong> to an average of $24 million, with 66% reporting an increase in cybersecurity incidents over the past year (up from 61% in 2024).</p>
</li>
<li>
<p>Organizations are prioritizing internal assessments of security practices (63%), investing in more cybersecurity tools (56%), and implementing SASE/SSE architectures, with 66% having fully or partially deployed these <strong>solutions</strong>.</p>
</li>
<li>
<p>High-performing organizations demonstrate better <strong>practices</strong> including consistent enterprise-wide incident response plans, regular C-level briefings, and greater visibility into AI systems (64% vs 42% for other respondents).</p>
</li>
</ul>
<h3 id="2025-futures-report-organizations-underprepared-for-ai-powered-cybersecurity-threats"><a href="https://drive.google.com/file/d/1D0RLX5O6T94E7Psw1PTJWHta9FCLzppG/view?usp=drivesdk&ref=mandos.io">2025 Futures Report: Organizations Underprepared for AI-Powered Cybersecurity Threats</a></h3>
<ul>
<li>
<p>Only 29% of organizations report being prepared for <strong>AI-powered</strong> threats, despite 42% expecting them in the next year. The research surveyed 1,500 executives across 14 countries and found that 30% suffered a breach in the past 12 months.</p>
</li>
<li>
<p>Organizations are experiencing a significantly higher volume of attacks (41%) with emerging threats including deepfakes (44% expect them but only 32% feel prepared) and software supply chain vulnerabilities (49% report low to moderate visibility). <strong>Resilient</strong> organizations invest more in advanced threat detection (91% vs 63% overall).</p>
</li>
<li>
<p>Enterprise alignment of cybersecurity with business objectives is improving – 66% report cybersecurity teams aligned with business units and 60% measure leadership roles against cybersecurity KPIs. However, CEOs (38%) are more concerned than CIOs (22%) that their <strong>reactive</strong> approach to cybersecurity puts their business at risk.</p>
</li>
</ul>
<h3 id="ransomware-attacks-decline-in-april-with-qilin-gang-rising-as-ransomhub-goes-dark"><a href="https://www.comparitech.com/news/ransomware-roundup-april-2025/?ref=cybersecstats.com">Ransomware Attacks Decline in April With Qilin Gang Rising as RansomHub Goes Dark</a></h3>
<ul>
<li>
<p>Comparitech researchers logged 479 <strong>ransomware</strong> attacks in April 2025 (39 confirmed), showing a significant decline from Q1 figures partly due to RansomHub going dark, while Qilin emerged as the most prolific strain with 67 attacks.</p>
</li>
<li>
<p><strong>Healthcare</strong> sector saw increased targeting with six confirmed attacks across different countries, including DaVita Inc. hit by Interlock (1.5TB data stolen) and ChangShen Hospital targeted by NightSpire (800GB data stolen).</p>
</li>
<li>
<p>Despite the overall decline, several high-profile attacks occurred, including Marks &amp; Spencer (attributed to Scattered <strong>Spider</strong>) and Oregon Department of Environmental Quality facing a $2.7 million <strong>ransom</strong> demand from Rhysida.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-manager-quits-fortune-100-role-due-to-corporate-politics"><a href="https://www.reddit.com/r/cybersecurity/comments/1kdq491/i_did_it_i_quit_my_manager_role_to_take_a_break/?ref=mandos.io">Cybersecurity Manager Quits Fortune 100 Role Due to Corporate Politics</a></h3>
<ul>
<li>
<p>Former security engineering <strong>manager</strong> at a Fortune 100 company resigned without another position lined up, citing corporate politics, favoritism, and constant firefighting as primary reasons for departure.</p>
</li>
<li>
<p>The professional, previously a SOC team lead during the Log4j crisis, plans to travel and <strong>upskill</strong> while taking a career break before returning to the job market.</p>
</li>
<li>
<p>Several commenters shared similar experiences, with one noting they left management to return to an individual contributor role with better <strong>work-life</strong> balance despite lower compensation.</p>
</li>
</ul>
<h3 id="devsecops-jobs-face-uncertain-future-as-ai-and-cloud-solutions-advance"><a href="https://www.reddit.com/r/SecurityCareerAdvice/comments/1kct13h/do_you_think_there_will_still_be_jobs_for/?ref=mandos.io">DevSecOps Jobs Face Uncertain Future as AI and Cloud Solutions Advance</a></h3>
<ul>
<li>
<p>Reddit users debate if DevSecOps engineers will still have jobs in 10 years, with many believing <strong>automation</strong> and agentic AI will significantly reduce the need for dedicated specialists.</p>
</li>
<li>
<p>Several professionals suggest DevSecOps will evolve rather than disappear – likely becoming integrated with <strong>cloud</strong>-based DevOps as security functions become more accessible and user-friendly.</p>
</li>
<li>
<p>Complex tasks like debugging Static Application Security Testing (<strong>SAST</strong>) scans in sophisticated workflows may continue to require human expertise, as these involve edge cases AI might struggle to address fully.</p>
</li>
</ul>
<h3 id="cybersecurity-salary-guide-2025-reveals-persistent-skills-gap-and-rising-compensation"><a href="https://drive.google.com/file/d/1LFx65-ClUD7g17LL-uPlHD3YJtFeGZ-K/view?usp=drivesdk&ref=mandos.io">Cybersecurity Salary Guide 2025 Reveals Persistent Skills Gap and Rising Compensation</a></h3>
<ul>
<li>
<p>The global cybersecurity workforce gap has increased by 8% since last year, with Europe facing a deficit of 300,000 skilled professionals, highlighting the critical need for collaboration between governments, academia, and private companies to invest in <strong>training</strong> programs.</p>
</li>
<li>
<p>Specialist roles command significant compensation, with senior positions like Enterprise Security Architect (€120,189-€147,522), Cloud Security Architect (€120,189-€147,522), and Incident Analyst (€115,000-€173,250) seeing the highest <strong>salaries</strong> in the Netherlands market.</p>
</li>
<li>
<p>Key factors reshaping the 2025 cybersecurity landscape include economic constraints forcing strategic resource optimization, growing cloud security challenges, rising <strong>geopolitical</strong> tensions affecting critical infrastructure, and the continued integration of <strong>AI</strong> in cybersecurity operations.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="shadow-mcp-servers-emerge-as-new-security-risk-for-ai-tools"><a href="https://www.prompt.security/blog/the-new-risk-in-town-shadow-mcp-servers?ref=mandos.io">Shadow MCP Servers Emerge as New Security Risk for AI Tools</a></h3>
<ul>
<li>
<p>Model Context Protocol (MCP) servers act as bridge layers giving AI assistants like Claude and Cursor the ability to execute <strong>commands</strong> on local systems, including running shell scripts, editing files, and connecting to databases.</p>
</li>
<li>
<p>The rise of "Shadow MCPs" occurs when employees add MCP servers without oversight, creating a significant <strong>governance</strong> gap as AI tools gain access to sensitive data and production systems without proper security controls.</p>
</li>
<li>
<p>Security teams should inventory all MCP servers, implement approval flows, and monitor AI interactions, with Prompt Security offering solutions for <strong>visibility</strong> and control of these emerging AI extension points.</p>
</li>
</ul>
<h3 id="wiz-launches-mcp-server-ai-powered-cloud-security-integration"><a href="https://www.wiz.io/blog/introducing-mcp-server-for-wiz?ref=mandos.io">Wiz Launches MCP Server: AI-Powered Cloud Security Integration</a></h3>
<ul>
<li>
<p>Wiz has released its Model Context Protocol (MCP) Server in preview, allowing <strong>integration</strong> between AI models and security tools through a standard gaining support from OpenAI, Microsoft, and Google.</p>
</li>
<li>
<p>The MCP Server creates a unified security data source that simplifies investigations by connecting multiple data sources, providing instant <strong>visibility</strong> into cloud inventory and enriching security operations with precise business context.</p>
</li>
<li>
<p>Key use cases include code <strong>vulnerability</strong> remediation within development environments, attack surface reduction through real-time threat detection, and natural language querying for cloud security <strong>posture</strong> assessment.</p>
</li>
</ul>
<h3 id="morgan-stanley-successfully-implements-enterprise-wide-ai-with-focus-on-evaluation"><a href="https://drive.google.com/file/d/10wynWV-jhTZW7B9A1qHtPNQHNCcFReHD/view?usp=drivesdk&ref=mandos.io">Morgan Stanley Successfully Implements Enterprise-Wide AI With Focus On Evaluation</a></h3>
<ul>
<li>
<p>Morgan Stanley deployed OpenAI's technology with a systematic <strong>evaluation</strong> process to ensure quality and safety, resulting in 98% of advisors now using AI daily and document access increasing from 20% to 80%.</p>
</li>
<li>
<p>The financial services company focused on three initial evaluation areas: language translation, summarization accuracy, and comparison against human expert responses to build <strong>confidence</strong> for production implementation.</p>
</li>
<li>
<p>Enterprise AI adoption delivers measurable improvements in workforce performance, routine <strong>automation</strong>, and enhanced product experiences, with Morgan Stanley advisors now spending more time on client relationships.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ox-security-raises-60-million-in-series-b-funding"><a href="https://www.finextra.com/newsarticle/45958/ox-security-closes-series-b-at-60-million?ref=mandos.io">Ox Security Raises $60 Million in Series B Funding</a></h3>
<ul>
<li>
<p>Ox Security, an <strong>AppSec</strong> platform specializing in code protection, secured $60 million in Series B funding led by DTCP with participation from Swisscom, IBM, Evolution Equity, and Team 8, bringing their total funding to $94 million.</p>
</li>
<li>
<p>The company's proprietary Code Projection <strong>technology</strong> analyzes how code behaves in real-world environments, focusing on evaluating reachability, exploitability, and business impact to identify the critical 5% of vulnerabilities that pose genuine <strong>risk</strong>.</p>
</li>
<li>
<p>Ox is developing <strong>AI</strong>-powered agentic code review capabilities to address challenges with AI-generated code, which may contain structural flaws undetectable by traditional security tools.</p>
</li>
</ul>
<h3 id="crowdstrike-lays-off-500-workers-as-ai-improves-operational-efficiency"><a href="https://www.bankinfosecurity.com/crowdstrike-lays-off-500-workers-as-ai-flattens-hiring-curve-a-28340?ref=mandos.io">CrowdStrike Lays Off 500 Workers as AI Improves Operational Efficiency</a></h3>
<ul>
<li>
<p>CrowdStrike is reducing its workforce by 5% (500 employees) as the company leverages <strong>AI</strong> to increase operational efficiency, with CEO George Kurtz noting that artificial intelligence "flattens our hiring curve" and serves as a "force multiplier throughout the business."</p>
</li>
<li>
<p>The <strong>layoffs</strong> represent the second-largest workforce reduction in the cybersecurity industry since 2020, with the company expecting to spend between $36-53 million on severance payments and stock-based compensation while continuing to "prudently hire" in customer-facing and product engineering roles.</p>
</li>
<li>
<p>Despite ongoing challenges including the July 2024 <strong>Falcon</strong> platform update that disrupted 8.5 million systems and cost $60 million in expenses, CrowdStrike reaffirmed its guidance for the fiscal year ending January 2026 and maintains its goal of reaching $10 billion in annual recurring revenue.</p>
</li>
</ul>
<h3 id="minimus-launches-platform-reducing-application-security-vulnerabilities-by-95"><a href="https://www.prnewswire.com/news-releases/minimus-launches-at-rsac-2025-reducing-application-security-vulnerabilities-by-over-95-302439323.html?ref=mandos.io">Minimus Launches Platform Reducing Application Security Vulnerabilities by 95%</a></h3>
<ul>
<li>
<p>Pioneering application security startup Minimus unveiled a platform that eliminates over 95% of Common <strong>Vulnerabilities</strong> and Exposures (CVEs) from software <strong>supply chains</strong>, backed by a $51 million seed round from YL Ventures and Mayfield.</p>
</li>
<li>
<p>The platform provides secure, minimal <strong>container</strong> images and virtual machines that seamlessly replace existing artifacts in development workflows with a single configuration change, allowing organizations to avoid rather than remediate vulnerabilities.</p>
</li>
<li>
<p>Minimus integrates threat intelligence throughout its platform, providing real-time insight into active <strong>exploits</strong> and EPSS/CISA-KEV metrics for prioritizing the remaining 5% of CVEs.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="strobes-aspm"><a href="https://cybersectools.com/tools/strobes-aspm?ref=mandos.io">Strobes ASPM</a></h3>
<p>A threat exposure management platform that unifies security operations by discovering assets, prioritizing vulnerabilities based on risk, and providing guided remediation across an organization's attack surface.</p>
<h3 id="seemplicity"><a href="https://cybersectools.com/tools/seemplicity?ref=mandos.io">Seemplicity</a></h3>
<p>A remediation operations platform that streamlines vulnerability management by connecting security findings to fixing teams through automated workflows.</p>
<h3 id="beagle-security"><a href="https://cybersectools.com/tools/beagle-security?ref=mandos.io">Beagle Security</a></h3>
<p>An automated security testing platform that performs AI-driven penetration testing and vulnerability assessment for web applications and APIs with compliance reporting capabilities.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Why Your Security Team is Wasting 70% of Their Time on Phantom Threats And How to Fix It ]]></title>
        <description><![CDATA[ Your security team is spending 70% of their time chasing ghosts. Here&#39;s how to reclaim those hours for strategic work that actually matters. ]]></description>
        <link>https://mandos.io/blog/why-your-security-team-is-wasting-70-of-their-time-on-phantom-threats-and-how-to-fix-it/</link>
        <guid isPermaLink="false">67f52b324b191d0001c8ff8d</guid>
        <category><![CDATA[ Cybersecurity ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 06 May 2025 16:00:25 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/incident-response-delusion.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Last Friday at 2:47 AM, your on-call security analyst was jolted awake by an urgent alert. The SIEM flagged suspicious authentication activity from an executive's account- potentially the early stages of a privileged access compromise.</p><p>After 90 minutes of painstaking investigation, correlating logs, checking endpoints, and running deep analysis on traffic patterns, the truth emerged: the executive was simply traveling internationally and logging in from a new location. Despite following proper protocols and using approved devices, the system triggered a high-priority incident.</p><p>This same story replayed across your security operations center 212 more times last month.</p><p>Sound familiar? You're not alone.</p><p>I've spent the past 13 years watching security teams trapped in this exhausting cycle. We've collectively built an incident response machine that's choking on its own alerts, draining the life from our teams, and undermining our strategic capabilities. And the worst part? We keep feeding this beast, thinking we're doing the right thing.</p><p>I'm here to tell you: we're deluding ourselves.</p><p>In this article you will get a no-nonsense approach to radically transform your incident response function to eliminate false positives, reclaim thousands of operational hours, and redirect your team toward strategic initiatives that genuinely improve your security posture. </p><p>At the end of the article Mandos Prime members will also get a step-by-step Notion blueprint to actually implement the changes and transform their IR processes.</p><h2 id="the-brutal-reality-of-false-positives">The Brutal Reality of False Positives</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image.png" class="kg-image" alt="cybersecurity SOC team time spent" loading="lazy" width="1472" height="832" srcset="https://mandos.io/content/images/size/w600/2025/04/image.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image.png 1000w, https://mandos.io/content/images/2025/04/image.png 1472w" sizes="(min-width: 720px) 720px"></figure><p>According to recent cybersecurity research, a staggering&nbsp;<strong>70% of SOC team time</strong>&nbsp;is spent investigating alerts that turn out to be false positives (<a href="https://veriti.ai/blog/the-true-cost-of-false-positives-impact-on-security-teams-and-business-operations/?ref=mandos.io">source</a>). That's not just inefficient - it's professionally negligent given today's threat landscape.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><p>The numbers get even more alarming:</p><ul><li>33% of companies have been late responding to actual cyberattacks because they were tied up investigating false positives (<a href="https://www.vikingcloud.com/blog/cybersecurity-statistics?ref=mandos.io">source</a>)</li><li>63% of cyber teams spend 4+ hours weekly dealing with false positives</li><li>15% spend more than 7 hours weekly on these phantom threats</li></ul><p>While your analysts are busy investigating that executive's legitimate login from London, they're missing the actual ransomware dropper that just bypassed your perimeter controls.</p><p><strong>But here's the most damning statistic of all:</strong>&nbsp;The vast majority of security teams know they have this problem, yet continue with the same broken approach, typically adding more tools and more alerts to the already overwhelming pile.</p><h2 id="why-were-stuck-in-this-loop">Why We're Stuck in This Loop</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/why-we-are-stuck-in-the-loop.png" class="kg-image" alt="" loading="lazy" width="1442" height="1081" srcset="https://mandos.io/content/images/size/w600/2025/04/why-we-are-stuck-in-the-loop.png 600w, https://mandos.io/content/images/size/w1000/2025/04/why-we-are-stuck-in-the-loop.png 1000w, https://mandos.io/content/images/2025/04/why-we-are-stuck-in-the-loop.png 1442w" sizes="(min-width: 720px) 720px"></figure><p>Let's examine why intelligent security leaders keep reinforcing this broken model:</p><ol><li><strong>The Perception Problem</strong>: No CISO ever got fired for investigating too many incidents. But miss one real attack? Career suicide. This asymmetrical risk creates perverse incentives.</li><li><strong>Compliance Blindness</strong>: Many incident response programs are designed primarily to satisfy auditors rather than actually secure the business. We've prioritized documenting our response over making that response effective.</li><li><strong>Tool Proliferation Without Integration</strong>: The average enterprise now has 76 different security tools. Each one operates in isolation, generating its own alerts with its own limited context, overwhelming your analysts.</li><li><strong>The Myth of the "Unicorn Analyst"</strong>: We've built programs assuming we'll find and retain security unicorns who can efficiently investigate anything from network anomalies to WAF exploits. These people don't exist in sufficient numbers.</li><li><strong>False Comfort from Activity</strong>: Security executives often confuse analyst busyness with effectiveness. "My team closed 300 incidents this month!" sounds impressive until you realize 90% were false alarms.</li></ol><p>At one of my previous employers, I discovered their security team spent 14,400 analyst hours in a single quarter investigating what turned out to be benign activity. That's approximately seven full-time employees achieving literally nothing for an entire year.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text"><i><em class="italic" style="white-space: pre-wrap;">The average security team wastes over 14,000 hours annually investigating false positives. That's equivalent to 7 full-time security analysts achieving nothing for an entire year.</em></i></div></div><h2 id="the-real-cost-beyond-wasted-hours">The Real Cost Beyond Wasted Hours</h2><p>The damage extends far beyond operational inefficiency:</p><p><strong>Analyst Burnout and Attrition</strong>: Alert fatigue is driving our best people out of the field entirely. According to recent surveys, security professionals who moved from incident response to consulting reported substantially lower stress levels (<a href="https://www.informationweek.com/cyber-resilience/the-psychology-of-cybersecurity-burnout?ref=mandos.io">source</a>).</p><p><strong>Decreased Vigilance</strong>: Psychologically, humans are terrible at sustaining attention when false positives are common. Your analysts become desensitized, inevitably missing critical alerts buried among the noise.</p><p><strong>Opportunity Cost</strong>: Every hour spent on false positives is an hour not spent on proactive threat hunting, security architecture improvements, or strategic risk reduction.</p><p>As one CISO at a healthcare organization recently confided: "We've built an incredible machine for detecting minor problems while completely losing sight of what actually matters to the business."</p><h2 id="breaking-free-the-path-forward">Breaking Free: The Path Forward</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/a.png" class="kg-image" alt="" loading="lazy" width="2000" height="1226" srcset="https://mandos.io/content/images/size/w600/2025/04/a.png 600w, https://mandos.io/content/images/size/w1000/2025/04/a.png 1000w, https://mandos.io/content/images/size/w1600/2025/04/a.png 1600w, https://mandos.io/content/images/2025/04/a.png 2000w" sizes="(min-width: 720px) 720px"></figure><p>Enough doom and gloom. Let's talk solutions - not theoretical frameworks, but practical approaches I've implemented with real organizations that have transformed their incident response function.</p><!--members-only--><h3 id="1-prioritize-ruthlessly-with-context-rich-alerts">1. Prioritize Ruthlessly with Context-Rich Alerts</h3><p>The foundation of modern incident response must be ruthless prioritization based on actual risk, not just technical triggers. This means:</p><ul><li><strong>Implement Risk-Based Alert Scoring</strong>: Every alert should carry a dynamic risk score based on the asset involved, user context, and potential impact - not just technical severity.</li><li><strong>Eliminate All Zero-Value Alerts</strong>: If an alert has consistently led to no action over time, it should be automatically disabled or severely demoted. Be brutal here.</li><li><strong>Enrich with Business Context</strong>: Security alerts without business context are nearly worthless. Integrate your CMDB, IAM systems, and asset management tools with your detection stack.</li></ul><p>At a mid-sized financial institution, we reduced their daily alert volume from 3,600 to just 87 high-fidelity alerts by implementing dynamic risk scoring. The result? They caught more actual threats despite investigating 96% fewer alerts.</p><h3 id="2-embrace-automated-response-not-just-detection">2. Embrace Automated Response (Not Just Detection)</h3><p>Automation isn't just about detection - it's about response:</p><ul><li><strong>Implement No-Human-Required Playbooks</strong>: For common, well-understood scenarios, build fully automated response workflows. No human should ever investigate a known-benign pattern.</li><li><strong>Use AI for Initial Triage</strong>: Modern AI-driven SOAR platforms can now perform initial investigation steps, gathering context and presenting analysts with summarized findings rather than raw alerts.</li><li><strong>Automate the Tedious Middle</strong>: The investigation steps between alert and resolution are often repetitive. Automate log collection, context gathering, and correlation.</li></ul><p>Jonathan Fischbein, CISO at Check Point, implemented this approach and reported: "We can react automatically to problems before they become security incidents" while significantly reducing analyst fatigue (<a href="https://www.techtarget.com/searchSecurity/feature/How-AI-driven-SOC-tech-eased-alert-fatigue-Case-study?ref=mandos.io">source</a>).</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h3 id="3-redesign-the-analyst-experience">3. Redesign the Analyst Experience</h3><p>Your analysts aren't alert-processing machines. They're skilled investigators being crushed under repetitive tasks:</p><ul><li><strong>Implement a "No Alert Left Behind" Policy</strong>: Every single false positive should trigger an immediate tuning review. Make this a core metric.</li><li><strong>Create Feedback Loops</strong>: When analysts identify false positives, they should have direct channels to detection engineering to prevent recurrence.</li><li><strong>Rotate Responsibilities</strong>: Analysts stuck in alert triage for extended periods burn out. Create rotation programs that balance tactical and strategic work.</li></ul><p>One organization I worked with reduced false positives by 83% in six months by implementing analyst feedback loops and making tuning a shared responsibility across security engineering and operations.</p><h3 id="4-leverage-ai-but-get-specific">4. Leverage AI, But Get Specific</h3><p>AI isn't a magic solution, but specific applications can transform incident response:</p><ul><li><strong>Pattern Recognition</strong>: Use machine learning to identify patterns in historical false positives and automatically suppress similar future alerts.</li><li><strong>Natural Language Processing for Documentation</strong>: Deploy AI to automatically document investigations, freeing analysts from administrative burdens.</li><li><strong>Anomaly Contextualization</strong>: AI can rapidly correlate seemingly unrelated events that humans would take hours to piece together.</li></ul><p>A recent implementation of AI-assisted analysis at a healthcare provider reduced investigation time for common scenarios by 62% while simultaneously increasing detection accuracy.</p><h2 id="a-blueprint-for-immediate-action">A Blueprint for Immediate Action</h2><p>Here's your 30-day plan to begin the transformation:</p><ol><li><strong>Perform Alert Triage Analysis</strong>: Document every alert source, volume, and false positive rate. Be ruthless about identifying low-value noise.</li><li><strong>Implement a False Positive Tracker</strong>: Create a simple system to log every false positive, its source, and the time spent investigating.</li><li><strong>Identify Your Top 5 "Time Sink" Scenarios</strong>: Which alert patterns consistently waste the most analyst time? These are your first automation targets.</li><li><strong>Set Up a Basic Automation Framework</strong>: Even simple scripting can eliminate repetitive investigation steps. Start with basic log correlation and context gathering.</li><li><strong>Establish Baseline Metrics</strong>: You can't improve what you don't measure. Track false positive rates, mean time to investigate, and analyst hours recovered.</li></ol><p>When I implemented this approach at a global manufacturing firm, they recovered over 6,200 analyst hours in the first year - effectively adding three FTEs to their security team without hiring a single person.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-immersive    " data-layout="immersive">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">📄 PRACTICAL FRAMEWORK</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Ready to implement the steps to transform your incident response? </span></p><p><span style="white-space: pre-wrap;">Grab the blueprint and start building.</span></p>
                        </div>
                    
                    
                        <a href="https://mandosio.notion.site/Incident-Response-Transformation-False-Positive-Elimination-Blueprint-1cfc6c673b548035883dfceb35aa58f5?ref=mandos.io" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Get the Blueprint
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-real-strategic-advantage">The Real Strategic Advantage</h2><p>The ultimate goal isn't just operational efficiency. It's strategic realignment.</p><p>When your security team spends less time chasing ghosts, they can focus on truly strategic initiatives:</p><ul><li>Threat hunting to find what your tools missed</li><li>Architectural improvements to eliminate entire classes of vulnerabilities</li><li>Business enablement through security design patterns</li><li>Strategic risk assessment and remediation</li></ul><p>One CISO I worked with put it perfectly: "We used to measure success by how many incidents we handled. Now we measure it by how few incidents actually matter - and how quickly we resolve the ones that do."</p><h2 id="the-bottom-line">The Bottom Line</h2><p>The incident response delusion persists because we've accepted a broken status quo. We've convinced ourselves that drowning in alerts is just "how security works."</p><p>It doesn't have to be this way.</p><p>By implementing risk-based prioritization, embracing thoughtful automation, redesigning the analyst experience, and leveraging targeted AI solutions, you can transform your incident response function from a reactive alert factory into a strategic security capability.</p><p>The organizations that break free from the false positive trap don't just operate more efficiently - they fundamentally transform their security posture, moving from reactive firefighting to proactive risk management.</p><p>The question isn't whether you can afford to make these changes. It's whether you can afford not to.</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #102: AirPlay Vulnerabilities, Passkeys Replace Passwords, MCP Security Risks ]]></title>
        <description><![CDATA[ Lazarus Group deploys triple malware threat through fake crypto companies. Dwell time increases for first time since 2010. Palo Alto Networks acquires Protect AI for $500+ million. ]]></description>
        <link>https://mandos.io/newsletter/brief-102-airplay-vulnerabilities-passkeys-replace-passwords-mcp-security-risks/</link>
        <guid isPermaLink="false">6815bb3ff83ed30001f3bbd4</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 04 May 2025 13:00:17 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/05/18.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I've been thinking about our industry's persistent password problem all week, and it's encouraging to see Microsoft finally making passkeys the default for new accounts. While this is a significant step forward, Ivanti's latest report reveals a concerning gap - only 22% of organizations are increasing investments in exposure management despite half of security professionals recognizing its value.</p><p>In this week's brief:</p><ul><li>North Korean threat actors are creating fake crypto companies to deploy triple malware threats</li><li>The Model Context Protocol (MCP) introduces new security risks despite backing from tech giants</li><li>Cybersecurity professionals emphasize that system administration experience is fundamental to security careers</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-text">Question of the Week:<br><br><b><strong style="white-space: pre-wrap;">What's your take - are we finally seeing the beginning of the end for passwords, or will they continue to haunt us for another decade?</strong></b><br><br><i><em class="italic" style="white-space: pre-wrap;"> I'd love to hear your thoughts. Reply directly to this email or share your thoughts in comments section below.</em></i></div></div><div class="kg-card kg-cta-card kg-cta-bg-grey kg-cta-minimal   " data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">BECOME A SPONSOR</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Get your cybersecurity product or resource in front of 1100+ cybersecurity leaders and professionals.</span></p>
                        </div>
                    
                    
                        <a href="https://mandos.io/contact/" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Learn more
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="researchers-discover-airborne-vulnerability-affecting-millions-of-airplay-enabled-devices"><a href="https://www.wired.com/story/airborne-airplay-flaws/?ref=mandos.io">Researchers Discover "AirBorne" Vulnerability Affecting Millions of AirPlay-Enabled Devices</a></h3>
<ul>
<li>
<p>Security firm Oligo revealed a collection of <strong>vulnerabilities</strong> in Apple's AirPlay SDK that could allow attackers on the same Wi-Fi network to hijack third-party AirPlay-enabled devices like speakers, TVs, and set-top boxes, potentially affecting tens of <strong>millions</strong> of devices.</p>
</li>
<li>
<p>While Apple has patched these flaws in their own devices, many third-party manufacturers may never update their <strong>firmware</strong>, leaving a persistent security risk that could allow attackers to maintain stealthy network access, install <strong>ransomware</strong>, or even turn devices with microphones into listening devices.</p>
</li>
<li>
<p>The vulnerabilities also affect CarPlay-enabled vehicle dashboard computers, though exploitation requires physical access via Bluetooth or USB connection, significantly limiting the threat vector in automotive applications.</p>
</li>
</ul>
<h3 id="microsoft-makes-passkeys-default-for-new-microsoft-accounts"><a href="https://thehackernews.com/2025/05/microsoft-sets-passkeys-default-for-new.html?ref=mandos.io">Microsoft Makes Passkeys Default for New Microsoft Accounts</a></h3>
<ul>
<li>
<p>Microsoft has made new accounts "passwordless by default," enabling users to sign in with <strong>phishing</strong>-resistant passkeys instead of traditional passwords, while existing users can delete their passwords through account settings.</p>
</li>
<li>
<p>The company has simplified the sign-in experience by automatically detecting and prioritizing the best available <strong>authentication</strong> method on a user's account, representing a significant step toward industry-wide passwordless adoption.</p>
</li>
<li>
<p>Over 15 billion user accounts now support passkeys, and the FIDO Alliance is working on improving credential <strong>interoperability</strong> across providers and expanding passkey implementation to payment use cases through a new Payments Working Group.</p>
</li>
</ul>
<h3 id="north-korean-apt-contagious-interview-establishes-fake-crypto-companies-to-deliver-triple-malware-threat"><a href="https://www.silentpush.com/blog/contagious-interview-front-companies/?ref=mandos.io">North Korean APT "Contagious Interview" Establishes Fake Crypto Companies to Deliver Triple Malware Threat</a></h3>
<ul>
<li>
<p>Silent Push researchers uncovered three cryptocurrency <strong>front</strong> companies operated by North Korean APT group "Contagious Interview" (a subgroup of <strong>Lazarus</strong>) used to deploy BeaverTail, InvisibleFerret, and OtterCookie <strong>malware</strong> through fake job interviews targeting crypto professionals.</p>
</li>
<li>
<p>The threat actors created convincing company personas using AI-generated employee images, fake business registrations, and elaborate social media presence, while their infrastructure revealed significant operational security failures linking all three companies: BlockNovas LLC, Angeloper Agency, and SoftGlide LLC.</p>
</li>
<li>
<p>The <strong>cryptocurrency</strong> theft campaign uses a multi-stage infection process involving GitHub repositories with hidden code, fake job interviews requiring video recordings, and malware that establishes persistence across Windows, macOS, and Linux to steal wallet credentials from popular browser extensions.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ivantis-2025-state-of-cybersecurity-report-highlights-shift-to-exposure-management"><a href="https://www.ivanti.com/resources/research-reports/state-of-cybersecurity-report?ref=cybersecstats.com">Ivanti's 2025 State of Cybersecurity Report Highlights Shift To Exposure Management</a></h3>
<ul>
<li>
<p>Exposure management – a comprehensive approach to <strong>risk</strong> assessment that balances business objectives with security needs – is recognized as valuable by 49% of security professionals, yet only 22% are increasing investments in this area for 2025.</p>
</li>
<li>
<p>Organizations face significant data <strong>silos</strong> between IT and security teams, with 55% reporting silos that slow response times (62%) and weaken security posture (53%), while estimating it would take six years to break them down.</p>
</li>
<li>
<p>Despite 83% of organizations having documented risk tolerance frameworks, 51% admit these aren't followed closely, creating serious vulnerabilities in how companies assess and communicate <strong>threats</strong> across leadership levels.</p>
</li>
</ul>
<h3 id="m-trends-2025-report-reveals-increased-dwell-time-and-evolving-attack-vectors"><a href="https://drive.google.com/file/d/1DsGZmgPqfr5RCKdRXnRetOGHWYDxORRG/view?usp=drivesdk&ref=mandos.io">M-Trends 2025 Report Reveals Increased Dwell Time and Evolving Attack Vectors</a></h3>
<ul>
<li>
<p>Global median <strong>dwell</strong> time increased to 11 days in 2024 (from 10 days in 2023), marking the first increase since M-Trends began in 2010, with <strong>exploits</strong> remaining the most common initial infection vector (33% of investigations).</p>
</li>
<li>
<p>Financial sector continues to be the most <strong>targeted</strong> industry (17.4%), followed by business/professional services and high tech, with data theft observed in 37% of investigations and ransomware involved in 21% of cases.</p>
</li>
<li>
<p>Notable emerging threats include North Korean IT worker <strong>insider</strong> threats, targeting of unsecured data repositories, and vulnerabilities in edge security devices like Palo Alto Networks PAN-OS (CVE-2024-3400) and Ivanti Connect Secure VPN (CVE-2023-46805).</p>
</li>
</ul>
<h3 id="organizations-face-growing-financial-impact-from-security-incidents-as-ai-transforms-threat-landscape"><a href="https://drive.google.com/file/d/15-Vl1lag-YZwU0uEp3vQM1adi1G7uAux/view?usp=drivesdk&ref=mandos.io">Organizations Face Growing Financial Impact From Security Incidents as AI Transforms Threat Landscape</a></h3>
<ul>
<li>
<p>Netwrix's 2025 Cybersecurity Trends Report shows that 75% of organizations reported financial <strong>damage</strong> from security incidents – up from 60% in 2024 – with 13% estimating costs exceeding $200,000, nearly double last year's figure of 7%.</p>
</li>
<li>
<p>The report found 60% of organizations are already leveraging AI tools in their IT infrastructure, while 37% of respondents indicated that AI-driven <strong>threats</strong> forced them to adjust their security approach.</p>
</li>
<li>
<p><strong>Identity</strong>-based attacks continue to grow in the cloud, with account compromise incidents increasing from 16% in 2020 to 46% in 2025, while targeted attacks on premises rose from 19% in 2023 to 28% in 2025.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-intern-finds-system-administration-experience-is-essential-to-security-career"><a href="https://www.reddit.com/r/cybersecurity/comments/1kbfovk/i_feel_like_i_was_lied_to/?ref=mandos.io">Cybersecurity Intern Finds System Administration Experience Is Essential To Security Career</a></h3>
<ul>
<li>
<p>A cybersecurity intern expressed disappointment after being assigned primarily to <strong>sysadmin</strong> tasks rather than the security monitoring work promised during their interview.</p>
</li>
<li>
<p>Industry professionals overwhelmingly responded that <strong>patching</strong>, system deployment, and configuration management are fundamental security skills that provide necessary context for future security roles.</p>
</li>
<li>
<p>One <strong>senior</strong> cybersecurity professional with 30 years of experience emphasized that understanding how systems work is essential to effectively securing them.</p>
</li>
</ul>
<h3 id="job-seekers-with-cto-titles-face-hiring-challenges-for-entry-level-cybersecurity-positions"><a href="https://www.reddit.com/r/cybersecurity/comments/1kbikaz/am_i_wasting_my_time/?ref=mandos.io">Job Seekers With CTO Titles Face Hiring Challenges for Entry-Level Cybersecurity Positions</a></h3>
<ul>
<li>
<p>A recent cybersecurity graduate with multiple CompTIA certifications (A+, Net+, Sec+, Pentest+, CySA+) and e-commerce business experience as "CTO" reports receiving zero interviews after 50 job applications for entry-level <strong>SOC</strong> positions.</p>
</li>
<li>
<p>Community consensus indicates that using executive titles from small businesses on resumes can be counterproductive when applying for entry-level positions, as <strong>recruiters</strong> may view the candidate as overqualified or having unrealistic salary expectations.</p>
</li>
<li>
<p>Networking at industry events and starting with help desk or IT positions may offer better pathways into cybersecurity, as direct entry into security roles without corporate IT <strong>experience</strong> remains difficult despite educational qualifications.</p>
</li>
</ul>
<h3 id="people-centric-leadership-in-cybersecurity-reduces-burnout-and-business-risk"><a href="https://www.darkreading.com/remote-workforce/mission-people-competitive-leadership-cyber?ref=mandos.io">People-Centric Leadership in Cybersecurity Reduces Burnout and Business Risk</a></h3>
<ul>
<li>
<p>At RSAC 2025, MK Palmore urged cybersecurity leaders to shift from mission-centric to people-centric leadership approaches, as military-style focus contributes to high <strong>burnout</strong> rates in the industry.</p>
</li>
<li>
<p>Poor leadership communication during uncertain times leads to reduced productivity, with organizations facing higher <strong>turnover</strong> costs and diminished innovation when they neglect leadership development.</p>
</li>
<li>
<p>Implementing <strong>empathetic</strong> leadership practices – including clear communication, mentoring opportunities, and focusing on individual skills – correlates with higher revenue, enhanced market share, and improved team <strong>resilience</strong>.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="model-context-protocol-mcp-security-risks-and-mitigation-strategies"><a href="https://www.wiz.io/blog/mcp-security-research-briefing?ref=mandos.io">Model Context Protocol (MCP) Security Risks and Mitigation Strategies</a></h3>
<ul>
<li>
<p>MCP, backed by Anthropic, OpenAI, Microsoft, and Google, enables LLMs to connect with external data sources but introduces significant <strong>supply chain</strong> risks through untrusted servers running arbitrary code with minimal verification mechanisms.</p>
</li>
<li>
<p>Security concerns include <strong>typosquatting</strong> in registries, credential theft, remote code execution via auto-running tools, and injection vulnerabilities in server implementations, with thousands of public MCP servers already deployed despite evolving specifications.</p>
</li>
<li>
<p>Recommended mitigations include using trusted sources, auditing servers before use, applying least privilege to credentials, preferring local servers over remote ones, and considering <strong>sandboxing</strong> or proxy gateways to establish centralized control points.</p>
</li>
</ul>
<h3 id="crowdstrike-develops-multi-agent-ai-system-to-secure-ai-generated-code"><a href="https://www.crowdstrike.com/en-us/blog/secure-ai-generated-code-with-multiple-self-learning-ai-agents/?ref=mandos.io">CrowdStrike Develops Multi-Agent AI System to Secure AI-Generated Code</a></h3>
<ul>
<li>
<p>CrowdStrike data scientists created a proof-of-concept self-learning multi-agent AI system that uses <strong>Red Teaming</strong> capabilities to identify and address vulnerabilities in AI-generated code before they can be exploited.</p>
</li>
<li>
<p>The system consists of three specialized AI agents working together: a vulnerability scanning agent to identify code weaknesses, a Red Teaming agent to build <strong>exploitation</strong> scripts, and a patching agent to generate security unit tests and code fixes.</p>
</li>
<li>
<p>This automated approach reduces the time required to discover and address pre-release code vulnerabilities by approximately 90%, addressing security challenges posed by the rapid adoption of "<strong>vibe coding</strong>" and autonomous code generation.</p>
</li>
</ul>
<h3 id="ai21-labs-releases-executive-playbook-for-private-ai-deployment"><a href="https://www.linkedin.com/posts/ai21_the-executive-playbook-for-private-ai-deployment-activity-7317615601265373185-KZbZ?ref=mandos.io">AI21 Labs Releases Executive Playbook For Private AI Deployment</a></h3>
<ul>
<li>
<p>Fortune 100 companies are avoiding public AI solutions due to <strong>compliance</strong> concerns, as highlighted in AI21 Labs' new executive playbook.</p>
</li>
<li>
<p>The playbook provides guidance for building <strong>enterprise</strong>-grade AI systems that are private from inception, addressing data security challenges for large organizations.</p>
</li>
<li>
<p>This resource targets executives seeking to implement AI solutions while maintaining complete <strong>privacy</strong> and regulatory adherence in corporate environments.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cynomi-secures-37-million-series-b-to-expand-vciso-platform"><a href="https://www.securityweek.com/cynomi-raises-37-million-series-b-to-expand-its-vciso-platform/?ref=mandos.io">Cynomi Secures $37 Million Series B to Expand vCISO Platform</a></h3>
<ul>
<li>
<p>Cynomi will use the <strong>funding</strong> to accelerate development of its AI-powered virtual CISO platform and expand sales operations across the US and Europe.</p>
</li>
<li>
<p>The Tel Aviv-based company's platform focuses on automating strategic security management functions like <strong>risk</strong> assessment, compliance management, and security policy development for MSPs and MSSPs.</p>
</li>
<li>
<p>Insight Partners and Entrée Capital co-led the investment, with participation from existing investors Canaan, Flint Capital, and <strong>S16VC</strong>.</p>
</li>
</ul>
<h3 id="edgerunner-ai-raises-12m-for-on-device-military-ai-that-works-without-internet"><a href="https://www.geekwire.com/2025/seattle-startup-edgerunner-ai-raises-12m-to-help-military-use-ai-without-the-internet/?ref=mandos.io">Edgerunner AI Raises $12M For On-Device Military AI That Works Without Internet</a></h3>
<ul>
<li>
<p>Seattle-based Edgerunner AI secured $12 million in Series A funding to develop <strong>domain-specific</strong> AI agents that help military personnel make decisions in the field without requiring internet connectivity.</p>
</li>
<li>
<p>The company's technology runs entirely on-device, using compressed models on standard hardware like Intel chips, preserving data <strong>privacy</strong> while eliminating cloud costs and latency issues for <strong>military</strong> operations.</p>
</li>
<li>
<p>Edgerunner has gained significant traction with the Department of Defense, signing an R&amp;D agreement with the Air Force Research Laboratory and being designated as an "Awardable" vendor for DoD's <strong>Tradewinds</strong> Solutions Marketplace.</p>
</li>
</ul>
<h3 id="palo-alto-networks-to-acquire-seattle-cybersecurity-startup-protect-ai"><a href="https://www.geekwire.com/2025/palo-alto-networks-to-acquire-seattle-cybersecurity-startup-protect-ai/?ref=mandos.io">Palo Alto Networks to Acquire Seattle Cybersecurity Startup Protect AI</a></h3>
<ul>
<li>
<p>Cybersecurity giant Palo Alto Networks is acquiring Seattle-based Protect AI in a deal reportedly valued at over $500 million, expanding its capabilities to address new <strong>attack</strong> surfaces created by AI adoption.</p>
</li>
<li>
<p>Founded in 2022, Protect AI helps companies monitor various layers of <strong>machine</strong> learning systems and serves Fortune 500 clients across finance, healthcare, and government sectors, having previously raised $60M Series B funding at a reported $400M valuation.</p>
</li>
<li>
<p>The <strong>acquisition</strong> comes amid rising AI-related security concerns, with nearly three-fourths of companies reporting an AI-related breach in 2024, and Morgan Stanley projecting the AI-based cybersecurity market to reach $135 billion by 2030.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="safeline-waf"><a href="https://cybersectools.com/tools/safeline-waf?ref=mandos.io">SafeLine WAF</a></h3>
<p>SafeLine WAF is an open-source web application firewall that protects web services by filtering malicious HTTP traffic through intelligent semantic analysis and machine learning-based detection.</p>
<h3 id="tromzo-product-security-operating-platform"><a href="https://cybersectools.com/tools/tromzo-product-security-operating-platform?ref=mandos.io">Tromzo Product Security Operating Platform</a></h3>
<p>An Application Security Posture Management platform that provides visibility, security controls, and automated workflows across the software development lifecycle from code to cloud.</p>
<h3 id="bomanai"><a href="https://cybersectools.com/tools/bomanai?ref=mandos.io">Boman.ai</a></h3>
<p>A DevSecOps platform that combines SAST, DAST, SCA, and secret scanning with AI/ML-based analysis for continuous application security testing and vulnerability management.</p>
<hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Why Building Is Back in Cybersecurity And What It Means For Your Career ]]></title>
        <description><![CDATA[ Security teams have surrendered autonomy to vendors. AI is democratizing development across security teams. Learn how to rebuild your engineering capabilities without hiring an army of coders. ]]></description>
        <link>https://mandos.io/blog/why-building-is-back-in-cybersecurity-and-what-it-means-for-your-career/</link>
        <guid isPermaLink="false">67f19c0578dbc90001e94ba2</guid>
        <category><![CDATA[ AI ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 29 Apr 2025 16:00:28 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/building-in-cyber.png" medium="image"/>
        <content:encoded><![CDATA[ <p>For the past decade, security teams have been outsourcing our ability to build anything meaningful. They've become glorified procurement specialists, not security engineers.</p><p>I've watched security teams transform from builders to buyers. From creators to consumers. From engineers to evaluators.</p><p>The typical security department today has a handful of analysts, a small army of GRC professionals, and maybe - if they're lucky - one or two actual engineers who can build something from scratch.</p><p>We've convinced ourselves this is progress. That buying off-the-shelf solutions from vendors is the "mature" approach. That building custom tools is somehow unprofessional or unsustainable.</p><p>But this shift has come at a devastating cost: we've surrendered our autonomy, creativity, and ultimately, our effectiveness.</p><p>In this article, I'll show security leaders why the pendulum is swinging back to building, how AI is democratizing development capabilities across security teams, and the specific steps you can take to rebuild your team's engineering muscle. You'll learn how to identify high-impact automation opportunities, develop a practical building strategy that doesn't require hiring an army of engineers, and prepare your team for a future where building is no longer optional.</p><h2 id="how-we-lost-our-building-muscle">How We Lost Our Building Muscle</h2><p>The erosion of our building capabilities didn't happen overnight.</p><p>It started innocently enough with the cloud revolution. As infrastructure moved to AWS, Azure, and GCP, the complexity of security tooling increased exponentially. Suddenly, building and maintaining custom security tools required specialized knowledge that many teams simply didn't have.</p><p>Then came the SaaS explosion and the pitch was compelling: focus on your core business and let us handle the technical heavy lifting.</p><p>Security leaders, already struggling with talent shortages and mounting compliance requirements, embraced this model wholeheartedly. We traded building for buying, engineering for evaluating, and creation for consumption.</p><p>The results speak for themselves:</p><ul><li>Skyrocketing costs with diminishing returns</li><li>Endless integration challenges and data silos</li><li>Complete dependence on vendors for innovation</li><li>Security teams drowning in vendor management</li><li>Bloated security stacks with dozens of disconnected tools</li></ul><p>I recently spoke with a CISO at a mid-sized fintech who confessed: "We have 43 security tools, but can't answer basic questions about our security posture. We're spending millions on vendors but can't automate a simple offboarding workflow."</p><p>This is the reality for most security teams today. We've become hostages to our vendors, waiting for them to build the features we need, integrate with the systems we use, and solve the problems we face.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-ai-inflection-point">The AI Inflection Point</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/the-ai-inflection-point.png" class="kg-image" alt="ai inflection point" loading="lazy" width="1176" height="699" srcset="https://mandos.io/content/images/size/w600/2025/04/the-ai-inflection-point.png 600w, https://mandos.io/content/images/size/w1000/2025/04/the-ai-inflection-point.png 1000w, https://mandos.io/content/images/2025/04/the-ai-inflection-point.png 1176w" sizes="(min-width: 720px) 720px"></figure><p>But something fundamental has changed. We're at an inflection point that will redefine what's possible for security teams.</p><p>AI - specifically generative AI with its ability to understand context, generate code, and interface with systems - is democratizing the ability to build.</p><p>It's a paradigm shift that will separate forward-thinking security teams from those stuck in the procurement trap.</p><p>Here's what's different now:</p><ol><li><strong>Code generation has become accessible to non-engineers</strong>. Tools like GitHub Copilot, Cursor, and Claude can generate functional code from natural language descriptions. You no longer need a CS degree to create useful automation.</li><li><strong>AI agents and tool calling capabilities</strong>&nbsp;are enabling seamless integration between systems. What used to require complex API development can now be accomplished through "AI-powered orchestration".</li><li><strong>Low-code/no-code platforms</strong>&nbsp;have matured, allowing security professionals to build sophisticated workflows without writing traditional code.</li><li><strong>The economics have flipped</strong>. Building custom solutions is becoming cheaper than buying and integrating vendor products for many use cases.</li></ol><!--members-only--><p></p><h2 id="why-building-matters-now-more-than-ever">Why Building Matters Now More Than Ever</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-1.png" class="kg-image" alt="building software with AI" loading="lazy" width="1472" height="832" srcset="https://mandos.io/content/images/size/w600/2025/04/image-1.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-1.png 1000w, https://mandos.io/content/images/2025/04/image-1.png 1472w" sizes="(min-width: 720px) 720px"></figure><p>You might be thinking: "So what? Why should I care about building when I can still buy?"</p><p>Here's why this shift matters for every security leader:</p><p><strong>Speed and agility</strong>. When you can build, you can solve problems immediately instead of waiting for vendors. I've seen security teams reduce response times from weeks to minutes by building custom automation.</p><p><strong>Cost efficiency</strong>. The build vs. buy equation has fundamentally changed. Custom solutions built with AI assistance often cost a fraction of vendor products while delivering exactly what you need.</p><p><strong>Competitive advantage</strong>. Security teams that can build custom solutions gain a significant edge over those dependent on vendors. They can address unique threats and requirements that off-the-shelf products can't handle.</p><p><strong>Talent retention</strong>. Engineers want to build things. Analysts want to solve problems. When your team can actually create solutions instead of just implementing vendor products, engagement and retention improve dramatically.</p><p><strong>Vendor leverage</strong>. When vendors know you can build alternatives to their products, your negotiating position strengthens considerably.</p><h2 id="the-new-security-builders-toolkit">The New Security Builder's Toolkit</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/ai-tools-in-security.png" class="kg-image" alt="ai tools in security" loading="lazy" width="1992" height="1371" srcset="https://mandos.io/content/images/size/w600/2025/04/ai-tools-in-security.png 600w, https://mandos.io/content/images/size/w1000/2025/04/ai-tools-in-security.png 1000w, https://mandos.io/content/images/size/w1600/2025/04/ai-tools-in-security.png 1600w, https://mandos.io/content/images/2025/04/ai-tools-in-security.png 1992w" sizes="(min-width: 720px) 720px"></figure><p>So what does this new building capability actually look like in practice?</p><p>It's not about hiring a team of full-stack developers or becoming a software company. It's about leveraging AI and modern tools to enable everyone on your security team to build solutions.</p><p>Here's what the modern security builder's toolkit includes:</p><p><strong>AI Code Assistants</strong>: Tools like <a href="https://github.com/features/copilot?ref=mandos.io">GitHub Copilot</a>, <a href="https://www.cursor.com/?ref=mandos.io">Cursor</a> and <a href="https://claude.ai/new?ref=mandos.io">Claude</a> can generate functional code from natural language descriptions. They're not perfect, but they dramatically reduce the barrier to entry for building.</p><p><strong>AI Agents</strong>: Platforms like <a href="https://www.langchain.com/?ref=mandos.io">LangChain</a>, <a href="https://github.com/Significant-Gravitas/AutoGPT?ref=mandos.io">AutoGPT</a>, and <a href="https://www.microsoft.com/en-us/microsoft-copilot/microsoft-copilot-studio?ref=mandos.io">Microsoft's Copilot Studio </a>allow you to create autonomous agents that can interact with systems, retrieve information, and execute tasks.</p><p><a href="https://modelcontextprotocol.io/introduction?ref=mandos.io"><strong>Model Context Protocol (MCP)</strong></a>: This emerging standard enables secure, controlled access to enterprise data for AI systems. It allows you to build tools that can safely reference your internal documentation, security policies, and proprietary data without compromising security.</p><p><strong>Low-Code Platforms</strong>: Tools like <a href="https://zapier.com/?ref=mandos.io">Zapier</a>, <a href="https://n8n.io/?ref=mandos.io">n8n</a>, and <a href="https://www.tines.com/?ref=mandos.io">Tines</a> enable sophisticated workflow automation without traditional coding.</p><p><strong>Infrastructure as Code</strong>: Terraform, CloudFormation, and Pulumi allow you to define and provision infrastructure programmatically.</p><p><strong>Open Source Foundations</strong>: Build on top of established open source projects instead of starting from scratch.</p><p>The key point here is that these tools make building accessible to security professionals who don't have traditional software engineering backgrounds.</p><p>I've seen SOC analysts use these tools to automate alert triage processes. GRC professionals building custom compliance monitoring dashboards. Threat intelligence analysts creating specialized collection and analysis pipelines.</p><p>It's happening right now in forward-thinking security teams.</p><h2 id="from-consumer-to-creator-practical-steps">From Consumer to Creator: Practical Steps</h2><p>So how do you transform your team from consumers to creators? From buyers to builders?</p><p>Here's a practical roadmap:</p><p><strong>1. Start with high-impact, low-complexity automation</strong></p><p>Begin by identifying manual, repetitive processes that cause friction in your security operations. These are perfect candidates for your first building projects.</p><p>Common examples include:</p><ul><li>Alert enrichment and contextualization</li><li>User access reviews and certification</li><li>Vulnerability management workflows</li><li>Security questionnaire responses</li><li>Compliance evidence collection</li></ul><p><strong>2. Upskill your existing team</strong></p><p>You don't necessarily need to hire a team of engineers. Instead, identify people on your team who show curiosity and aptitude for building, regardless of their current role.</p><p>Provide them with:</p><ul><li>Access to AI coding assistants</li><li>Time to experiment and learn</li><li>Recognition for building useful tools</li><li>Basic programming fundamentals training</li></ul><p><strong>3. Create a security automation platform</strong></p><p>Establish a foundation that makes it easier for your team to build solutions:</p><ul><li>Document APIs and integration points</li><li>Create reusable components and templates</li><li>Establish coding standards and review processes</li><li>Standardize on key technologies and frameworks</li></ul><p><strong>4. Adopt a product mindset</strong></p><p>Treat your internal tools like products:</p><ul><li>Iterate based on feedback</li><li>Measure impact and value</li><li>Understand your users' needs</li><li>Focus on usability and reliability</li></ul><p><strong>5. Balance building and buying strategically</strong></p><p>Not everything should be built in-house. Develop clear criteria for when to build vs. buy:</p><ul><li>Build when you need custom functionality that vendors don't provide</li><li>Build when integration between systems is critical</li><li>Build when speed of implementation is essential</li><li>Buy when specialized expertise is required</li><li>Buy when the problem is well-defined and commoditized</li></ul><p>Follow this approach and your team morale and retention will improve dramatically. People who were previously drowning in manual tasks will now be building solutions that will make their work more meaningful.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-future-security-leader-is-a-builder">The Future Security Leader Is a Builder</h2><p>As we look to the future, one thing is clear: the most effective security leaders will be those who rebuild their teams' ability to create, not just consume.</p><p>This doesn't mean abandoning vendors entirely or becoming a software development shop. It means striking a new balance where building custom solutions is a core capability, not an exception.</p><p>The security leaders who thrive in this new era will:</p><ol><li><strong>Foster a builder's mindset</strong>&nbsp;across their teams, encouraging everyone to look for automation opportunities</li><li><strong>Invest in AI-powered development tools</strong>&nbsp;that enable non-engineers to build effective solutions</li><li><strong>Create space for experimentation and learning</strong>, recognizing that building skills develop through practice</li><li><strong>Measure and celebrate the impact</strong>&nbsp;of internally built solutions</li><li><strong>Challenge vendors</strong>&nbsp;to provide more value or risk being replaced by custom alternatives</li></ol><p>The days of the security leader as pure procurement specialist are ending. The future belongs to those who can build.</p><h2 id="the-time-to-rebuild-is-now">The Time to Rebuild Is Now</h2><p>If you're reading this and thinking, "This sounds great, but my team doesn't have these skills," you're not alone. Most security teams have atrophied their building muscles over the past decade.</p><p>But here's the good news: rebuilding these capabilities is more accessible than ever thanks to AI and modern development tools.</p><p>Start small. Find one manual process that causes pain for your team. Challenge someone to build a solution using AI assistance. Celebrate the results. Repeat.</p><p>The transformation won't happen overnight, but it will happen—and faster than you might expect.</p><p>The alternative is to continue down the path of vendor dependence, watching your costs rise while your effectiveness plateaus.</p><p>The choice is yours. But remember: in a world where building is becoming democratized, those who can't build will ultimately fall behind.</p><p>Are you ready to rebuild?</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #101: OAuth Exploits Target Microsoft 365, Verizon DBIR Third-Party Risk, LLMs Fail at CTI ]]></title>
        <description><![CDATA[ Executives targeted through fake Bloomberg invites exploiting Zoom&#39;s remote control feature. SMBs hit hard with 88% of breaches involving ransomware. Terra secures funding for AI penetration testing. ]]></description>
        <link>https://mandos.io/newsletter/brief-101-oauth-exploits-target-microsoft-365-verizon-dbir-third-party-risk-llms-fail-at-cti/</link>
        <guid isPermaLink="false">680bb49394800f00012e2742</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 27 Apr 2025 13:00:14 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/17.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Been a week of putting out fires over here. Speaking of which, Verizon's latest DBIR caught my attention with third-party involvement in breaches doubling to 30%. Makes you wonder how many of our trusted partners might be our biggest blind spots.</p><p>In this week's brief:</p><ul><li>Chinese mobile operators gaining man-in-the-middle access across 35 countries through unencrypted protocols</li><li>A security engineer struggling with breach guilt despite leadership ignoring security initiatives (something many of us can relate to)</li><li>New research showing LLMs consistently failing at threat intelligence tasks, missing up to 20% of campaign entities</li></ul><p>Starting today, I am introducing a <strong>Question of the Week</strong> section at the end of this brief, to get to know each other better. Feel free to share your experience, tips and lessons learned.</p><p>Grab your coffee and dive in – there's plenty more to unpack this week.  </p><div class="kg-card kg-cta-card kg-cta-bg-grey kg-cta-minimal   " data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">BECOME A SPONSOR</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Get your cybersecurity product or resource in front of 1100+ cybersecurity leaders and professionals.</span></p>
                        </div>
                    
                    
                        <a href="https://mandos.io/contact/" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Learn more
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Industry News</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="chinas-state-owned-mobile-interconnect-providers-facilitate-global-surveillance"><a href="https://iverify.io/blog/abusing-data-in-the-middle-surveillance-risks-in-china-s-state-owned-mobile-ecosystem?ref=mandos.io">China's State-Owned Mobile Interconnect Providers Facilitate Global Surveillance</a></h3>
<ul>
<li>
<p>At least 60 mobile operators across 35 countries route traffic through Chinese-owned networks, giving China <strong>man-in-the-middle</strong> access to authentication data, SMS messages, and location information due to unencrypted mobile signaling protocols like SS7 and Diameter.</p>
</li>
<li>
<p>The China-based <strong>LIMINAL PANDA</strong> threat group has previously exploited mobile roaming interconnects to gain access to operator core networks, allowing them to track devices and intercept communications for espionage purposes.</p>
</li>
<li>
<p>These vulnerabilities enable state actors to conduct real-time device tracking, intercept communications, silently deploy <strong>spyware</strong>, and manipulate network traffic affecting millions of users globally, including those in allied nations like Japan and South Korea.</p>
</li>
</ul>
<h3 id="elusive-comet-group-targets-executives-through-zoom-remote-control-feature"><a href="https://blog.trailofbits.com/2025/04/17/mitigating-elusive-comet-zoom-remote-control-attacks/?ref=mandos.io">ELUSIVE COMET Group Targets Executives Through Zoom Remote Control Feature</a></h3>
<ul>
<li>
<p>Trail of Bits identified the <strong>threat actor</strong> ELUSIVE COMET attempting to conduct a social engineering attack by impersonating Bloomberg media and exploiting Zoom's remote control feature to gain unauthorized system access.</p>
</li>
<li>
<p>The attackers use <strong>social engineering</strong> techniques that include fake media invitations, refusing email communication, and utilizing the Zoom remote control feature with modified display names to trick users into granting system access.</p>
</li>
<li>
<p>Trail of Bits recommends a layered defense approach including: disabling Zoom's accessibility permissions through PPPC profiles, implementing active TCC database monitoring, and considering complete <strong>removal</strong> of Zoom for high-security environments handling <strong>cryptocurrency</strong>.</p>
</li>
</ul>
<h3 id="russian-threat-actors-exploit-oauth-20-workflows-to-compromise-microsoft-365-accounts"><a href="https://www.bleepingcomputer.com/news/security/hackers-abuse-oauth-20-workflows-to-hijack-microsoft-365-accounts/?ref=mandos.io">Russian Threat Actors Exploit OAuth 2.0 Workflows to Compromise Microsoft 365 Accounts</a></h3>
<ul>
<li>
<p>Russian <strong>threat actors</strong> impersonate European officials or Ukrainian diplomats on WhatsApp and Signal to trick targets into sharing Microsoft authorization codes or clicking <strong>phishing</strong> links that steal account credentials.</p>
</li>
<li>
<p>After initial contact, attackers send malicious URLs that redirect authenticated users to Visual Studio Code in-browser, displaying an OAuth authorization code valid for 60 days that grants complete access to all Microsoft 365 resources.</p>
</li>
<li>
<p>Volexity researchers identified two distinct Russian-linked groups (UTA0352 and UTA0355) targeting organizations related to Ukraine and human rights, with one campaign leveraging stolen OAuth codes to register new devices to victims' Microsoft <strong>Entra</strong> ID.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Leadership Insights</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="verizons-2025-dbir-shows-third-party-involvement-doubling-in-breaches"><a href="https://drive.google.com/file/d/1hfAyUz6QjK49XW5fuglT_-UangIF_zNK/view?usp=drivesdk&ref=mandos.io">Verizon's 2025 DBIR Shows Third-Party Involvement Doubling in Breaches</a></h3>
<ul>
<li>
<p>Third-party involvement in breaches doubled from 15% to 30% this year, highlighting supply chain <strong>vulnerabilities</strong> across platforms like Snowflake, where approximately 80% of compromised accounts had prior credential exposure.</p>
</li>
<li>
<p><strong>Ransomware</strong> increased by 37% and was present in 44% of all breaches analyzed, with small businesses disproportionately affected (88% of SMB breaches involved ransomware vs. 39% for larger organizations), though median ransom payments decreased to $115,000.</p>
</li>
<li>
<p>Exploitation of vulnerabilities continues growing as an initial access vector, reaching 20% (up 34% from last year), with <strong>edge</strong> devices and VPNs becoming primary targets—their presence in exploitation actions grew nearly eight-fold from 3% to 22%.</p>
</li>
</ul>
<h3 id="wiz-releases-comprehensive-devops-security-best-practices-guide"><a href="https://drive.google.com/file/d/1Dg4cNCXTvMrqgQkqkcUVUhfnnwPINuI4/view?usp=drivesdk&ref=mandos.io">Wiz Releases Comprehensive DevOps Security Best Practices Guide</a></h3>
<ul>
<li>
<p>The guide focuses on three key areas: secure coding practices (including input <strong>validation</strong> and avoiding hardcoded secrets), infrastructure security (implementing immutable infrastructure and network <strong>segmentation</strong>), and monitoring and response protocols.</p>
</li>
<li>
<p>Zero-trust <strong>architecture</strong> is emphasized as a critical security model requiring strict identity verification for all users and devices, with recommendations to implement IAM solutions, multi-factor authentication, and regular policy updates.</p>
</li>
<li>
<p>The document outlines comprehensive <strong>incident</strong> response strategies, advocating for real-time monitoring tools, established response plans, regular drills, and implementing feedback loops for continuous security improvement.</p>
</li>
</ul>
<h3 id="knowbe4-reports-surge-in-ai-powered-polymorphic-phishing-campaigns"><a href="https://drive.google.com/file/d/1r8gPUvpulVnI6dFiYueqya8n6954D28c/view?usp=drivesdk&ref=mandos.io">KnowBe4 Reports Surge in AI-Powered Polymorphic Phishing Campaigns</a></h3>
<ul>
<li>
<p>KnowBe4's March 2025 threat report reveals a 17.3% increase in phishing emails over the past six months, with 82.6% utilizing <strong>AI</strong> to create sophisticated <strong>polymorphic</strong> attacks that bypass traditional security measures.</p>
</li>
<li>
<p>Researchers observed a 22.6% increase in <strong>ransomware</strong> delivered via phishing since September 2024, with 57.9% of business email compromise attacks originating from compromised accounts.</p>
</li>
<li>
<p>The report highlights growing threats including cybercriminals targeting <strong>engineering</strong> job applications to gain system access, and 47% of phishing emails evading Microsoft's native security and secure email gateways.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Career Development</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="security-engineer-struggles-with-breach-guilt-despite-leadership-obstacles"><a href="https://www.reddit.com/r/cybersecurity/comments/1k5i0x5/how_do_you_get_over_the_guilt_of_a_breach/?ref=mandos.io">Security Engineer Struggles With Breach Guilt Despite Leadership Obstacles</a></h3>
<ul>
<li>
<p>A cybersecurity engineer is experiencing significant mental health impacts after their company suffered a severe <strong>breach</strong>, despite leadership reportedly "shutting down" security initiatives and the team facing resource constraints.</p>
</li>
<li>
<p>Security professionals responding emphasize that the <strong>guilt</strong> is misplaced, as proper security requires defense-in-depth strategies and leadership support, with one responder comparing it to "having a captain who is going to full steam the ship through iceberg infested waters."</p>
</li>
<li>
<p>Experienced practitioners recommend focusing on the lessons learned phase and maintaining documentation of security recommendations as <strong>evidence</strong> when facing potential blame from organizational leadership.</p>
</li>
</ul>
<h3 id="ciso-discusses-career-burnout-and-alternative-paths-after-35-years-in-it"><a href="https://www.reddit.com/r/ciso/comments/1k7d8py/burnout_how_to_leave_cyber_security_entirely/?ref=mandos.io">CISO Discusses Career Burnout and Alternative Paths After 35 Years In IT</a></h3>
<ul>
<li>
<p>A veteran <strong>cybersecurity</strong> leader with 35 years in IT (15 as director/VP/CISO) reports severe burnout from constant battles to justify investments and staffing limitations, with just 3 years until planned retirement.</p>
</li>
<li>
<p>Former colleagues note the <strong>workload</strong> is overwhelming – one replacement claimed the CISO was doing the work of three people and resigned after only six weeks in the position.</p>
</li>
<li>
<p>Several professionals in similar positions shared alternative career paths, including transitioning to <strong>consulting</strong>, import/export trading businesses, or stepping down to lower-stress individual contributor roles while maintaining work-life <strong>boundaries</strong>.</p>
</li>
</ul>
<h3 id="cybersecurity-talent-gap-reveals-disconnect-between-employers-and-job-seekers"><a href="https://www.reddit.com/r/cybersecurity/comments/1k7prhf/hiring_and_recruiting_paradox/?ref=mandos.io">Cybersecurity Talent Gap Reveals Disconnect Between Employers and Job Seekers</a></h3>
<ul>
<li>
<p>Companies claim they can't find qualified cybersecurity professionals, while many skilled candidates struggle to find work – revealing a <strong>paradox</strong> in hiring practices where employers seek unicorn candidates with expertise in everything but aren't willing to pay <strong>competitive</strong> wages.</p>
</li>
<li>
<p>Many organizations lack structured talent <strong>development</strong> plans, failing to invest in growing entry-level employees into specialized roles, which forces professionals to job hop for career advancement rather than building institutional knowledge.</p>
</li>
<li>
<p>Reddit community insights suggest the most effective approach may be upskilling existing technical staff into cybersecurity roles rather than hiring externally, as they already understand company systems and have proven their <strong>trustworthiness</strong> in high-security environments.</p>
</li>
</ul>

<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; Security</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="the-alan-turing-institute-releases-comprehensive-ai-explainability-workbook-for-public-sector-practitioners"><a href="https://drive.google.com/file/d/1rgbzL7Ski8DILd_34zFYYw2KGphvUPrR/view?usp=drivesdk&ref=mandos.io">The Alan Turing Institute releases comprehensive AI Explainability workbook for public sector practitioners</a></h3>
<ul>
<li>
<p>The <em>AI Explainability in Practice</em> workbook is part of the larger AI Ethics and Governance in Practice Programme, designed to equip <strong>public sector</strong> bodies with tools and frameworks for responsible AI development and implementation.</p>
</li>
<li>
<p>The resource introduces four key maxims of AI explainability: be <strong>transparent</strong>, be accountable, consider context, and reflect on impacts—while emphasizing both process-based and outcome-based explanation approaches.</p>
</li>
<li>
<p>It provides practical guidance for organizations to implement six types of AI explanations (rationale, responsibility, data, fairness, safety, and impact) with special considerations for vulnerable populations including <strong>children</strong>.</p>
</li>
</ul>
<h3 id="large-language-models-prove-unreliable-for-cyber-threat-intelligence-tasks"><a href="https://drive.google.com/file/d/1ivUFhdFb4JHzat_8jDdY9RIitDogK0hI/view?usp=drivesdk&ref=mandos.io">Large Language Models Prove Unreliable for Cyber Threat Intelligence Tasks</a></h3>
<ul>
<li>
<p>New research evaluates state-of-the-art LLMs (including GPT-4, Gemini, and Mistral) on real-world <strong>CTI</strong> reports, finding they consistently fail to extract critical information with sufficient reliability, overlooking up to 20% of campaign entities and 10% of <strong>vulnerabilities</strong>.</p>
</li>
<li>
<p>Despite industry enthusiasm, LLMs demonstrated inconsistent results when prompted multiple times with identical inputs, with performance confidence intervals showing variance that would create uncertainty in critical security decisions about <strong>patching</strong> priorities.</p>
</li>
<li>
<p>LLMs exhibit poor calibration (measured by ECE and Brier scores), meaning their confidence levels don't reflect actual correctness, and surprisingly, few-shot learning and fine-tuning often worsened performance rather than improving it.</p>
</li>
</ul>
<h3 id="stanfords-2025-ai-index-report-reveals-substantial-improvements-in-ai-performance-accessibility-and-adoption"><a href="https://drive.google.com/file/d/1iEqEQhazyMCZouIChNWdcUG3VCSQRvov/view?usp=drivesdk&ref=mandos.io">Stanford's 2025 AI Index Report reveals substantial improvements in AI performance, accessibility, and adoption</a></h3>
<ul>
<li>
<p>AI <strong>incidents</strong> are increasing sharply with 233 reported in 2024 (56.4% increase over 2023), while standardized responsible AI evaluations remain rare among major model developers despite new benchmarks like HELM Safety and AIR-Bench emerging.</p>
</li>
<li>
<p>The <strong>inference</strong> cost for AI systems performing at GPT-3.5 level dropped more than 280-fold between November 2022 and October 2024, while hardware costs declined 30% annually and energy efficiency improved 40% each year.</p>
</li>
<li>
<p>Organizations increasingly acknowledge responsible AI <strong>risks</strong> (including inaccuracy, regulatory compliance, and cybersecurity), but a gap persists between risk recognition and taking meaningful mitigation actions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Market Updates</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="terra-security-raises-8m-for-agentic-ai-penetration-testing-platform"><a href="https://finance.yahoo.com/news/terra-security-raises-8m-seed-120000402.html?ref=mandos.io">Terra Security Raises $8M for Agentic AI Penetration Testing Platform</a></h3>
<ul>
<li>
<p>Terra Security secured $8M in seed funding led by SYN Ventures and FXP Ventures to develop their <strong>agentic</strong> AI penetration testing platform that combines human expertise with AI efficiency.</p>
</li>
<li>
<p>The platform uses dozens of fine-tuned AI agents tailored to each client's environment, conducting continuous web application <strong>testing</strong> while adapting in real-time to unique business contexts and emerging <strong>vulnerabilities</strong>.</p>
</li>
<li>
<p>Already serving <strong>Fortune</strong> 500 clients, Terra plans to expand capabilities to include red teaming solutions and comprehensive network security, addressing limitations of traditional pen testing that is typically slow, expensive, and unscalable.</p>
</li>
</ul>
<h3 id="hopper-emerges-from-stealth-with-76-million-to-reinvent-open-source-security"><a href="https://www.calcalistech.com/ctechnews/article/hjyqnwfyee?ref=mandos.io">Hopper Emerges From Stealth With $7.6 Million to Reinvent Open-Source Security</a></h3>
<ul>
<li>
<p>Cybersecurity startup Hopper has launched with $7.6M in seed funding to replace traditional Software Composition Analysis (SCA) tools with a <strong>precision</strong>-focused platform that automatically discovers assets and detects hidden <strong>vulnerabilities</strong>.</p>
</li>
<li>
<p>The platform pinpoints which functions are truly at risk without requiring agents or CI/CD changes, helping Fortune 500 companies and tech firms reduce alert <strong>noise</strong> and improve remediation times.</p>
</li>
<li>
<p>Founded by Unit 81 veterans and Israel Defense Prize recipients, Hopper will use the funding to expand language support, enhance analysis capabilities, and scale its operations in the United States.</p>
</li>
</ul>
<h3 id="push-security-secures-30-million-series-b-funding-to-combat-identity-attacks"><a href="https://finance.yahoo.com/news/push-security-secures-30-million-130000230.html?ref=mandos.io">Push Security Secures $30 Million Series B Funding to Combat Identity Attacks</a></h3>
<ul>
<li>
<p>Push Security has secured $30 million in Series B funding led by Redpoint Ventures, with participation from Datadog Ventures and B3 Capital to scale their <strong>browser</strong>-based identity security platform.</p>
</li>
<li>
<p>The company's platform detects and intercepts identity attacks such as zero-day <strong>phishing</strong>, credential stuffing, and session hijacking before they escalate by turning employees' existing browsers into monitoring and defense tools.</p>
</li>
<li>
<p>Push Security has experienced rapid growth with customer base increasing 380% year-over-year, now deployed on 1.5 million <strong>endpoints</strong> globally, and has doubled its <strong>headcount</strong> while adding key executives from CrowdStrike and Proofpoint.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Tools</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="teejlab-api-security-manager"><a href="https://cybersectools.com/tools/teejlab-api-security-manager?ref=mandos.io">TeejLab API Security Manager</a></h3>
<p>An API security and governance platform that provides discovery, security testing, compliance monitoring and lifecycle management capabilities for enterprise API implementations.</p>
<h3 id="falcon-aspm"><a href="https://cybersectools.com/tools/falcon-aspm?ref=mandos.io">Falcon ASPM</a></h3>
<p>A cloud security solution that provides agentless application mapping and vulnerability prioritization based on business impact across cloud environments.</p>
<h3 id="jfrog-software-supply-chain-platform"><a href="https://cybersectools.com/tools/jfrog-software-supply-chain-platform?ref=mandos.io">JFrog Software Supply Chain Platform</a></h3>
<p>An integrated software supply chain platform that combines repository management, security scanning, and DevSecOps capabilities for managing and securing the entire software supply chain.</p>
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2025/04/question-of-the-week-2.jpg" srcset="https://mandos.io/content/images/size/w600/2025/04/question-of-the-week-2.jpg 600w, https://mandos.io/content/images/size/w1000/2025/04/question-of-the-week-2.jpg 1000w, https://mandos.io/content/images/size/w1600/2025/04/question-of-the-week-2.jpg 1600w, https://mandos.io/content/images/2025/04/question-of-the-week-2.jpg 1900w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="question-of-the-week" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">Question of the Week</span></h2>
                    
                    
                </div>
            </div>
        </div><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-text">I would love to hear:<br><br><b><strong style="white-space: pre-wrap;">How are you managing third-party risk in your organization, and has your approach changed in the past year?</strong></b><br><br><i><em class="italic" style="white-space: pre-wrap;">Reply directly to this email or share your thoughts in comments and </em></i><a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><i><em class="italic" style="white-space: pre-wrap;">LinkedIn</em></i></a><i><em class="italic" style="white-space: pre-wrap;">.</em></i></div></div><hr><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
<div id="mandos-feedback-container">
  <div id="mandos-feedback-box">
    <h4 id="mandos-feedback-title">How do you like Mandos Brief?</h4>
    
    <div id="mandos-star-container">
      <span class="mandos-star" data-value="1">
        <span class="mandos-star-tooltip">Terrible</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="2">
        <span class="mandos-star-tooltip">Bad</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="3">
        <span class="mandos-star-tooltip">Okay</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="4">
        <span class="mandos-star-tooltip">Good</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
      <span class="mandos-star" data-value="5">
        <span class="mandos-star-tooltip">Excellent</span>
        <svg viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round">
          <polygon points="12 2 15.09 8.26 22 9.27 17 14.14 18.18 21.02 12 17.77 5.82 21.02 7 14.14 2 9.27 8.91 8.26 12 2"></polygon>
        </svg>
      </span>
    </div>
    <div id="mandos-thank-you" style="display: none;">
      <h3>Thank you!</h3>
      <p>Your input helps me make Mandos even better.</p>
      <textarea id="mandos-feedback-text" placeholder="What did you like or what should I improve?"></textarea>
      <button id="mandos-submit-btn">Submit Feedback</button>
    </div>
  </div>
</div>
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ 5 Red Team Exercises That Expose Your Real Security Gaps in 2025 ]]></title>
        <description><![CDATA[ Most security tools create a false sense of protection. Explore 5 realistic red team exercises with Notion templates that help you plan tests mirroring sophisticated attackers and identify critical vulnerabilities in your organization ]]></description>
        <link>https://mandos.io/blog/5-red-team-exercises-that-expose-your-real-security-gaps-in-2025/</link>
        <guid isPermaLink="false">67febd9604886d000151c6b7</guid>
        <category><![CDATA[ Cybersecurity ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 22 Apr 2025 16:00:14 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/5-Red-Team-Exercises.png" medium="image"/>
        <content:encoded><![CDATA[ <p>I've seen it time and again throughout my career: companies spend millions on security tools but still fall victim to basic attacks. As someone who's spent over a decade in the security trenches, I can tell you that fancy dashboards don't matter if your basics aren't solid.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Reality Check - Most companies are wasting money on security fashion show while leaving critical gaps wide open.</div></div><p>The truth? If you want to know your real security position, you need red team exercises that show what actually matters. I'm not talking about basic tests that scan for known bugs - I'm talking about exercises that mirror how real attackers work in 2025.</p><p>Here are five red team exercises that will show your true security gaps - the ones that lead to breaches. For each, I'll add template links later to help you plan these tests.</p><h2 id="1-social-engineering-campaigns-people-are-still-your-biggest-vulnerability">1. Social Engineering Campaigns: People Are Still Your Biggest Vulnerability</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-6.png" class="kg-image" alt="Social Engineering Campaigns" loading="lazy" width="1554" height="1366" srcset="https://mandos.io/content/images/size/w600/2025/04/image-6.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-6.png 1000w, https://mandos.io/content/images/2025/04/image-6.png 1554w" sizes="(min-width: 720px) 720px"></figure><!--members-only--><p>Let's be honest - real attackers don't try to hack your firewall when they can just trick your employees into giving up the keys.</p><p>In the real world, attackers use social engineering techniques to get initial access. They target specific employees with tailored phishing emails, calls, and even in-person tactics that get past technical controls.</p><p>A good social engineering exercise doesn't just test if people click links. It copies multi-stage campaigns that match actual threat actor behavior. This includes research on key employees, creating real-looking scenarios, and using triggers that work even on security-aware staff.</p><p><strong>What you'll learn: </strong>This test shows if your security training leads to better decisions in real situations. You'll see which departments are most at risk, what tactics work against your organization, and how well your controls catch good phishing attempts.</p><div class="kg-card kg-button-card kg-align-center"><a href="https://mandosio.notion.site/Social-Engineering-Campaign-1d6c6c673b54810d89c9c47ff69c654b?ref=mandos.io" class="kg-btn kg-btn-accent">Get the Template</a></div><h2 id="2-privileged-credential-attacks-the-path-from-entry-to-domain-admin">2. Privileged Credential Attacks: The Path From Entry to Domain Admin</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-7.png" class="kg-image" alt="Privileged Credential Attacks" loading="lazy" width="1586" height="1376" srcset="https://mandos.io/content/images/size/w600/2025/04/image-7.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-7.png 1000w, https://mandos.io/content/images/2025/04/image-7.png 1586w" sizes="(min-width: 720px) 720px"></figure><p>Almost every major breach follows this pattern: attackers get initial access, then move until they get privileged credentials that give them the keys to your kingdom.</p><p>Your red team should test how they can move from an initial foothold (like a hacked workstation) to getting domain admin rights or cloud privileges. This test focuses on credential theft, privilege escalation, and moving through your network.</p><p>Recent research shows identity-based attacks have jumped as attackers focus on cloud systems. Once they have credentials, moving through your network becomes easy.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">The most dangerous attackers don't smash windows; they walk through your front door with stolen keys.</div></div><p><strong>What you'll learn:</strong> You'll find out if your security can detect credential theft tools, whether your admin accounts have too many permissions, and if your network setup stops attackers from moving around. Most important, you'll see if you can spot the subtle signs of someone quietly gaining higher access.</p><div class="kg-card kg-button-card kg-align-center"><a href="https://mandosio.notion.site/Privileged-Credential-Attacks-1d6c6c673b5481a0910ed96c6285179e?ref=mandos.io" class="kg-btn kg-btn-accent">Get the Template</a></div><h2 id="3-cloud-misconfiguration-exploits-your-most-accessible-attack-surface">3. Cloud Misconfiguration Exploits: Your Most Accessible Attack Surface</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-8.png" class="kg-image" alt="Cloud Misconfiguration Exploits" loading="lazy" width="1582" height="1374" srcset="https://mandos.io/content/images/size/w600/2025/04/image-8.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-8.png 1000w, https://mandos.io/content/images/2025/04/image-8.png 1582w" sizes="(min-width: 720px) 720px"></figure><p>Your cloud systems likely have dangerous gaps that normal security tools can't see. This exercise finds and uses common cloud setup mistakes that give attackers easy wins.</p><p>The test should check for exposed storage, overly open permissions, unprotected APIs, and serverless function flaws. As a recent Forbes article noted, a single mistake—often just an overly open permission or exposed storage—can ruin everything.</p><p>The red team should try to find resources open to the public, gain higher privileges in cloud systems, and move between different cloud services to access sensitive data.</p><p><strong>What you'll learn: </strong>This exercise shows blind spots in your cloud security that automated tools often miss. You'll find out if your cloud security is set up right, where your sensitive data is most exposed, and whether you can detect unusual access patterns.</p><div class="kg-card kg-button-card kg-align-center"><a href="https://mandosio.notion.site/Cloud-Misconfiguration-Exploits-1d6c6c673b54813ab332ce1d118021d0?ref=mandos.io" class="kg-btn kg-btn-accent">Get the Template</a></div><h2 id="4-supply-chain-compromise-simulations-youre-only-as-secure-as-your-weakest-vendor">4. Supply Chain Compromise Simulations: You're Only as Secure as Your Weakest Vendor</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-10.png" class="kg-image" alt="Supply Chain Compromise Simulations" loading="lazy" width="1592" height="1278" srcset="https://mandos.io/content/images/size/w600/2025/04/image-10.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-10.png 1000w, https://mandos.io/content/images/2025/04/image-10.png 1592w" sizes="(min-width: 720px) 720px"></figure><p>Today's companies rely on dozens or hundreds of outside vendors, creating a huge attack surface you don't directly control. Supply chain attacks have become one of the most effective ways for smart attackers to breach well-protected organizations.</p><p>In this test, your team copies attacks that use your supply chain - including software dependencies, vendor access, and update systems. They'll try to find trusted relationships that could be used against you and test how well you can detect compromised vendor systems or bad updates.</p><p>These attacks can lead to severe problems including money loss, data breaches, lost trust, and even national security risks.</p><p><strong>What you'll learn: </strong>This test helps you understand which third-party connections pose the greatest risk, whether your vendor risk program works, and if you can detect strange behavior from trusted outside sources. You'll also learn if your incident response plan covers supply chain attacks.</p><div class="kg-card kg-button-card kg-align-center"><a href="https://mandosio.notion.site/Supply-Chain-Compromise-1d6c6c673b54812b963edab2cde06f2f?ref=mandos.io" class="kg-btn kg-btn-accent">Get the Template</a></div><h2 id="5-defensive-control-evasion-testing-your-actual-detection-capabilities">5. Defensive Control Evasion: Testing Your Actual Detection Capabilities</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-11.png" class="kg-image" alt="Defensive Control Evasion" loading="lazy" width="1480" height="1226" srcset="https://mandos.io/content/images/size/w600/2025/04/image-11.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-11.png 1000w, https://mandos.io/content/images/2025/04/image-11.png 1480w" sizes="(min-width: 720px) 720px"></figure><p>Modern attackers don't use noisy malware that triggers alarms - they use quiet techniques designed to blend in with normal activity. This test checks whether your security team can spot sophisticated threats that try to stay hidden.</p><p>Your red team should use living-off-the-land techniques, fileless malware, and evasion tactics that copy advanced persistent threats. Rather than setting off obvious alarms, they should try to accomplish their goals while staying under the radar.</p><p>Security experts note that using built-in system tools is exactly how hackers stay undetected, sometimes for months.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">The most dangerous attackers aren't the ones making noise; they're the ones silently moving through your systems undetected.</div></div><p>What you'll learn: This test reveals if your security team can tell the difference between normal system behavior and malicious activity, if your endpoint protection catches fileless attacks, and whether your security tools work together as a system. You'll also see how quickly your team responds to subtle signs of compromise.</p><div class="kg-card kg-button-card kg-align-center"><a href="https://mandosio.notion.site/Defensive-Control-Evasion-1d6c6c673b548167be47e222474661e5?ref=mandos.io" class="kg-btn kg-btn-accent">Get the Template</a></div><h2 id="moving-beyond-the-checklist-approach-to-security">Moving Beyond the Checklist Approach to Security</h2><p>These five exercises will tell you more about your security position than any compliance checklist or scanning tool. They focus on attack patterns that actually lead to breaches, not theoretical problems that look good in reports but don't reflect real risk.</p><p>The most valuable outcome isn't just finding vulnerabilities - it's understanding the full attack chain and how multiple small weaknesses can combine into major problems. This complete view lets you make strategic security investments rather than quick fixes.</p><p>If you haven't run these types of realistic tests, you don't truly know your security status. And in today's threat landscape, that's a risk no organization can afford.</p><p>What red team exercises have provided the most value for your organization? I'd love to hear about your experiences in the comments below.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><b><strong style="white-space: pre-wrap;">Is security blocking your next enterprise deal?</strong></b></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #100: Microsoft NTLM Exploit, Cybersecurity Job Reality, AI Security Incidents Up 56% ]]></title>
        <description><![CDATA[ Task Scheduler vulnerabilities enable privilege escalation without user approval. Multi-layered phishing campaigns delivering Agent Tesla through evasion techniques. AI-related security incidents jumped 56.4% in 2024. ]]></description>
        <link>https://mandos.io/newsletter/brief-100-microsoft-ntlm-exploit-cybersecurity-job-reality-ai-security-incidents-up-56/</link>
        <guid isPermaLink="false">6803a2f3c8d91f00014cd3df</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 20 Apr 2025 13:00:25 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/16.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Welcome to the 100th edition of Mandos Brief! Thanks to all of you who've been with me on this journey - whether you're a day-one reader or just joined us recently.</p><p>This week brings some developments worth your attention:</p><ul><li>Microsoft's NTLM Hash vulnerability is already being exploited just 8 days after patching - a reminder that the patch-to-exploit window keeps shrinking</li><li>The cybersecurity job market is showing a paradoxical reality: entry-level positions are oversaturated while organizations still struggle to find qualified talent</li><li>Stanford's AI Index Report reveals AI-related security incidents jumped 56% in 2024, with websites increasingly restricting data scraping for AI training</li></ul><p>Let's dive into this week's security landscape!</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">If you find these insights valuable, why not share this milestone edition with your network?</div></div><div class="kg-card kg-cta-card kg-cta-bg-grey kg-cta-minimal   " data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">BECOME A SPONSOR</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Get your cybersecurity product or resource in front of 1100+ cybersecurity leaders and professionals.</span></p>
                        </div>
                    
                    
                        <a href="https://mandos.io/contact/" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Learn more
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="microsoft-ntlm-hash-disclosure-vulnerability-actively-exploited-within-days-of-patch"><a href="https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/?ref=mandos.io">Microsoft NTLM Hash Disclosure Vulnerability Actively Exploited Within Days of Patch</a></h3>
<ul>
<li>
<p>A <strong>vulnerability</strong> in Windows Explorer (CVE-2025-24054) allows attackers to leak NTLM hashes via maliciously crafted <code>.library-ms</code> files with minimal user interaction - even right-clicking or simply navigating to a folder containing the file can trigger the exploit.</p>
</li>
<li>
<p>Malicious campaigns targeting government and private institutions in <strong>Poland</strong> and <strong>Romania</strong> began just 8 days after Microsoft's March 11 patch, using malspam with Dropbox links containing files that harvest NTLMv2-SSP <strong>hashes</strong> for potential credential theft or relay attacks.</p>
</li>
<li>
<p>The attack appears to be a variant of a previously patched vulnerability (CVE-2024-43451), with similar campaigns continuing against organizations worldwide using multiple network resource files targeting the same SMB authentication weakness.</p>
</li>
</ul>
<h3 id="task-scheduler-vulnerabilities-enable-uac-bypass-and-log-manipulation"><a href="https://cymulate.com/blog/task-scheduler-new-vulnerabilities-for-schtasks-exe/?ref=mandos.io">Task Scheduler Vulnerabilities Enable UAC Bypass and Log Manipulation</a></h3>
<ul>
<li>
<p>Researchers discovered a UAC <strong>bypass</strong> vulnerability in Windows Task Scheduler that allows attackers to execute high-privilege commands without user approval by exploiting batch logon functionality, elevating from any integrity level to the highest available privileges.</p>
</li>
<li>
<p>Two new defense <strong>evasion</strong> techniques were identified - one leveraging an unlimited buffer in the Author task metadata field that can overwrite Event Log descriptions, and another building on this to completely overflow the Security Event Log file (Security.evtx) through repeated task creation.</p>
</li>
<li>
<p>The <strong>impersonation</strong> capabilities of schtasks.exe can be particularly dangerous for lateral movement, allowing any low-privileged user with knowledge of credentials for users in Administrators, Backup Operators, or Performance Log Users groups to obtain elevated privileges through batch logon.</p>
</li>
</ul>
<h3 id="phishing-campaign-uses-multi-layered-attack-chain-to-deliver-agent-tesla-and-other-malware"><a href="https://unit42.paloaltonetworks.com/phishing-campaign-with-complex-attack-chain/?ref=mandos.io">Phishing Campaign Uses Multi-Layered Attack Chain to Deliver Agent Tesla and Other Malware</a></h3>
<ul>
<li>
<p>Attackers deployed a sophisticated <strong>phishing</strong> campaign delivering malicious archives that initiate complex multi-stage attack chains, using both AutoIt and .NET compiled executables as alternative paths to evade detection.</p>
</li>
<li>
<p>The attack begins with emails containing malicious 7z attachments disguised as order documents, which extract JSE files that download PowerShell scripts to deliver the final <strong>payloads</strong> including Agent Tesla variants, Remcos RAT, and XLoader.</p>
</li>
<li>
<p>Through process <strong>injection</strong> techniques targeting legitimate Windows processes like RegAsm.exe and RegSvcs.exe, the malware establishes persistence while complicating analysis by security researchers and sandboxes.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="nist-publishes-draft-guidelines-for-api-protection-in-cloud-native-systems"><a href="https://drive.google.com/file/d/1JX2qY2Wyy8wkO0wSBz-T7zp7bSxdq3b5/view?usp=drivesdk&ref=mandos.io">NIST Publishes Draft Guidelines for API Protection in Cloud-Native Systems</a></h3>
<ul>
<li>
<p>NIST Special Publication 800-228 provides comprehensive guidance on <strong>vulnerabilities</strong> in API lifecycles and recommends both basic and advanced protection controls for pre-runtime and runtime stages.</p>
</li>
<li>
<p>The document emphasizes <strong>zero-trust</strong> principles for all APIs, noting that perimeters have vanished in modern enterprise IT applications, requiring controls to span both public and internal APIs.</p>
</li>
<li>
<p>Common API risks identified include lack of visibility in enterprise inventory, broken authentication, and unrestricted <strong>resource</strong> consumption that can lead to denial-of-service attacks.</p>
</li>
</ul>
<h3 id="anthropics-enterprise-ai-implementation-guide-outlines-security-and-compliance-best-practices"><a href="https://drive.google.com/file/d/1J6ZuTx0zdhQJ2krTCBpfSqTHKQEZpQU0/view?usp=drivesdk&ref=mandos.io">Anthropic's Enterprise AI Implementation Guide Outlines Security and Compliance Best Practices</a></h3>
<ul>
<li>
<p>Anthropic's guide emphasizes the need for comprehensive <strong>security</strong> frameworks that address data privacy, model security, and regulatory requirements as part of a three-dimensional AI strategy encompassing people, processes, and technology.</p>
</li>
<li>
<p>Organizations implementing AI should establish an AI review board, define <strong>ethical</strong> guidelines, and create transparent processes for model evaluation and incident response to build trust while maintaining momentum.</p>
</li>
<li>
<p>The implementation roadmap progresses through increasing levels of technical <strong>complexity</strong> - from basic implementations focused on direct interactions to advanced agent-based systems with decision-making capabilities and sophisticated error handling mechanisms.</p>
</li>
</ul>
<h3 id="initial-access-brokers-report-us-organizations-most-targeted-with-shift-toward-smbs"><a href="https://drive.google.com/file/d/1RhgnGp_pKi9beH45OukM-jWTz4XAUOZE/view?usp=drivesdk&ref=mandos.io">Initial Access Brokers Report: US Organizations Most Targeted With Shift Toward SMBs</a></h3>
<ul>
<li>
<p>Initial Access Brokers (IABs) are increasingly targeting smaller organizations with 60.5% of attacks now focusing on companies with $5M-$50M revenue, compared to 53% in 2023. The US remains the prime target (31% of all attacks), with <strong>VPN</strong> access surging in 2024, challenging RDP for the top exploitation method.</p>
</li>
<li>
<p>Business services, manufacturing, and retail are the most targeted industries (13% each), showing a broader distribution compared to 2023 when business services alone represented 29%. The average access price in 2024 is $2,047, with 58% of listings priced under $1,000, making these compromises both affordable and damaging at scale.</p>
</li>
<li>
<p>Most compromised machines (53%) had only Windows <strong>Defender</strong> as their security product, highlighting significant security gaps. Domain user is now the most common <strong>privilege</strong> type offered for sale, with domain and local admin privileges accounting for approximately 70% of listings.</p>
</li>
</ul>
<blockquote>
<p>Discover my collection of industry reports, guides and cheat sheets in <a href="http://https//mandos.io/cyber-strategy-os/?ref=mandos.io">Cyber Strategy OS</a></p>
</blockquote>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-job-market-reality-graduate-oversaturation-meets-industry-unwillingness-to-train-entry-level-talent"><a href="https://www.linkedin.com/posts/nikolozk_industry-has-created-a-generation-of-cybersecurity-activity-7317892792955932672-ivxn?rcm=ACoAAArAQjgBCegFwkx_pCKIUGBcJtlEsqQX2fA&ref=mandos.io">Cybersecurity Job Market Reality: Graduate Oversaturation Meets Industry Unwillingness to Train Entry-Level Talent</a></h3>
<ul>
<li>
<p>The cybersecurity industry faces a significant <strong>oversaturation</strong> of entry-level applicants, with 300+ candidates competing for single SOC analyst positions while education providers continue to promote a "massive skills gap" narrative.</p>
</li>
<li>
<p>Most "entry-level" positions now require 2-3 years of experience, creating a paradoxical barrier for new graduates who have invested in degrees, certifications, and home labs but cannot gain initial experience in the <strong>industry</strong>.</p>
</li>
<li>
<p><strong>Automation</strong> of traditional starter positions and economic factors have further constricted the entry pipeline, requiring job seekers to target niche skill areas like OT security, IAM, or threat modeling rather than oversaturated SOC roles.</p>
</li>
</ul>
<h3 id="over-half-of-it-leaders-struggle-to-hire-skilled-cybersecurity-talent"><a href="https://valorinternational.globo.com/business/news/2025/04/04/over-half-of-it-leaders-struggle-to-hire-skilled-cybersecurity-talent.ghtml?ref=mandos.io">Over Half of IT Leaders Struggle to Hire Skilled Cybersecurity Talent</a></h3>
<ul>
<li>
<p>The cybersecurity <strong>talent</strong> gap continues to widen, with more than 50% of IT leaders reporting difficulty finding qualified professionals to protect their organizations from increasing threats.</p>
</li>
<li>
<p>Organizations are experiencing negative <strong>impacts</strong> on their security posture due to understaffing, including delayed project implementations, increased vulnerability to attacks, and difficulty maintaining compliance standards.</p>
</li>
<li>
<p>Companies are responding by implementing alternative strategies such as upskilling existing staff, adopting more <strong>automated</strong> security tools, and partnering with managed security service providers to address critical gaps.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-share-their-biggest-workplace-mistakes-on-reddit"><a href="https://www.reddit.com/r/cybersecurity/comments/1k2jfse/whats_your_largest_screwup_on_the_job/?ref=mandos.io">Cybersecurity Professionals Share Their Biggest Workplace Mistakes on Reddit</a></h3>
<ul>
<li>
<p>A security engineer accidentally enabled global 2FA settings instead of account-specific settings, causing an enterprise-wide <strong>lockout</strong> of a critical security application.</p>
</li>
<li>
<p>Multiple professionals reported configuration mistakes including deleting VLANs from military facilities, syncing blank servers to production file servers, and breaking domain controller access by implementing overly restrictive <strong>hardening</strong> policies.</p>
</li>
<li>
<p>One analyst described deploying <strong>Crowdstrike</strong> EDR enterprise-wide just before the major global outage, while another inadvertently quarantined all Chrome browsers organization-wide by misconfiguring a custom <strong>IOC</strong>.</p>
</li>
</ul>

<!--kg-card-begin: html-->

<!-- Mandos Feedback Widget -->
<div id="mandos-feedback-widget"></div>
<script>
  (function() {
    if (window.mandosFeedbackLoaded) return;
    window.mandosFeedbackLoaded = true;

    window.mandosFeedbackConfig = {
      formId: '68012298d436ba4e0488f5bc',  // Ensure ID is converted to string
      type: 'question',
      question: 'How valuable was this week\'s Mando\'s Brief? ',  // Escape single quotes
      backgroundColor: '#0d1117',
      textColor: '#ffffff',
      thankYouText: 'Thank you for helping me improve!',
      customThankYouPage: '',
      answers: [{"text":"👍 Valuable - I found useful information","uniqueId":"93f108c5783c388757c416c7ebfb815b","redirectUrl":"","_id":"68012298d436ba4e0488f5bd"},{"text":"🤔 Okay - It was somewhat interesting","uniqueId":"0aad43e6dcd9d255de5d51cf92551e25","redirectUrl":"","_id":"68012298d436ba4e0488f5be"},{"text":"👎 Not valuable - Didn't meet my expectations","uniqueId":"b2c1c9e9aced76cbdd33cc3cbaec2b31","redirectUrl":"","_id":"68012298d436ba4e0488f5bf"}],
      baseUrl: 'https://feedback.mandos.io'
    };

    // Load widget assets
    function loadWidget() {
      // Load script
      const script = document.createElement('script');
      script.src = 'https://feedback.mandos.io/feedback-widget.js';
      script.defer = true;
      script.onerror = () => console.error('Failed to load feedback widget script');
      document.head.appendChild(script);

      // Load styles
      const link = document.createElement('link');
      link.rel = 'stylesheet';
      link.href = 'https://feedback.mandos.io/feedback-widget.css';
      link.onerror = () => console.error('Failed to load feedback widget styles');
      document.head.appendChild(link);
    }

    // Load when DOM is ready
    if (document.readyState === 'loading') {
      document.addEventListener('DOMContentLoaded', loadWidget);
    } else {
      loadWidget();
    }
  })();
</script>
<!-- End Mandos Feedback Widget -->
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="building-your-first-offensive-security-mcp-server"><a href="https://nae-bo.medium.com/building-your-first-offensive-security-mcp-server-dd655e258d5f?ref=mandos.io">Building Your First Offensive Security MCP Server</a></h3>
<ul>
<li>
<p>The Multi-protocol <strong>C2</strong> server (MCP) is an evolving open-source collaborative platform that includes multiple protocols and agents for offensive security operations, providing a comprehensive alternative to commercial tools like Cobalt Strike.</p>
</li>
<li>
<p>MCP offers advanced features such as remote code execution, file manipulation, and credential harvesting, with the ability to create and deploy <strong>implants</strong> using the command line interface via SSH.</p>
</li>
<li>
<p>The setup process involves several key components including Debian/Ubuntu installation, MongoDB configuration, and proper security practices like running services as a non-root user and enforcing TLS for all connections.</p>
</li>
</ul>
<h3 id="deloitte-highlights-the-need-for-balanced-ai-governance-amid-expanding-ai-capabilities"><a href="https://drive.google.com/file/d/1UQE9xW26W4FhbpqYYVumM_R2Ua0nc8mj/view?usp=drivesdk&ref=mandos.io">Deloitte Highlights the Need for Balanced AI Governance Amid Expanding AI Capabilities</a></h3>
<ul>
<li>
<p>As AI transforms business operations globally, the focus has shifted from whether AI delivers value to managing its implementation costs, including <strong>compliance</strong> requirements and potential penalties for non-compliance, while preventing poor quality development that could lead to substantial rework and reputational damage.</p>
</li>
<li>
<p>Different AI forms bring unique capabilities and challenges - Machine Learning analyzes datasets for predictions, Generative AI improves human-computer interactions, while <strong>agentic</strong> AI can autonomously perform complex tasks, raising both efficacy and risk considerations across industries like healthcare, banking, and manufacturing.</p>
</li>
<li>
<p>Organizations must balance <strong>regulatory</strong> requirements like the EU AI Act with operational efficiency, as AI-specific risks include scaling biases in training data, unreliable outputs from generative systems, and autonomous decision-making that could violate organizational requirements without human awareness.</p>
</li>
</ul>
<h3 id="stanford-ai-index-report-2025-highlights-growing-cybersecurity-concerns-amid-rapid-ai-adoption"><a href="https://drive.google.com/file/d/1BNDQJlKcVcYXI-ZacrbMnRb67ejo5Wqq/view?usp=drivesdk&ref=mandos.io">Stanford AI Index Report 2025 highlights growing cybersecurity concerns amid rapid AI adoption</a></h3>
<ul>
<li>
<p>The number of reported AI-related <strong>incidents</strong> rose to 233 in 2024—a record high and a 56.4% increase over 2023, according to the AI Incidents Database, highlighting growing security challenges as AI adoption accelerates.</p>
</li>
<li>
<p>Organizations recognize key responsible AI risks, but implementation of <strong>mitigation</strong> efforts lags behind, with only 64% concerned about AI inaccuracy, 63% about regulatory compliance, and 60% about cybersecurity threats.</p>
</li>
<li>
<p>The data <strong>commons</strong> is rapidly shrinking as websites implement new protocols to limit data scraping for AI training, with restricted tokens in actively maintained domains jumping from 5-7% to 20-33% between 2023 and 2024.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="sekoiaio-secures-%E2%82%AC26-million-in-series-b-funding-to-enhance-ai-soc-platform-and-expand-internationally"><a href="https://www.sekoia.io/en/presse/sekoia-io-secures-e26-million-in-series-b-to-democratize-cyber-operations-with-ai-and-cyber-intelligence/?ref=mandos.io">Sekoia.io Secures €26 million in Series B Funding to Enhance AI-SOC Platform and Expand Internationally</a></h3>
<ul>
<li>
<p>European cybersecurity firm Sekoia.io raises €26M from Revaia, UNEXO, and existing investors, bringing total funding to €60M since founding in 2022. Funding will accelerate <strong>AI</strong> development and international expansion beyond Europe.</p>
</li>
<li>
<p>The Sekoia AI-SOC Platform automates threat detection using an exclusive <strong>intelligence</strong> dataset on threat actors, deploys agent-based AI to reduce incident response times, and offers 200+ native integrations with third-party solutions.</p>
</li>
<li>
<p>The company targets the rapidly growing <strong>MSSP</strong> market (expected to reach $52.9B by 2028) with a platform designed to democratize access to advanced cybersecurity for organizations of all sizes, addressing challenges posed by the NIS2 directive and talent shortages.</p>
</li>
</ul>
<h3 id="cybersecurity-funding-increases-29-in-q1-2025-despite-fewer-deals"><a href="https://news.crunchbase.com/cybersecurity/venture-funding-up-q1-2025-wiz-ninjaone/?ref=mandos.io">Cybersecurity Funding Increases 29% in Q1 2025 Despite Fewer Deals</a></h3>
<ul>
<li>
<p>Total <strong>funding</strong> to venture-backed cybersecurity startups reached $2.7 billion in Q1, up 29% from Q4 2024, while <strong>deal</strong> flow declined 31% year-over-year with only 139 deals completed.</p>
</li>
<li>
<p>Google's planned $32 billion <strong>acquisition</strong> of cloud security unicorn Wiz, the largest acquisition of a venture-backed company ever, may drive further investor interest in the cybersecurity sector.</p>
</li>
<li>
<p>Key growth drivers include <strong>AI</strong> applications in security, with major funding rounds going to NinjaOne ($500M at $5B valuation), Island ($250M at $4.8B valuation), and Aura ($140M at $1.6B valuation).</p>
</li>
</ul>
<h3 id="exaforce-secures-75-million-series-a-funding-for-ai-powered-soc-platform"><a href="https://siliconcanals.com/exaforce-unveils-75-million-in-series-a-funding-to-revolutionize-security-and-operations-with-agentic-ai/?ref=mandos.io">Exaforce Secures $75 Million Series A Funding for AI-powered SOC Platform</a></h3>
<ul>
<li>
<p>Exaforce has developed the industry's first <strong>multi-model</strong> AI platform for Security Operations Centers (SOCs), combining semantic, behavioral, and statistical models with LLMs to overcome limitations of pure LLM approaches in security applications.</p>
</li>
<li>
<p>The funding round was led by Khosla Ventures and Mayfield, with their Agentic SOC Platform promising a tenfold reduction in human-led SOC work through AI agents called <strong>Exabots</strong> that handle alert triage, investigations, and automated workflows.</p>
</li>
<li>
<p>Design partners have already reported 10x improvements in <strong>productivity</strong>, with the platform addressing critical SOC challenges including false positive reduction, improved threat detection coverage for cloud environments, and alleviating the security talent <strong>shortage</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="jit"><a href="https://cybersectools.com/tools/jit?ref=mandos.io">Jit</a></h3>
<p>An integrated application security platform that combines multiple security scanning tools with developer-focused workflows for automated code and infrastructure security testing.</p>
<h3 id="contrast-runtime-security-platform"><a href="https://cybersectools.com/tools/contrast-runtime-security-platform?ref=mandos.io">Contrast Runtime Security Platform</a></h3>
<p>A comprehensive application security platform that combines runtime protection, security testing, and monitoring capabilities across the entire application lifecycle.</p>
<h3 id="zerofox-easm"><a href="https://cybersectools.com/tools/zerofox-easm?ref=mandos.io">ZeroFox Easm</a></h3>
<p>A solution that discovers, analyzes, and helps remediate vulnerabilities across an organization's external digital attack surface by identifying and monitoring internet-facing assets.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ How MCP Creates AI Superpowers That Bypass Traditional Security Models ]]></title>
        <description><![CDATA[ The Model Context Protocol lets AI access multiple systems simultaneously, creating security risks most organizations aren&#39;t prepared for. Learn the strategic framework needed for proper MCP governance. ]]></description>
        <link>https://mandos.io/blog/how-mcp-creates-ai-superpowers-that-bypass-traditional-security-models/</link>
        <guid isPermaLink="false">67f66a2e4b191d0001c908b3</guid>
        <category><![CDATA[ AI ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 15 Apr 2025 16:00:28 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/impact-of-mcp-on-traditional-security.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Every security leader knows the basics: isolate critical systems, check every access request, watch all traffic. Then along comes a protocol that rewrites these rules completely.</p><p>The <a href="https://modelcontextprotocol.io/introduction?ref=mandos.io">Model Context Protocol (MCP)</a> isn't just another way to connect systems. It's a whole new security approach that gives AI access privileges like never before. While your security team works on stronger walls, MCP builds bridges between areas that were once kept separate.</p><p>I've build and utilized various MCP servers in past months tracking how this protocol changes security landscapes. What I found will change how you think about AI management: </p><p><em>MCP creates what I call "identity confusion" – where it's hard to tell if actions come from AI or humans in ways our current security can't handle.</em></p><p>This matters a lot for your organization. By the time you finish reading, you'll understand:</p><ul><li>Why traditional access management breaks when AI systems use MCP</li><li>How security boundaries disappear when AI connects across system permissions</li><li>What governance structures need to change to handle this shift</li></ul><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">What You Need to Know Now</strong></b><br>MCP lets AI systems access multiple data sources at once, using permissions in ways your security team never planned for. This creates risks most organizations aren't prepared to handle.</div></div><h2 id="the-universal-remote-for-ai">The Universal Remote for AI</h2><p>Before we dive into security issues, let's clarify what the Model Context Protocol actually does.</p><p><a href="https://modelcontextprotocol.io/introduction?ref=mandos.io">The Model Context Protocol (MCP)</a> offers a standard way for AI models to connect with outside data sources and tools. Think of it as a universal remote that lets AI assistants work with various systems without special coding for each connection.</p><p>Introduced by Anthropic in late 2024 and quickly adopted by OpenAI and others, MCP solves a big engineering challenge – connecting many AI systems with many tools. Instead of building custom connections for each combination, MCP creates one consistent protocol for all connections.</p><p>This clever solution has led to rapid adoption. The ecosystem now includes thousands of community-driven servers connecting AI to everything from GitHub and Slack to payment systems and databases.</p><p>But this convenience comes with security costs most organizations aren't ready for.</p><h2 id="how-mcp-transforms-ai-capabilities">How MCP Transforms AI Capabilities</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-2.png" class="kg-image" alt="MCP superpowers" loading="lazy" width="1472" height="832" srcset="https://mandos.io/content/images/size/w600/2025/04/image-2.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-2.png 1000w, https://mandos.io/content/images/2025/04/image-2.png 1472w" sizes="(min-width: 720px) 720px"></figure><p>MCP gives AI three basic superpowers that traditional security wasn't designed to handle:</p><ol><li><strong>Identity Amplification</strong>: AI can act through multiple identity contexts at once</li><li><strong>Context Consolidation</strong>: AI can access information across security boundaries</li><li><strong>Permission Persistence</strong>: AI actions keep privileges across system transitions</li></ol><p>These abilities solve real business problems. Rather than building many separate connections for each service, MCP standardizes how your components share data and actions with any AI-based workflow.</p><p>But this business value comes with security impacts that go beyond traditional models.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="identity-and-access-management-disruption">Identity and Access Management Disruption</h2><p>Traditional access management assumes a direct connection between users and permissions. MCP breaks this model by creating a new type of digital entity that doesn't fit existing frameworks.</p><h3 id="the-consolidated-super-user-problem">The Consolidated Super-User Problem</h3><p>MCP creates a "super-user" when an AI assistant connects to multiple systems. Unlike humans who work in one context at a time, AI systems can request data from a CRM, change records in HR, and trigger financial transactions all at once.</p><p>This creates a whole new security risk. An AI agent can gather privileges across different systems, bypassing the careful role structures you created for enterprise systems.</p><p>Consider a real scenario where an AI assistant helping with HR onboarding can access:</p><ul><li>Candidate information in the hiring system</li><li>Salary data in the HR system</li><li>Team budgets in the financial system</li><li>Code repositories for project assignments</li></ul><p>None of your human HR staff would have all this access. Yet through MCP, the AI can span these systems with a single query.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">The Permission Problem</strong></b><br>Your carefully designed access controls assume humans with specific roles. MCP-enabled AI doesn't fit these assumptions, creating security gaps you might not even see.</div></div><h3 id="identity-masquerading-and-confusion">Identity Masquerading and Confusion</h3><p>The second disruption involves what I call "identity masquerading." MCP-enabled AI often operates under service accounts or through delegated permissions that blur responsibility.</p><p>MCP needs a clear identity model. We need to know who is making the call and define what tools from the MCP server are allowed.</p><p>But most organizations lack this clarity. When an AI takes action through MCP, current security monitoring can't clearly attribute that action to a specific person. Was it the AI making a decision? The user who started the conversation? The developer who set up the system? This creates serious compliance and audit problems.</p><h2 id="zero-trust-collision">Zero Trust Collision</h2><p>Zero Trust architecture is the gold standard for modern security. Its core idea – never trust, always verify – should protect against MCP risks. But the reality is more complex.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h3 id="how-mcp-both-enables-and-undermines-zero-trust">How MCP Both Enables and Undermines Zero Trust</h3><p>MCP actually supports Zero Trust principles by creating standard access points with verification opportunities. When implemented properly, MCP can define strict boundaries with authentication for every interaction.</p><p>But here's the paradox: MCP also undermines Zero Trust by blurring the line between user and AI agent identity.</p><p>Traditional Zero Trust assumes:</p><ol><li>Clear, verifiable identity for each request</li><li>Context-specific access with minimal privileges</li><li>Continuous verification of authentication</li></ol><p>MCP challenges the first assumption by creating mixed identities. An MCP-enabled AI might make requests that combine the user's identity with service account permissions and third-party API access.</p><h3 id="the-challenge-of-continuous-verification">The Challenge of Continuous Verification</h3><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-3.png" class="kg-image" alt="zero trust security checkpoint" loading="lazy" width="1472" height="832" srcset="https://mandos.io/content/images/size/w600/2025/04/image-3.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-3.png 1000w, https://mandos.io/content/images/2025/04/image-3.png 1472w" sizes="(min-width: 720px) 720px"></figure><p>Zero Trust requires constant verification, but MCP creates new challenges by adding a layer between the requesting entity (AI) and the systems being accessed.</p><p>Consider a typical MCP workflow where an AI assistant processes a user request:</p><ol><li>The user asks a question requiring data from multiple systems</li><li>The AI decides which systems to query through MCP</li><li>MCP servers run these queries using stored credentials</li><li>The AI combines the results to generate a response</li></ol><p>When should verification happen? At the user's initial request? The AI's decision to access specific systems? When the MCP server runs each query?</p><p>Current Zero Trust implementations struggle with this nested verification chain.</p><h2 id="the-unbounded-context-problem">The Unbounded Context Problem</h2><p>Perhaps the biggest security shift MCP creates is what I call the "unbounded context problem" – AI can access data across previously isolated contexts at the same time.</p><h3 id="context-awareness-that-exceeds-human-capabilities">Context Awareness That Exceeds Human Capabilities</h3><p>When a human employee accesses information, they work within a single context at a time. This creates natural boundaries. The finance employee doesn't see HR data. The HR employee doesn't see support tickets.</p><p>MCP-enabled AI breaks these natural boundaries. An AI agent can build context from financial data, HR records, support tickets, and engineering plans – all within a single session.</p><p>This ability creates value by helping the AI make connections across previously separated areas. But it also creates unprecedented security risks.</p><p>When AI assistants gain access to sensitive files, databases, or services via MCP, organizations must ensure those interactions are secure, authenticated, and tracked.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Context is Everything</strong></b><br>Your security model assumes information will stay in its own lane. MCP-enabled AI brings it all together, creating combinations you never planned for.</div></div><h3 id="unintended-information-exposure">Unintended Information Exposure</h3><p>The unbounded context problem leads to accidental information exposure when AI systems combine data in ways security architects never expected.</p><p>For example, an AI answering a simple question about "department productivity" might combine:</p><ul><li>Sales figures from the CRM</li><li>Employee performance data from HR</li><li>Project timelines from engineering</li><li>Customer satisfaction metrics from support</li></ul><p>None of these systems alone contains sensitive combinations. But together, they might reveal confidential business plans or individual performance issues not meant for everyone to see.</p><p>This isn't malicious. The AI is just doing what it was designed to do – creating connections across available information. But when MCP enables access across traditionally separate systems, these connections can breach security boundaries.</p><h2 id="invisible-threat-surface">Invisible Threat Surface</h2><p>MCP creates a new type of threat that traditional security monitoring tools can't detect – the invisible connections between previously isolated systems.</p><h3 id="the-pathway-problem-in-security-monitoring">The Pathway Problem in Security Monitoring</h3><p>Security teams watch network traffic, API calls, and database access. But MCP creates logical pathways between systems that don't show up in these traditional monitoring tools.</p><p>When an AI assistant uses MCP to access multiple systems for a single task, the connections between those systems exist only in the AI's context – not in any network logs your security team might check.</p><p>For instance, an AI helping with budget planning might:</p><ol><li>Pull current expenses from the finance system</li><li>Review team growth plans from HR</li><li>Access project roadmaps from engineering</li><li>Check industry trends from market research databases</li></ol><p>Each individual access might look fine in system logs. But the combination – the pathway between these systems that exists only in the AI's context – represents a potential security risk that's invisible to current monitoring tools.</p><h3 id="audit-trails-and-chain-of-thought-challenges">Audit Trails and Chain-of-Thought Challenges</h3><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/image-4.png" class="kg-image" alt="" loading="lazy" width="1472" height="832" srcset="https://mandos.io/content/images/size/w600/2025/04/image-4.png 600w, https://mandos.io/content/images/size/w1000/2025/04/image-4.png 1000w, https://mandos.io/content/images/2025/04/image-4.png 1472w" sizes="(min-width: 720px) 720px"></figure><p>Modern security requires clear audit trails. But MCP introduces what I call the "chain-of-thought" challenge – understanding the reasoning that led an AI to access specific systems in a particular order.</p><p>MCP lacks good monitoring mechanisms. Without robust tracking frameworks and standard logging methods, finding unusual patterns, preventing system failures, and addressing potential security incidents becomes difficult.</p><p>This creates a basic governance challenge: how do you audit what you can't see?</p><h2 id="governance-without-precedent">Governance Without Precedent</h2><p>All these challenges create a governance problem with no historical comparison. How do you govern a system that crosses identity boundaries, works across contexts, and creates invisible connections between isolated systems?</p><h3 id="the-lack-of-established-frameworks">The Lack of Established Frameworks</h3><p>There are no established frameworks for governing AI system permissions across MCP connections. This is new territory.</p><p>MCP lacks a standardized framework for managing authentication and authorization across different clients and servers. Without a unified way to verify identities and control access, it's hard to enforce detailed permissions, especially in environments with multiple tenants.</p><p>Traditional governance approaches fall short because they assume:</p><ol><li>Clear boundaries between systems</li><li>Static permission models</li><li>Human-centered identity frameworks</li><li>Visible connection paths between systems</li></ol><p>MCP challenges all of these assumptions.</p><h3 id="a-strategic-framework-for-mcp-governance">A Strategic Framework for MCP Governance</h3><p>Based on my analysis, organizations need a new governance framework specifically designed for MCP-enabled AI systems. This framework should include:</p><ol><li><strong>AI-Specific Identity Models</strong>: Develop identity frameworks that recognize AI as a distinct actor type with different characteristics than human users.</li><li><strong>Context-Aware Access Controls</strong>: Implement permissions that consider the combination of data access rather than just individual system access.</li><li><strong>Cross-System Monitoring</strong>: Build monitoring capabilities that track information flow across system boundaries through AI-mediated connections.</li><li><strong>Intent-Based Governance</strong>: Shift from action-based permissions to intent-based permissions that consider why an AI is accessing information, not just what it's accessing.</li><li><strong>Human Oversight Triggers</strong>: Define clear thresholds for when AI actions require human verification before execution.</li></ol><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">New Problems Need New Solutions</strong></b><br>Your existing security governance wasn't built for AI that can use multiple identities and access patterns at once. Building AI-specific governance isn't optional – it's necessary.</div></div><h2 id="strategic-recommendations">Strategic Recommendations</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/04/mcp-security-strategies.png" class="kg-image" alt="mcp security strategies" loading="lazy" width="1992" height="1489" srcset="https://mandos.io/content/images/size/w600/2025/04/mcp-security-strategies.png 600w, https://mandos.io/content/images/size/w1000/2025/04/mcp-security-strategies.png 1000w, https://mandos.io/content/images/size/w1600/2025/04/mcp-security-strategies.png 1600w, https://mandos.io/content/images/2025/04/mcp-security-strategies.png 1992w" sizes="(min-width: 720px) 720px"></figure><p>The security implications of MCP require a strategic response. Here are five actionable recommendations for security leaders:</p><h3 id="1-conduct-an-mcp-assessment">1. Conduct an MCP Assessment</h3><p>Begin by identifying all AI systems in your organization that use or plan to use MCP. Map the data sources and systems each AI can access through MCP connections. This visibility is essential before implementing any controls.</p><h3 id="2-develop-an-ai-identity-framework">2. Develop an AI Identity Framework</h3><p>Create a dedicated identity framework for AI systems that:</p><ul><li>Clearly defines ownership and responsibility for each AI system</li><li>Sets permission boundaries based on business function, not technical capability</li><li>Creates specific review processes for cross-domain access requests</li></ul><h3 id="3-implement-context-aware-monitoring">3. Implement Context-Aware Monitoring</h3><p>Traditional security monitoring isn't enough for MCP-enabled systems. Implement context-aware monitoring that:</p><ul><li>Logs the complete context of each AI interaction</li><li>Tracks information flow between previously isolated systems</li><li>Identifies unusual data combination patterns that might indicate security risks</li></ul><h3 id="4-create-ai-specific-access-controls">4. Create AI-Specific Access Controls</h3><p>Your existing access management tools weren't designed for MCP-enabled AI. Develop AI-specific access controls that:</p><ul><li>Set boundaries based on data categories rather than just systems</li><li>Include time-based access limitations for sensitive information</li><li>Require progressive authentication for increasingly sensitive actions</li></ul><h3 id="5-establish-an-mcp-governance-committee">5. Establish an MCP Governance Committee</h3><p>MCP governance requires cross-functional expertise. Establish a dedicated governance committee that includes:</p><ul><li>Security leadership</li><li>Data privacy experts</li><li>AI ethics specialists</li><li>Business function representatives</li><li>Legal and compliance experts</li></ul><p>This committee should develop and maintain MCP-specific security policies, review access requests, and respond to emerging risks.</p><h2 id="the-bottom-line">The Bottom Line</h2><p>MCP represents a fundamental shift in how AI systems interact with your organization's data and systems. This shift creates unprecedented security challenges that go beyond traditional models.</p><p>The "identity confusion" MCP creates – where AI actions blend human and machine permissions – requires a new security mindset. Organizations that fail to adapt will face increasing risks as MCP adoption accelerates.</p><p>But those who embrace this new reality have an opportunity to use MCP's power while establishing appropriate safeguards. By developing AI-specific governance frameworks, implementing context-aware controls, and establishing clear oversight mechanisms, security leaders can enable responsible MCP adoption.</p><p>The choice isn't whether to use MCP – that ship has sailed as major AI providers embrace the standard. The choice is whether you'll govern MCP deliberately or allow it to evolve without oversight.</p><p>Given the superpowers MCP creates – identity amplification, context consolidation, and permission persistence – deliberate governance isn't optional. It's essential.</p><p>Are you ready for the new security reality?</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #99: IKEA&#x27;s €20M Ransomware Loss, Google&#x27;s Agent 2 Agent Protocol, Microsoft&#x27;s AI Security Guide ]]></title>
        <description><![CDATA[ NVIDIA container escape flaw remains exploitable despite patching. Threat actors maintain access to FortiGate devices through symlinks. Microsoft addresses shadow AI risks with new enterprise security guide. ]]></description>
        <link>https://mandos.io/newsletter/brief-99-ikeas-eu20m-ransomware-loss-googles-agent-2-agent-protocol-microsofts-ai-security-guide/</link>
        <guid isPermaLink="false">67fa6ac7bda0380001933073</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 13 Apr 2025 13:00:43 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/15.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>Hope you're enjoying a bit of downtime this weekend. While you were busy wrapping up your week, the security world kept moving with some developments worth noting:</p><ul><li>NVIDIA's Container Toolkit patch from September turns out to be incomplete, leaving systems vulnerable to container escape attacks – something to check if you're running AI infrastructure</li><li>Google's security team shared a refreshing take on why many security "strategies" are just plans in disguise, emphasizing the need for a coherent theory of winning</li><li>Microsoft released a guide addressing shadow AI risks, with 80% of leaders worried about sensitive data exposure when employees use unapproved AI tools</li></ul><p>There's plenty more to unpack this week, including career advice for nervous interviewers, market impacts from proposed tariffs, and some interesting new tools for your security stack.<br><br>Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-cta-card kg-cta-bg-grey kg-cta-minimal   " data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">BECOME A SPONSOR</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Get your cybersecurity product or resource in front of 1100+ cybersecurity leaders and professionals.</span></p>
                        </div>
                    
                    
                        <a href="https://mandos.io/contact/" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Learn more
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="nvidia-container-toolkit-vulnerability-remains-exploitable-despite-september-patch"><a href="https://www.trendmicro.com/en_us/research/25/d/incomplete-nvidia-patch.html?ref=mandos.io">NVIDIA Container Toolkit Vulnerability Remains Exploitable Despite September Patch</a></h3>
<ul>
<li>
<p>The September 2024 patch for a <strong>critical</strong> vulnerability (CVE-2024-0132) in NVIDIA Container Toolkit was incomplete, leaving systems vulnerable to container escape attacks that could expose AI infrastructure and sensitive data.</p>
</li>
<li>
<p>A time-of-check time-of-use (TOCTOU) vulnerability persists in the toolkit, allowing specially crafted containers to access the host file system, with version 1.17.4 vulnerable when specific features are enabled.</p>
</li>
<li>
<p>Researchers also discovered a related <strong>DoS</strong> vulnerability affecting Docker on Linux that can cause system-wide performance degradation by exploiting mount table entries, potentially leading to resource <strong>exhaustion</strong> and operational disruption.</p>
</li>
</ul>
<h3 id="fortinet-reveals-threat-actors-maintain-access-to-fortigate-devices-after-patches"><a href="https://thehackernews.com/2025/04/fortinet-warns-attackers-retain.html?m=1&ref=mandos.io">Fortinet Reveals Threat Actors Maintain Access to FortiGate Devices After Patches</a></h3>
<ul>
<li>
<p>Attackers created a <strong>symlink</strong> between user and root file systems in SSL-VPN language folders, maintaining read-only access to device configurations even after initial vulnerabilities (CVE-2022-42475, CVE-2023-27997, CVE-2024-21762) were patched.</p>
</li>
<li>
<p>The attack affects only devices with SSL-VPN enabled and isn't targeting specific regions or industries, with compromises dating back to early 2023 according to France's <strong>CERT-FR</strong>.</p>
</li>
<li>
<p>Fortinet released updates across multiple FortiOS versions (7.6.2, 7.4.7, 7.2.11, 7.0.17, 6.4.16) to remove the symlink and prevent similar <strong>persistence</strong> techniques, while CISA recommends resetting credentials and disabling SSL-VPN until patching.</p>
</li>
</ul>
<h3 id="ikea-parent-company-fourlis-group-suffers-%E2%82%AC20-million-loss-from-ransomware-attack"><a href="https://www.bleepingcomputer.com/news/security/ransomware-attack-cost-ikea-operator-in-eastern-europe-23-million/?ref=mandos.io">IKEA Parent Company Fourlis Group Suffers €20 Million Loss from Ransomware Attack</a></h3>
<ul>
<li>
<p>The <strong>ransomware</strong> attack disrupted store replenishment and e-commerce operations for IKEA stores from December 2024 through February 2025, resulting in a €20 million financial impact.</p>
</li>
<li>
<p>Fourlis Group CEO Dimitris Valachis confirmed they did not pay the attackers and successfully restored systems with help from external <strong>cybersecurity</strong> experts, while also thwarting several subsequent attack attempts.</p>
</li>
<li>
<p>Forensic investigation found no evidence of data <strong>exfiltration</strong>, though the company notified data protection authorities in four countries as required by law.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-security-leader-explains-why-a-plan-is-not-a-strategy"><a href="https://www.philvenables.com/post/security-programs-a-plan-is-not-a-strategy?ref=mandos.io">Google Security Leader Explains Why a Plan is Not a Strategy</a></h3>
<ul>
<li>
<p>A true security <strong>strategy</strong> specifies a competitive outcome with a coherent theory of winning, while many teams mistakenly focus on planning activities instead of developing this foundational direction.</p>
</li>
<li>
<p>Effective security strategies include elements like risk transparency with fast feedback loops, baseline control cost reduction, architectural approaches that defeat whole classes of attacks, and making secure paths the easiest paths.</p>
</li>
<li>
<p>Each strategic element requires specific <strong>capabilities</strong> and management systems to support it, such as risk registers, governance structures, measurement tools, and incident learning processes that align with the overall "theory of winning."</p>
</li>
</ul>
<h3 id="cybersecurity-firm-red-canary-releases-2025-threat-detection-report"><a href="https://drive.google.com/file/d/10JyoyQpWRtXdQ29UOb-v81935WnX1aWY/view?usp=share_link&ref=mandos.io">Cybersecurity Firm Red Canary Releases 2025 Threat Detection Report</a></h3>
<ul>
<li>
<p>The report reveals a 34% increase in detected threats in 2024, with <strong>cloud-native</strong> techniques and <strong>identity-based</strong> attacks dominating the threat landscape.</p>
</li>
<li>
<p><strong>Ransomware</strong> continues to surge with record-high payouts, while new techniques like "paste and run" (fake CAPTCHA lures) have enabled threats like LummaC2 and NetSupport Manager to become prevalent.</p>
</li>
<li>
<p>Three of the top five MITRE ATT&amp;CK techniques detected were cloud-native and enabled by identity, highlighting the expanding attack surface beyond traditional endpoints.</p>
</li>
</ul>
<h3 id="ai-enhances-cybersecurity-while-introducing-new-risks-for-cisos"><a href="https://drive.google.com/file/d/14OeED7Ga3XUEonBw4I5pu9azzPPJjdpm/view?usp=share_link&ref=mandos.io">AI Enhances Cybersecurity While Introducing New Risks for CISOs</a></h3>
<ul>
<li>
<p>AI offers significant <strong>benefits</strong> for cybersecurity leaders through automated threat detection, predictive analytics, and enhanced incident response capabilities that can analyze vast amounts of data more quickly than traditional methods.</p>
</li>
<li>
<p>The evolving CISO role has shifted from purely technical to strategic leadership, requiring executives to align security with business objectives while managing an expanding attack surface that includes cloud environments and IoT devices.</p>
</li>
<li>
<p>Modern security challenges include the rise of <strong>deepfakes</strong> and adversarial attacks against AI systems, requiring CISOs to implement comprehensive solutions like External Attack Surface Management (EASM) and Digital Risk Protection (DRP) to monitor their digital footprint.</p>
</li>
</ul>
<div class="kg-card kg-cta-card kg-cta-bg-grey kg-cta-minimal   " data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">CYBER STRATEGY OS</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><span style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in Cyber Strategy OS</span></p>
                        </div>
                    
                    
                        <a href="https://mandos.io/cyber-strategy-os/" class="kg-cta-button " style="background-color: #000000; color: #ffffff;">
                            Learn more
                        </a>
                        
                    </div>
                
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-professional-seeks-interview-advice-after-soc-analyst-role-rejection"><a href="https://www.reddit.com/r/cybersecurity/comments/1jx7oqs/trashed_my_interview_for_a_soc_role/?ref=mandos.io">Cybersecurity Professional Seeks Interview Advice After SOC Analyst Role Rejection</a></h3>
<ul>
<li>
<p>A security analyst with a stutter shared their experience of <strong>nervousness</strong> during an interview for a SOC Analyst II position at a major tech company, despite thorough preparation.</p>
</li>
<li>
<p>Community responses emphasized that interviewing is a skill requiring practice, with suggestions including mock interviews in public settings, applying for jobs without intention to accept for practice, and controlling interview pace.</p>
</li>
<li>
<p>Specific techniques recommended included slowing down speech, taking brief pauses before answering, maintaining a <strong>conversational</strong> tone rather than a question-answer format, and viewing rejection as an opportunity for improvement.</p>
</li>
</ul>
<h3 id="fortinet-launches-comprehensive-ot-security-training-program"><a href="https://training.fortinet.com/local/staticpage/view.php?page=library_ot-security&ref=mandos.io">Fortinet Launches Comprehensive OT Security Training Program</a></h3>
<ul>
<li>
<p>The Fortinet Training Institute now offers a specialized <strong>OT</strong> security course covering design, deployment, administration, and monitoring of FortiGate, FortiNAC, FortiAnalyzer, and FortiSIEM devices for securing operational technology infrastructures.</p>
</li>
<li>
<p>The 17-hour program (6 hours lecture, 11 hours lab) targets networking and security professionals with FortiGate experience and follows the <strong>Purdue</strong> model for OT security, covering asset management, access control, segmentation, and risk assessment.</p>
</li>
<li>
<p>Upon completion, participants can take the Fortinet NSE 7 - OT Security 7.2 <strong>exam</strong> to earn a certification, with the course offering both instructor-led and self-paced online formats compatible with FortiOS 7.2.0.</p>
</li>
</ul>
<h3 id="brazils-cybersecurity-talent-gap-widens-as-academic-training-falls-short"><a href="https://valorinternational.globo.com/business/news/2025/04/04/over-half-of-it-leaders-struggle-to-hire-skilled-cybersecurity-talent.ghtml?ref=mandos.io">Brazil's Cybersecurity Talent Gap Widens as Academic Training Falls Short</a></h3>
<ul>
<li>
<p>50% of Brazilian cybersecurity leaders believe universities inadequately prepare professionals, while 56% report <strong>difficulties</strong> finding qualified security talent.</p>
</li>
<li>
<p>The skills gap is most pronounced in niche areas like cyber threat analysis and cloud protection, with companies struggling to find expertise in <strong>cloud</strong> security, AI, machine learning, and zero trust architecture.</p>
</li>
<li>
<p>Salary data shows high demand for specialists, with cloud security and information security architecture professionals commanding monthly salaries of R$14,000-R$20,000 and R$18,000-R$25,000 respectively.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="microsoft-releases-guide-for-securing-ai-applications-in-the-enterprise"><a href="https://drive.google.com/file/d/11G0VdCyZNyjA8rjFa6ErGbGi6iSXiZ8D/view?usp=share_link&ref=mandos.io">Microsoft Releases Guide for Securing AI Applications in the Enterprise</a></h3>
<ul>
<li>
<p>Microsoft's new guide addresses <strong>shadow AI</strong> risks, with 80% of leaders fearing sensitive information exposure when employees use unapproved AI tools without proper oversight.</p>
</li>
<li>
<p>The guide outlines a three-phase approach (Govern AI, Manage AI, Secure AI) based on <strong>Zero Trust</strong> principles to help organizations navigate emerging threats like prompt injection attacks and AI errors including hallucinations.</p>
</li>
<li>
<p>Organizations must prepare for evolving <strong>compliance</strong> challenges, particularly with regulations like the EU AI Act which requires strong governance frameworks, detailed documentation, and transparent AI decision-making processes.</p>
</li>
</ul>
<h3 id="developer-shares-effective-llm-code-writing-strategies-after-two-years-of-experience"><a href="https://simonwillison.net/2025/Mar/11/using-llms-for-code/?ref=mandos.io">Developer Shares Effective LLM Code Writing Strategies After Two Years of Experience</a></h3>
<ul>
<li>
<p>Using LLMs for coding requires <strong>setting</strong> reasonable expectations - they're best viewed as over-confident pair programming assistants who can make mistakes but excel at generating examples and handling tedious tasks.</p>
</li>
<li>
<p><strong>Context</strong> management is crucial - providing relevant code examples, maintaining conversation history, and understanding training cut-off dates (typically October 2023 for OpenAI models) significantly improves results.</p>
</li>
<li>
<p>The author's process involves asking LLMs for implementation options first, then switching to an "authoritarian" approach where they provide detailed function specifications and test the generated code thoroughly, treating the interaction as a conversation with multiple refinements.</p>
</li>
</ul>
<h3 id="google-launches-agent2agent-protocol-a2a-for-ai-agent-interoperability"><a href="https://developers.googleblog.com/en/a2a-a-new-era-of-agent-interoperability/?ref=mandos.io">Google Launches Agent2Agent Protocol (A2A) for AI Agent Interoperability</a></h3>
<ul>
<li>
<p>Google has introduced an open <strong>protocol</strong> called Agent2Agent (A2A) with support from over 50 technology partners including Atlassian, Salesforce, and SAP, enabling AI agents to communicate across different platforms and vendors.</p>
</li>
<li>
<p>The protocol follows five key design principles: embracing agentic capabilities, building on existing standards, security by default, supporting long-running tasks, and being <strong>modality</strong> agnostic to handle text, audio, and video.</p>
</li>
<li>
<p>A2A facilitates communication through capability discovery, task management, collaboration, and user experience negotiation, with Google planning to release a <strong>production-ready</strong> version later this year.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="trumps-tariffs-trigger-cybersecurity-stock-plunge-and-spending-concerns"><a href="https://www.csoonline.com/article/3955013/how-trumps-tariffs-are-shaking-up-the-cybersecurity-sector.html?ref=mandos.io">Trump's Tariffs Trigger Cybersecurity Stock Plunge and Spending Concerns</a></h3>
<ul>
<li>
<p>US cybersecurity stocks lost tens of billions in market value following Trump's announcement of new <strong>tariffs</strong> on goods from 200 countries, with many experiencing double-digit percentage drops.</p>
</li>
<li>
<p>Organizations may be forced to cut cybersecurity <strong>budgets</strong> to cope with tariff-induced financial pressures, with one company already anticipating a 15% budget reduction to match stock declines.</p>
</li>
<li>
<p>The tariffs create an ironic situation where the administration targets Chinese <strong>threat</strong> actors while simultaneously implementing policies that could weaken US cybersecurity posture by increasing hardware costs and potentially creating regionalized security technologies.</p>
</li>
</ul>
<h3 id="dropzone-ai-launches-free-coach-tool-to-support-security-analysts"><a href="https://www.geekwire.com/2025/dropzone-unveils-ai-security-mentor-browser-extension-that-supports-cybersecurity-analysts/?ref=mandos.io">Dropzone AI Launches Free "Coach" Tool to Support Security Analysts</a></h3>
<ul>
<li>
<p>Dropzone AI released a <strong>browser</strong> extension called "Coach" that analyzes security alerts, providing real-time summaries and recommended actions to reduce analyst <strong>burnout</strong> in understaffed security teams.</p>
</li>
<li>
<p>The tool aims to complement rather than replace human analysts, addressing concerns that AI could eliminate entry-level cybersecurity positions that traditionally serve as training grounds for future security leaders.</p>
</li>
<li>
<p>Built on the same technology as Dropzone's autonomous <strong>triage</strong> agents, the Seattle-based startup has raised over $21 million and currently serves more than 100 <strong>customers</strong> with a team of 23 employees.</p>
</li>
</ul>
<h3 id="incidentio-raises-62m-series-b-to-develop-ai-powered-incident-management-tools"><a href="https://www.verdict.co.uk/incident-io-secures-62m/?ref=mandos.io">Incident.io raises $62M Series B to develop AI-powered incident management tools</a></h3>
<ul>
<li>
<p>Insight Partners led the funding round with support from Index Ventures and Point Nine Capital, bringing the company's total funding to over $96M. The capital will be used to scale <strong>engineering</strong> teams in London and San Francisco.</p>
</li>
<li>
<p>The platform helps teams manage software <strong>outages</strong> by automating tasks throughout the incident lifecycle, including note-taking, live updates, and post-incident write-ups using AI agents like Scribe that transcribe calls and generate real-time summaries.</p>
</li>
<li>
<p>Founded in 2021, incident.io has managed more than 250,000 incidents and is used by companies like Netflix, Linear, Ramp, and Etsy. The company recently launched incident.io On-call as an alternative to traditional <strong>paging</strong> tools.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ail-framework"><a href="https://cybersectools.com/tools/ail-framework?ref=mandos.io">AIL Framework</a></h3>
<p>AIL (Analysis of Information Leaks) Framework is an open-source tool designed to analyze potential information leaks from unstructured data sources. It processes data from various sources, including pastes and data streams, to identify sensitive information.</p>
<h3 id="formal"><a href="https://cybersectools.com/tools/formal?ref=mandos.io">Formal</a></h3>
<p>A reverse proxy solution that provides data access control, monitoring, and security policy enforcement for databases and APIs within organization's infrastructure.</p>
<h3 id="escape"><a href="https://cybersectools.com/tools/escape?ref=mandos.io">escape</a></h3>
<p>Escape is an API security platform that performs agentless scanning of exposed source code to identify security vulnerabilities and business logic flaws in APIs.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity, leadership and AI updates, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ What Microsoft Knows About AI Security That Most CISOs Don&#x27;t? ]]></title>
        <description><![CDATA[ Traditional security fails with AI systems. Discover Microsoft&#39;s RAI Maturity Model and practical steps to advance from Level 1 to Level 5 in AI security governance. ]]></description>
        <link>https://mandos.io/blog/what-microsoft-knows-about-ai-security-that-most-cisos-dont-2/</link>
        <guid isPermaLink="false">67f3b4a5d1d48f0001813997</guid>
        <category><![CDATA[ AI ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 08 Apr 2025 16:00:16 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/achieving-AI-governance-maturity.png" medium="image"/>
        <content:encoded><![CDATA[ <p>When I first read <a href="https://www.microsoft.com/en-us/research/wp-content/uploads/2023/05/RAI-MM-for-PDF-printing-PUBLISHED-May-17.pdf?ref=mandos.io">Microsoft's Responsible AI Maturity Model (RAI MM)</a> I got to view a road to AI maturity from a very different perspective. It not only shaped my understanding of AI governance, it also immensely motivated me to learn the leadership strategies for it, so much so that I immediately signed up for <a href="https://online.stanford.edu/courses/xdgt224-building-ai-enabled-organization?ref=mandos.io">Standford's Building an AI-Enabled Organization</a> program.</p><p>RAI MM offers a comprehensive framework that security leaders can leverage to assess and enhance their organization's approach to AI governance. But it's not just another compliance checkbox - it's a strategic tool that can transform how your organization builds, deploys, and secures AI systems.</p><p>In this article, I'll break down the RAI Maturity Model and show you exactly how to use it to:</p><ol><li>Identify critical gaps in your AI governance structure</li><li>Build cross-functional collaboration that actually works</li><li>Develop practical strategies for implementing responsible AI practices</li><li>Create a roadmap for maturing your organization's AI security posture</li></ol><p>Let's dive in.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="why-traditional-security-frameworks-fall-short-for-ai">Why Traditional Security Frameworks Fall Short for AI</h2><p>Most security leaders I speak with are trying to retrofit existing security frameworks to address AI risks. This approach is fundamentally flawed.</p><p>AI systems present unique challenges that traditional security models weren't designed to address:</p><ul><li>They can fail in unpredictable ways that evade standard testing</li><li>They require cross-functional expertise that security teams often lack</li><li>They create new privacy concerns through training data memorization</li><li>They introduce novel attack vectors like prompt injection and model poisoning</li></ul><p>The RAI Maturity Model addresses these gaps by providing a structured approach to assessing and improving your organization's AI governance capabilities.</p><h2 id="the-three-pillars-of-the-rai-maturity-model">The Three Pillars of the RAI Maturity Model</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-b774c7b6-da9c-4190-9e22-215e37617f85.png" class="kg-image" alt="" loading="lazy" width="1756" height="1306" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-b774c7b6-da9c-4190-9e22-215e37617f85.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-b774c7b6-da9c-4190-9e22-215e37617f85.png 1000w, https://mandos.io/content/images/size/w1600/2025/03/data-src-image-b774c7b6-da9c-4190-9e22-215e37617f85.png 1600w, https://mandos.io/content/images/2025/03/data-src-image-b774c7b6-da9c-4190-9e22-215e37617f85.png 1756w" sizes="(min-width: 720px) 720px"></figure><p>The RAI MM is organized into three interconnected categories:</p><h3 id="1-organizational-foundations">1. Organizational Foundations</h3><p>These dimensions establish the groundwork for responsible AI practices:</p><ul><li>Leadership and Culture</li><li>Governance</li><li>RAI Policy</li><li>RAI Compliance Processes</li><li>Knowledge Resources</li><li>Tooling</li></ul><h3 id="2-team-approach">2. Team Approach</h3><p>These dimensions focus on how teams collaborate on RAI work:</p><ul><li>Teams Valuing RAI</li><li>Timing of RAI in Development</li><li>Motivation for AI Products</li><li>Cross-Discipline Collaboration</li><li>Sociotechnical Approach</li></ul><h3 id="3-rai-practice">3. RAI Practice</h3><p>These dimensions address specific RAI implementation:</p><ul><li>Accountability</li><li>Transparency</li><li>Identifying, Measuring, Mitigating, and Monitoring RAI Risks</li><li>AI Privacy and Security</li></ul><p>Each dimension has five maturity levels, from Level 1 (Latent) to Level 5 (Leading). But here's the critical insight: progression between levels isn't linear. Moving from Level 1 to Level 2 often requires creating entirely new processes, while advancing from Level 3 to Level 4 might just involve formalizing existing practices.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="the-missing-link-in-your-security-strategy">The Missing Link in Your Security Strategy</h2><p>One of the most important things I found in the RAI MM is the AI Security dimension, which represents a critical blind spot for most cybersecurity professionals. This dimension I think deserves a special attention as it bridges traditional security practices with the unique challenges posed by AI systems.</p><p>Traditional security frameworks fall dangerously short when applied to AI systems. While most security leaders have processes and policies for addressing conventional threats, AI introduces novel attack vectors that require specialized approaches.</p><p>The RAI Maturity Model explicitly recognizes this gap through its AI Security dimension, which complements existing security frameworks by addressing AI-specific considerations such as model evasion, adversarial attacks, and other threats captured in frameworks like MITRE ATLAS.</p><h3 id="the-dangerous-gap-between-traditional-and-ai-security">The Dangerous Gap Between Traditional and AI Security</h3><p>Most organizations exist in a precarious state where they've achieved reasonable maturity in conventional security but remain at Level 1 or 2 in AI security maturity. This creates a false sense of security that leaves AI systems vulnerable to sophisticated attacks.</p><p>At Level 1 maturity, teams understand general security risks but remain unaware of AI-specific threats. They might have robust traditional security practices but fail to recognize that AI systems can be compromised through entirely different vectors:</p><ul><li>Adversarial examples that cause misclassification</li><li>Training data poisoning that subtly alters model behavior</li><li>Model extraction attacks that steal proprietary algorithms</li><li>Prompt injection attacks that manipulate generative AI outputs</li></ul><p>By Level 3, teams recognize that AI security risks aren't automatically covered by existing security processes. They begin implementing specific mitigations and updating incident response processes to include adversarial attacks.</p><p>At Level 5, organizations integrate comprehensive adversarial testing and threat modeling into the AI development pipeline, conducting regular assessments when substantial changes are made to models.</p><h3 id="why-traditional-security-approaches-fail-with-ai">Why Traditional Security Approaches Fail with AI</h3><p>Traditionally we have been focusing on protecting systems with deterministic behavior. You secure an application by controlling inputs, managing authentication, encrypting data, and monitoring for known attack patterns.</p><p>But AI systems, differently. They are probabilistically. They:</p><ol><li>Learn patterns from training data that may contain hidden vulnerabilities</li><li>Make decisions based on statistical inference rather than explicit programming</li><li>Can be manipulated through subtle perturbations undetectable to humans</li><li>May expose sensitive information through their outputs</li></ol><p>These characteristics create fundamentally different attack surfaces that traditional security tools and methodologies aren't designed to address.</p><h3 id="practical-steps-to-advance-your-ai-security-maturity">Practical Steps to Advance Your AI Security Maturity</h3><!--members-only--><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-a5426d7f-19bc-4955-a08d-51748482867f.png" class="kg-image" alt="" loading="lazy" width="1424" height="1492" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-a5426d7f-19bc-4955-a08d-51748482867f.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-a5426d7f-19bc-4955-a08d-51748482867f.png 1000w, https://mandos.io/content/images/2025/03/data-src-image-a5426d7f-19bc-4955-a08d-51748482867f.png 1424w" sizes="(min-width: 720px) 720px"></figure><p>Based on the RAI Maturity Model, here's how you can systematically improve your AI security posture:</p><h4 id="moving-from-level-1-to-level-2">Moving from Level 1 to Level 2:</h4><ol><li><strong>Educate your security team on AI-specific threats</strong><ul><li>Introduce frameworks like MITRE ATLAS to help teams understand the AI threat landscape</li><li>Conduct workshops on adversarial machine learning concepts</li><li>Partner with data science teams to understand your organization's AI systems</li></ul></li><li><strong>Apply traditional methodologies as a starting point</strong><ul><li>Extend your Security Development Lifecycle to include AI-specific considerations</li><li>Begin documenting AI assets and their security requirements</li><li>Identify which traditional security controls can be adapted for AI systems</li></ul></li></ol><h4 id="moving-from-level-2-to-level-3">Moving from Level 2 to Level 3:</h4><ol><li><strong>Develop AI-specific security processes</strong><ul><li>Create threat models specifically for AI systems</li><li>Update incident response procedures to include AI-specific attack scenarios</li><li>Implement basic adversarial testing for critical AI models</li></ul></li><li><strong>Build awareness of AI security posture</strong><ul><li>Inventory all AI models in production</li><li>Document model provenance and supply chain</li><li>Identify which models have undergone security assessment</li></ul></li></ol><h4 id="moving-from-level-3-to-level-4">Moving from Level 3 to Level 4:</h4><ol><li><strong>Integrate AI security into development workflows</strong><ul><li>Implement security gates for AI model deployment</li><li>Develop automated testing for common adversarial attacks</li><li>Create AI-specific security requirements for development teams</li></ul></li><li><strong>Establish comprehensive monitoring</strong><ul><li>Deploy monitoring for model drift and performance degradation</li><li>Implement detection for potential adversarial inputs</li><li>Create alerting for unexpected model behavior</li></ul></li></ol><h4 id="moving-from-level-4-to-level-5">Moving from Level 4 to Level 5:</h4><ol><li><strong>Implement advanced adversarial testing</strong><ul><li>Conduct regular red team exercises against AI systems</li><li>Use automated tools like Counterfit for comprehensive testing</li><li>Develop custom attack scenarios based on your specific AI use cases</li></ul></li><li><strong>Contribute to the field</strong><ul><li>Share lessons learned with the broader security community</li><li>Participate in standards development</li><li>Contribute to open-source security tools for AI</li></ul></li></ol><h2 id="the-security-leaders-guide-to-implementing-the-rai-maturity-model">The Security Leader's Guide to Implementing the RAI Maturity Model</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-67dd9b5f-67d8-482c-b883-3cc349e58276.png" class="kg-image" alt="" loading="lazy" width="1876" height="1434" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-67dd9b5f-67d8-482c-b883-3cc349e58276.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-67dd9b5f-67d8-482c-b883-3cc349e58276.png 1000w, https://mandos.io/content/images/size/w1600/2025/03/data-src-image-67dd9b5f-67d8-482c-b883-3cc349e58276.png 1600w, https://mandos.io/content/images/2025/03/data-src-image-67dd9b5f-67d8-482c-b883-3cc349e58276.png 1876w" sizes="(min-width: 720px) 720px"></figure><p>Ok, now that you know how to advance your AI security maturity, let me show you how to practically apply RAI Maturity Model.</p><p> Here's my step-by-step approach:</p><h3 id="step-1-assess-your-current-state">Step 1: Assess Your Current State</h3><p>Start by evaluating where your organization stands on each dimension to identify specific areas for improvement.</p><p>For example, when assessing "AI Security," ask:</p><ul><li>Are we applying traditional security methodologies to AI systems?</li><li>Do we have processes for addressing AI-specific security issues?</li><li>Are we using AI-specific security frameworks like MITRE ATLAS?</li><li>Is adversarial testing integrated into our development pipeline?</li></ul><p>Be brutally honest in your assessment, after all you are doing this for your own benefit. I've seen too many organizations overestimate their maturity, only to be blindsided by incidents later.</p><h3 id="step-2-identify-your-critical-gaps">Step 2: Identify Your Critical Gaps</h3><p>Not all dimensions require equal attention. Focus on the foundational elements first:</p><ol><li><strong>Leadership and Culture</strong>: Without executive buy-in and resource allocation, your RAI efforts will stall. If you're at Level 1 or 2 here, this should be your top priority.</li><li><strong>RAI Policy</strong>: A clear policy provides the framework for all other RAI activities. Without it, teams lack guidance on what "good" looks like.</li><li><strong>Cross-Discipline Collaboration</strong>: AI risks can't be addressed by security teams alone. If your organization scores low here, focus on building bridges with data science, legal, and product teams.</li></ol><h3 id="step-3-develop-a-targeted-improvement-plan">Step 3: Develop a Targeted Improvement Plan</h3><p>For each priority dimension, identify concrete actions to advance to the next maturity level. For example:</p><p>If you're at Level 2 in "Identifying RAI Risks":</p><ul><li>Implement structured impact assessments for all AI projects</li><li>Engage stakeholders to understand how risks affect them</li><li>Develop a framework for prioritizing risks based on severity and likelihood</li></ul><p>Remember, you don't need to reach Level 5 in every dimension. For many organizations, Level 3 or 4 may be sufficient depending on your AI use cases.</p><h3 id="step-4-build-cross-functional-governance">Step 4: Build Cross-Functional Governance</h3><p>The RAI MM emphasizes collaboration as the core driver of maturity. This isn't just theoretical - it's practical necessity.</p><p>Effective RAI governance requires:</p><ul><li>A cross-functional steering committee with representation from security, data science, legal, and product</li><li>Clear roles and responsibilities for RAI activities</li><li>Regular review cycles to assess progress and adjust course</li></ul><p>I've seen organizations create dedicated RAI teams that operate in isolation from security. This approach inevitably fails. Security leaders must be integral to RAI governance.</p><h3 id="step-5-implement-continuous-monitoring">Step 5: Implement Continuous Monitoring</h3><p>RAI isn't a one-time assessment - it's an ongoing process, so treat it as such. Establish mechanisms to continuously monitor your RAI posture:</p><ul><li>Regular reassessments of maturity levels</li><li>Incident reviews that incorporate RAI considerations</li><li>Feedback loops from AI system monitoring back to governance</li></ul><h2 id="common-pitfalls-to-avoid">Common Pitfalls to Avoid</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-75c4d9d5-e9ea-443b-9914-3cec045b9873.png" class="kg-image" alt="" loading="lazy" width="1780" height="1348" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-75c4d9d5-e9ea-443b-9914-3cec045b9873.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-75c4d9d5-e9ea-443b-9914-3cec045b9873.png 1000w, https://mandos.io/content/images/size/w1600/2025/03/data-src-image-75c4d9d5-e9ea-443b-9914-3cec045b9873.png 1600w, https://mandos.io/content/images/2025/03/data-src-image-75c4d9d5-e9ea-443b-9914-3cec045b9873.png 1780w" sizes="(min-width: 720px) 720px"></figure><p>In implementing RAI frameworks, I've seen security leaders make several common mistakes:</p><ol><li><strong>Treating RAI as a compliance exercise</strong>: RAI is about risk management, not checkbox compliance. Focus on substantive improvements, not documentation.</li><li><strong>Siloing RAI responsibilities</strong>: When security, data science, and legal teams work in isolation, critical risks fall through the cracks.</li><li><strong>Overemphasizing technical solutions</strong>: Many RAI challenges require process and governance solutions, not just technical controls.</li><li><strong>Neglecting cultural factors</strong>: Without a culture that values responsible AI, even the best policies and tools will be ineffective.</li><li><strong>Trying to boil the ocean</strong>: Attempting to reach Level 5 across all dimensions simultaneously will lead to burnout and failure. Prioritize and sequence your efforts.</li></ol><h2 id="the-security-leaders-roadmap-to-rai-maturity">The Security Leader's Roadmap to RAI Maturity</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-5b4ee877-c9c7-42ff-94ca-136e39843739.png" class="kg-image" alt="" loading="lazy" width="1060" height="1154" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-5b4ee877-c9c7-42ff-94ca-136e39843739.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-5b4ee877-c9c7-42ff-94ca-136e39843739.png 1000w, https://mandos.io/content/images/2025/03/data-src-image-5b4ee877-c9c7-42ff-94ca-136e39843739.png 1060w" sizes="(min-width: 720px) 720px"></figure><p>Now, lets have a look at a practical roadmap that you can offer to your ELT or SLT:</p><h3 id="months-1-3-foundation-building">Months 1-3: Foundation Building</h3><ul><li>Secure executive sponsorship for RAI initiatives</li><li>Assess current maturity levels across all dimensions</li><li>Develop a basic RAI policy aligned with your organization's values</li><li>Identify key stakeholders across functions</li></ul><h3 id="months-4-6-process-development">Months 4-6: Process Development</h3><ul><li>Establish a cross-functional RAI governance committee</li><li>Develop standard processes for AI risk assessments</li><li>Create documentation templates for transparency</li><li>Begin training security teams on AI-specific risks</li></ul><h3 id="months-7-12-implementation-and-integration">Months 7-12: Implementation and Integration</h3><ul><li>Integrate RAI processes into existing security workflows</li><li>Implement monitoring for AI-specific risks</li><li>Develop metrics to track RAI maturity progress</li><li>Create feedback mechanisms to continuously improve</li></ul><h3 id="year-2-scaling-and-optimization">Year 2: Scaling and Optimization</h3><ul><li>Automate RAI processes where appropriate</li><li>Develop advanced capabilities for AI risk monitoring</li><li>Share lessons learned across the organization</li><li>Contribute to industry RAI standards and practices</li></ul><h2 id="the-bottom-line-for-security-leaders">The Bottom Line for Security Leaders</h2><p>The RAI Maturity Model isn't just another framework - it's a strategic tool that can help you navigate the complex intersection of AI and security.</p><p>By systematically assessing and improving your organization's RAI capabilities, you can:</p><ul><li>Reduce the risk of AI-related security incidents</li><li>Build trust with customers and regulators</li><li>Enable responsible innovation within your organization</li><li>Position yourself as a strategic partner in AI governance</li></ul><p>The organizations that thrive in the AI era won't be those with the most advanced models, but those that can deploy AI responsibly, securely, and ethically. </p><p><strong>Play the long game!</strong></p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #98: PostgreSQL Cryptominer Attack, Google&#x27;s Sec-Gemini Launch, Cybersecurity Job Market Shifts ]]></title>
        <description><![CDATA[ OpenAI increases bug bounties to $100K. Dragos reports 87% surge in industrial ransomware attacks. 80 security professionals replaced by AI they trained. ]]></description>
        <link>https://mandos.io/newsletter/brief-98-postgresql-cryptominer-attack-googles-sec-gemini-launch-cybersecurity-job-market-shifts/</link>
        <guid isPermaLink="false">67f1772478dbc90001e94b70</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 06 Apr 2025 13:00:31 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/04/14.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Hope you're enjoying a bit of downtime this weekend. While you were busy wrapping up your week, there have been some interesting developments in the security world I thought you'd want to know about:</p><ul><li>A fileless cryptominer campaign is targeting PostgreSQL servers with weak credentials, affecting over 1,500 victims - a good reminder to check those database configurations</li><li>Google launched Sec-Gemini v1, their experimental AI model for cybersecurity that's outperforming competitors by at least 11% on threat intelligence benchmarks</li><li>The job market is shifting significantly with governance roles growing 40% while traditional technical positions continue to decline - might be time to brush up on those GRC skills</li></ul><p>There's plenty more to unpack this week, including Deloitte's new AI governance framework and some interesting new security tools hitting the market. </p><p>Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p><em>Reach 1,000+ cybersecurity leaders - </em><a href="https://mandos.io/contact/"><em>sponsor the next issue.</em></a></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="fileless-cryptominer-campaign-targets-exposed-postgresql-servers-affecting-1500-victims"><a href="https://www.wiz.io/blog/postgresql-cryptomining?ref=mandos.io">Fileless Cryptominer Campaign Targets Exposed PostgreSQL Servers, Affecting 1,500+ Victims</a></h3>
<ul>
<li>
<p>Threat actor JINX-0126 is exploiting misconfigured PostgreSQL instances with weak credentials to deploy <strong>filelessly</strong> executed XMRig-C3 cryptominers, using evasion techniques including unique hash generation per target.</p>
</li>
<li>
<p>Analysis of three different crypto wallets linked to the campaign suggests over 1,500 victims, with nearly 90% of cloud environments self-hosting PostgreSQL and one-third having at least one instance <strong>publicly</strong> exposed to the internet.</p>
</li>
<li>
<p>The attack chain includes initial access via weak credentials, followed by deploying obfuscated Golang binaries ("postmaster" and "cpu_hu") that establish persistence through <strong>cronjobs</strong> and privileged user creation before executing the cryptominer.</p>
</li>
</ul>
<h3 id="tax-themed-phishing-campaigns-target-us-taxpayers-ahead-of-april-15-deadline"><a href="https://www.microsoft.com/en-us/security/blog/2025/04/03/threat-actors-leverage-tax-season-to-deploy-tax-themed-phishing-campaigns/?ref=mandos.io">Tax-themed phishing campaigns target US taxpayers ahead of April 15 deadline</a></h3>
<ul>
<li>
<p>Microsoft observed multiple phishing campaigns using tax-related lures to deliver <strong>malware</strong> including BruteRatel C4, Latrodectus, Remcos RAT, and AHKBot through PDF attachments with QR codes and URL shorteners.</p>
</li>
<li>
<p>Threat actors employ sophisticated redirection techniques and abuse legitimate services like Dropbox, Google Business pages, and DocuSign to evade detection while targeting primarily US organizations in <strong>engineering</strong>, IT, and consulting sectors.</p>
</li>
<li>
<p>The campaigns use social engineering tactics including rapport-building emails specifically targeting CPAs and accountants, with some attacks using the <strong>RaccoonO365</strong> phishing-as-a-service platform to steal credentials through fake Microsoft 365 login pages.</p>
</li>
</ul>
<h3 id="china-linked-earth-alux-apt-group-targets-apac-and-latin-america-with-vargeit-backdoor"><a href="https://www.trendmicro.com/en_us/research/25/c/the-espionage-toolkit-of-earth-alux.html?ref=mandos.io">China-linked Earth Alux APT Group Targets APAC and Latin America with VARGEIT Backdoor</a></h3>
<ul>
<li>
<p>Earth Alux primarily exploits vulnerable services in exposed servers to gain initial access, then deploys web shells like GODZILLA to deliver its <strong>backdoors</strong> VARGEIT and COBEACON.</p>
</li>
<li>
<p>The group employs sophisticated evasion techniques including DLL sideloading, anti-API hooking, and timestomping via tools like RAILLOAD and RAILSETTER to maintain <strong>persistence</strong> in government and technology sectors.</p>
</li>
<li>
<p>VARGEIT backdoor uses multiple communication channels with the Outlook channel (utilizing Graph API) being predominant, allowing attackers to control systems and exfiltrate data through <strong>fileless</strong> operations via mspaint processes.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="deloitte-releases-comprehensive-ai-governance-framework"><a href="https://drive.google.com/file/d/1ElzMJunhGPhxk-tIo2iyR4a5USUrllhU/view?ref=mandos.io">Deloitte Releases Comprehensive AI Governance Framework</a></h3>
<ul>
<li>
<p>The report outlines a dual approach to AI governance through <strong>Quality Management Systems</strong> (QMS) for AI providers and <strong>Risk Management Systems</strong> (RMS) for AI deployers, addressing the entire AI lifecycle.</p>
</li>
<li>
<p>Deloitte highlights the EU AI Act's risk-based categorization system, which classifies AI systems as Unacceptable Risk (forbidden), High Risk (regulated), or Non-High Risk (unregulated), with specific governance requirements for each.</p>
</li>
<li>
<p>Effective AI governance requires integration across four pillars: Structures (committees, roles), Practices (oversight, skills), Processes (approvals, testing), and <strong>Systems</strong> (automation platforms) - all designed to be efficient enough to preserve AI's productivity benefits.</p>
</li>
</ul>
<h3 id="global-cybersecurity-spending-to-grow-122-in-2025-reaching-377b-by-2028"><a href="https://www.helpnetsecurity.com/2025/03/28/idc-cybersecurity-spending-2025/?ref=mandos.io">Global Cybersecurity Spending to Grow 12.2% in 2025, Reaching $377B by 2028</a></h3>
<ul>
<li>
<p>Security <strong>software</strong> will lead the market in 2025, representing over half of worldwide security spending with 14.4% growth, driven by CNAPP, identity management, and security analytics solutions.</p>
</li>
<li>
<p>While the U.S. and Western Europe will maintain 70% of global security spending, regions like Latin America and Middle East &amp; Africa are experiencing the fastest growth due to digital <strong>transformation</strong> initiatives.</p>
</li>
<li>
<p>Small and medium-sized businesses are increasingly investing in security despite large enterprises dominating spending, though experts warn that technology alone won't solve security challenges without proper <strong>implementation</strong> and processes.</p>
</li>
</ul>
<h3 id="dragos-2025-otics-report-reveals-87-increase-in-ransomware-attacks-against-industrial-organizations"><a href="https://drive.google.com/file/d/1lR6ZT_5ODS90CYblABJzLHREcdbxqx8z/view?ref=mandos.io">Dragos 2025 OT/ICS Report Reveals 87% Increase in Ransomware Attacks Against Industrial Organizations</a></h3>
<ul>
<li>
<p>Vulnerability analysis shows 70% of vulnerabilities reside deep within networks, while 22% are network exploitable and perimeter facing, with 39% potentially causing both loss of view and <strong>control</strong> in industrial systems.</p>
</li>
<li>
<p><strong>Ransomware</strong> attacks against industrial organizations surged 87% compared to the previous year, with 69% of attacks targeting manufacturing entities across 26 subsectors, and Dragos tracking 60% more ransomware groups impacting OT/ICS.</p>
</li>
<li>
<p>The report identifies a concerning trend of lowering barriers to entry for OT/ICS attacks, with adversaries increasingly recognizing industrial systems as effective attack vectors despite using relatively <strong>unsophisticated</strong> techniques against internet-exposed devices.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-job-market-shifts-governance-roles-rise-while-technical-positions-decline"><a href="https://www.scworld.com/analysis/cybersecurity-job-market-faces-disruptions-hiring-declines-in-key-roles-amid-automation-and-outsourcing?ref=mandos.io">Cybersecurity Job Market Shifts: Governance Roles Rise While Technical Positions Decline</a></h3>
<ul>
<li>
<p>The cybersecurity job landscape shows significant <strong>disruption</strong> with Governance, Risk, and Compliance (GRC) positions growing 40% for Cybersecurity/Privacy Attorneys, while traditional technical roles like Security Engineers and Analysts continue to decline.</p>
</li>
<li>
<p>Organizations are increasingly turning to <strong>outsourcing</strong> and AI-driven security automation, causing a 43% drop in Cloud Security Engineer positions since 2022 as companies integrate these functions into broader IT teams.</p>
</li>
<li>
<p>Professionals seeking to remain competitive should focus on upskilling in <strong>governance</strong>, compliance, and automation-driven security operations as the industry shifts toward policy, risk management, and strategic leadership roles.</p>
</li>
</ul>
<h3 id="ats-systems-failing-to-deliver-qualified-cybersecurity-candidates-to-hiring-managers"><a href="https://www.reddit.com/r/cybersecurity/comments/1jd423m/cybersecurity_skill_gap_issue_or_talent/?ref=mandos.io">ATS Systems Failing to Deliver Qualified Cybersecurity Candidates to Hiring Managers</a></h3>
<ul>
<li>
<p>Multiple cybersecurity professionals with extensive experience (including one with 13+ years) report applying to dozens or hundreds of positions with virtually no interviews, only to later discover their resumes never reached hiring <strong>managers</strong> despite being qualified candidates.</p>
</li>
<li>
<p>Several hiring managers confirmed finding qualified candidates in "discard piles" or completely missing from their applicant pools, suggesting widespread <strong>dysfunction</strong> in automated applicant tracking systems that are filtering out ideal candidates.</p>
</li>
<li>
<p>The problem appears systemic across the industry, with one professional documenting 549 applications resulting in only 7 interviews, while others report that networking and directly contacting hiring managers has proven more effective than traditional application <strong>processes</strong>.</p>
</li>
</ul>
<h3 id="80-cybersecurity-professionals-laid-off-replaced-by-ai-they-trained-for-2-years"><a href="https://www.reddit.com/r/cybersecurity/comments/1jlb2yq/so_it_begins_me_and_the_other_79_in_my_team_are/?ref=mandos.io">80 Cybersecurity Professionals Laid Off, Replaced by AI They Trained for 2 Years</a></h3>
<ul>
<li>
<p>A team of 80 cybersecurity professionals at a large US company (300,000 employees) has been laid off after unknowingly <strong>training</strong> their AI replacement for the past two years.</p>
</li>
<li>
<p>The original poster expressed concerns about the future of cybersecurity as companies seek cost-cutting measures, with many industry professionals in the comments confirming their organizations are pursuing AI for operational <strong>efficiencies</strong> in security operations.</p>
</li>
<li>
<p>While some companies claim AI implementation is about repurposing talent rather than reducing headcount, security experts warn that current AI solutions are not yet sophisticated enough to fully replace human <strong>expertise</strong> in security operations centers.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-launches-sec-gemini-v1-an-experimental-ai-model-for-cybersecurity"><a href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?ref=mandos.io">Google Launches Sec-Gemini v1, An Experimental AI Model For Cybersecurity</a></h3>
<ul>
<li>
<p>Sec-Gemini v1 combines Gemini's reasoning capabilities with near real-time <strong>cybersecurity</strong> knowledge and tooling to help defenders combat the asymmetric nature of security challenges.</p>
</li>
<li>
<p>The model outperforms competitors by at least 11% on the CTI-MCQ benchmark and 10.5% on the CTI-Root Cause Mapping benchmark, leveraging integrations with Google <strong>Threat</strong> Intelligence and OSV database.</p>
</li>
<li>
<p>Google is making Sec-Gemini v1 freely available to select organizations, institutions, professionals, and NGOs for <strong>research</strong> purposes, with applications available through an online form.</p>
</li>
</ul>
<h3 id="runreveal-launches-mcp-server-for-ai-powered-log-analysis"><a href="https://blog.runreveal.com/security-operations-with-runreveals-mcp-server/?ref=mandos.io">RunReveal Launches MCP Server for AI-Powered Log Analysis</a></h3>
<ul>
<li>
<p>RunReveal's Model Context Protocol Server enables security teams to analyze logs 100x faster with <strong>accuracy</strong> while leveraging AI models like Claude to provide clear explanations of findings.</p>
</li>
<li>
<p>Customers are using the tool for multiple security operations including threat hunting in AWS, investigating GuardDuty alerts in K8s containers, and <strong>tuning</strong> detection rules - all completed in under a minute versus hours of manual work.</p>
</li>
<li>
<p>The platform normalizes and enriches security data on ingest, storing it in LLM-friendly formats that enable comprehensive investigations at minimal <strong>cost</strong> (pennies per query) compared to traditional query-based approaches.</p>
</li>
</ul>
<h3 id="openai-expands-cybersecurity-program-with-100000-bug-bounties-and-new-research-grants"><a href="https://openai.com/index/security-on-the-path-to-agi/?ref=mandos.io">OpenAI Expands Cybersecurity Program with $100,000 Bug Bounties and New Research Grants</a></h3>
<ul>
<li>
<p>OpenAI has significantly increased its maximum bug <strong>bounty</strong> payout from $20,000 to $100,000 for critical security findings, while expanding their Cybersecurity Grant Program to fund research in software patching, model privacy, and <strong>agentic</strong> security.</p>
</li>
<li>
<p>The company is leveraging its own AI technology to enhance cyber defenses, partnering with <strong>SpecterOps</strong> for continuous red team assessments, and implementing specialized security measures for emerging AI agents like Operator.</p>
</li>
<li>
<p>OpenAI is proactively monitoring for <strong>threats</strong> targeting their systems, sharing intelligence about attacks with other AI labs, and building security foundations for next-generation projects like Stargate with zero-trust architectures and hardware-backed security solutions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="wiz-launches-defend-platform-for-cloud-native-threat-detection-and-response"><a href="https://www.wiz.io/blog/wiz-defend-general-availability?ref=mandos.io">Wiz Launches Defend Platform for Cloud-Native Threat Detection and Response</a></h3>
<ul>
<li>
<p>Wiz Defend unifies <strong>runtime</strong> signals, cloud telemetry, and threat intelligence to provide complete visibility across cloud environments, reducing detection time by 10x with many customers reporting MTTRs under an hour.</p>
</li>
<li>
<p>The platform bridges gaps between <strong>SecOps</strong>, cloud security, and development teams by providing shared context and automated investigation capabilities through features like Investigation Graph and Incident Timeline.</p>
</li>
<li>
<p>Wiz Defend offers end-to-end protection with capabilities including behavioral analytics, pre-built containment <strong>playbooks</strong>, and one-click remediation that traces threats back to source code for comprehensive cloud defense.</p>
</li>
</ul>
<h3 id="openai-makes-first-cybersecurity-investment-in-adaptive-securitys-43m-series-a"><a href="https://techcrunch.com/2025/04/03/openai-just-made-its-first-cybersecurity-investment/?ref=mandos.io">OpenAI Makes First Cybersecurity Investment in Adaptive Security's $43M Series A</a></h3>
<ul>
<li>
<p>Adaptive Security, co-led by OpenAI and Andreessen Horowitz, simulates AI-generated <strong>social engineering</strong> attacks to train employees to recognize threats like spoofed calls, texts, and emails from executives.</p>
</li>
<li>
<p>The New York-based startup focuses on human-targeted hacks that have caused significant financial damage, such as the Axie Infinity breach that resulted in over $600 million in losses from a fake job offer <strong>scheme</strong>.</p>
</li>
<li>
<p>With over 100 customers since its 2023 launch, Adaptive Security will use the funding primarily for engineering talent to stay ahead in the AI <strong>arms race</strong> against increasingly sophisticated threat actors.</p>
</li>
</ul>
<h3 id="yrikka-ai-launches-api-for-automated-red-teaming-after-15m-funding"><a href="https://siliconangle.com/2025/04/03/red-teaming-startup-yrikka-launches-pre-seed-funding-secure-critical-ai-systems/?ref=mandos.io">Yrikka AI Launches API for Automated Red-Teaming After $1.5M Funding</a></h3>
<ul>
<li>
<p>Yrikka AI Inc. has released an API that uses AI agents to assist in <strong>red-teaming</strong> processes, helping identify vulnerabilities in AI systems through simulated attacks and prompt injection testing.</p>
</li>
<li>
<p>The platform enables "human-AI teaming" to reduce model validation time from months to minutes, continuously monitoring for <strong>drift</strong> and adversarial attacks after deployment.</p>
</li>
<li>
<p>Founded by Dr. Kia Khezeli and John Kalantari (former ML leaders at Google, Intel, NASA), Yrikka has secured a $1.9M contract with the U.S. Department of <strong>Defense</strong> for automating computer vision model testing.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="wald"><a href="https://cybersectools.com/tools/wald-ai?ref=mandos.io">Wald</a></h3>
<p>Wald.ai is an AI security platform that provides enterprise access to multiple AI assistants while ensuring data protection and regulatory compliance.</p>
<h3 id="a-lign"><a href="https://cybersectools.com/tools/a-lign?ref=mandos.io">A-Lign</a></h3>
<p>A-LIGN provides cybersecurity compliance audits and certifications, offering a range of services including SOC 2, ISO 27001, HITRUST, and FedRAMP, along with a technology platform for audit management.</p>
<h3 id="unbound-security"><a href="https://cybersectools.com/tools/unbound?ref=mandos.io">Unbound Security</a></h3>
<p>Unbound is a cybersecurity tool designed to manage and secure the use of generative AI applications within enterprises.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ You Feel Like an Imposter and That&#x27;s Okay: Here&#x27;s How to Build Up Confidence ]]></title>
        <description><![CDATA[ Cybersecurity imposter syndrome is practically universal among leaders. Learn how deliberate failure builds genuine confidence no certification provides. ]]></description>
        <link>https://mandos.io/blog/you-feel-like-an-imposter-and-thats-okay-heres-how-to-build-up-confidence/</link>
        <guid isPermaLink="false">67e56e5c5857f1000174d555</guid>
        <category><![CDATA[ Leadership ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 01 Apr 2025 16:00:48 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/You-Feel-Like-an-Imposter-and-That-s-Okay.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Imposter syndrome isn't just common in cybersecurity leadership - it's practically universal. But here's what most people won't tell you: the leaders who appear most confident are usually the ones compensating hardest for their insecurities.</p><p>I've worked with hundreds of security leaders across multiple industries and geographies. The pattern is unmistakable. The louder they proclaim expertise, the more they're hiding their knowledge gaps.</p><h2 id="the-uncomfortable-reality-of-security-leadership">The Uncomfortable Reality of Security Leadership</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-c50bd362-0bac-4dc2-9f4c-d0f0b0fab63c.png" class="kg-image" alt="" loading="lazy" width="674" height="437" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-c50bd362-0bac-4dc2-9f4c-d0f0b0fab63c.png 600w, https://mandos.io/content/images/2025/03/data-src-image-c50bd362-0bac-4dc2-9f4c-d0f0b0fab63c.png 674w"></figure><p>The root problem? Most security leaders don't have genuine confidence because they haven't faced enough failure. They've stayed comfortable in their specialties, avoided stretching into unfamiliar domains, and run from situations where they might look incompetent.</p><p>I see this constantly - CISOs who've never written a line of code making application security decisions. Security architects who've never responded to a real incident designing incident response programs. "Leaders" who delegate anything that might expose their knowledge gaps.</p><p>This isn't leadership. It's hiding.</p><p>In this article, I'll show you how deliberate failure builds genuine confidence, share my own humiliating security failures that ultimately created real expertise, and provide a practical Security Leadership Confidence Builder template for developing confidence that no certification can provide. You'll learn how to identify your own avoidance patterns and transform them into growth opportunities that build actual confidence in this field. </p><h2 id="why-most-security-leaders-stay-mediocre">Why Most Security Leaders Stay Mediocre</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-0a6dfa90-e05c-47ef-9131-59bacc062f88.png" class="kg-image" alt="" loading="lazy" width="554" height="518"></figure><p>This is how most leaders progress in organizations:</p><ol><li>They specialize in one security domain (network security, AppSec, GRC, etc.)</li><li>They get promoted to leadership position based on that expertise</li><li>They suddenly need to make decisions across ALL security domains</li><li>Rather than admit knowledge gaps, they fake expertise or delegate uncomfortable decisions</li><li>Their teams see through the facade, but play along</li></ol><p>This creates a dangerous cycle and leads to permanently feeling like an imposter. Why? Because the leader never develops true cross-domain understanding. Their teams don't respect their judgment. And the organization builds security capabilities based on the leader's comfort zone, not actual risk.</p><p>I've seen "cloud security experts" who couldn't explain basic container concepts. "Application security leaders" who've never written code. "Security architects" who draw impressive diagrams but can't explain how their controls would actually stop a sophisticated attack.</p><p>When pushed beyond buzzwords, they crumble. but not because they're incompetent (they are not) but because they've avoided the essential ingredient of mastery: <strong>deliberate failure.</strong></p><h2 id="my-most-humiliating-security-failures">My Most Humiliating Security Failures</h2><p>When I first tackled cloud security in 2016, I failed spectacularly. I approached it like traditional infrastructure security and missed fundamental architectural differences. My designs were laughed out of the room by cloud engineers. I had two choices: retreat to my comfort zone and delegate "cloud stuff" to specialists, or push through the discomfort.</p><p><strong>I chose discomfort.</strong></p><p>I took AWS training that helped me better grasp the concepts. I spent six months building and breaking cloud environments in my spare time. I joined cloud engineering meetings and asked "stupid" questions that made me cringe. And most importantly I paired with engineers to understand how they interacted with cloud services.</p><p>After dozens of failures, patterns started emerging. </p><p>Concepts clicked. </p><p>I developed intuitions about cloud security that no certification could have provided.</p><p>Later, when building detection engineering capabilities, I faced similar humiliation. My first detection rules generated so many false positives they were immediately disabled. Again, I could have blamed the tools or delegated to "detection engineers." Instead, I immersed myself in log analysis, learned SIEM limitations firsthand, and iterated through failure after failure.</p><p>This process eventually led to me being hired by a leading Dutch Cyber Threat Intelligence company to build over 500 detection mechanisms across various operating systems and help design their XDR product.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">My most valuable expertise came not from successes, but from repeated, uncomfortable failures.</div></div><h2 id="the-confidence-paradox-in-security-leadership">The Confidence Paradox in Security Leadership</h2><p>Here's the paradox most security leaders never grasp: real confidence doesn't come from appearing knowledgeable. It comes from being comfortable admitting what you don't know.</p><p>When you've survived enough failure, you develop a fundamental certainty: "I may not know this yet, but I can figure it out." This is genuine confidence - not in your existing knowledge, but in your ability to acquire new knowledge.</p><p>This transforms how you lead:</p><ol><li>You ask better questions instead of pretending to have answers</li><li>You make more accurate risk assessments because you understand the limits of your knowledge</li><li>You build more resilient teams because you model learning instead of posturing</li><li>You make better technology decisions because you've experienced failure firsthand</li></ol><p>Most importantly, you stop wasting energy maintaining a facade of omni-knowledge that everyone sees through anyway.</p><h2 id="how-to-deliberately-build-confidence-through-failure">How to Deliberately Build Confidence Through Failure</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-a337d7da-2aff-4898-9271-7f5b6c3d7971.png" class="kg-image" alt="" loading="lazy" width="1034" height="890" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-a337d7da-2aff-4898-9271-7f5b6c3d7971.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-a337d7da-2aff-4898-9271-7f5b6c3d7971.png 1000w, https://mandos.io/content/images/2025/03/data-src-image-a337d7da-2aff-4898-9271-7f5b6c3d7971.png 1034w" sizes="(min-width: 720px) 720px"></figure><p>If you want to develop genuine security leadership confidence, you need to systematically expose yourself to failure. Here's how:</p><p><strong>1. Identify your knowledge boundary zones</strong></p><p>What security domains make you uncomfortable? Where do you delegate without understanding? What questions do you dread being asked? These are your growth opportunities.</p><p>When I realized I was avoiding cloud security conversations, I knew that's exactly where I needed to focus.</p><p><strong>2. Create low-stakes failure environments</strong></p><p>Set up personal labs, join open-source projects, or volunteer for cross-functional initiatives where you can fail without organizational impact.</p><p>I built dozens of cloud environments with the explicit goal of breaking them. Each failure taught me something certifications never could.</p><p><strong>3. Partner with practitioners</strong></p><p>Find engineers, developers or analysts who work daily in your discomfort zones. Shadow them. Ask stupid questions and let them see your learning process.</p><p>The cloud engineers who initially laughed at my designs eventually became my most valuable teachers when they saw I was genuinely committed to learning.</p><p><strong>4. Document your failures</strong></p><p>Keep a "failure journal" cataloging what you didn't understand, what assumptions were wrong, and what you learned. Review it regularly to see your growth trajectory.</p><p>My documentation of early detection engineering failures became the foundation for eventual detection strategy.</p><p><strong>5. Publicly acknowledge knowledge gaps</strong></p><p>Start team meetings by identifying what you don't know about the problem at hand. Model intellectual honesty for your team and see your respect grow.</p><p>In my first leadership role I opened my first meeting by saying, "Here are five areas where I need your expertise because I have gaps." It immediately changed the dynamic from performative compliance to collaborative problem-solving and helped me build trust with the team from the get go.</p><h2 id="the-bottom-line-the-ultimate-security-leadership-skill">The Bottom Line: The Ultimate Security Leadership Skill</h2><p>The most valuable security leaders aren't those who have all the answers. They're the ones who can consistently navigate uncertainty, learn new domains quickly, and make reasonable decisions with imperfect information.</p><p>This isn't a skill you develop by staying comfortable or being afraid to look "stupid". It's built through deliberate, repeated exposure to situations where you don't have all the answers - and surviving them anyway.</p><p>I've seen security leaders transform from uncertain imposters to confident guides not by eliminating their knowledge gaps, but by becoming comfortable exposing and addressing them.</p><p>The secret most security leaders won't admit: confidence doesn't come from success. It comes from surviving failure, repeatedly, until you develop the unshakable knowledge that you can figure anything out given enough time and persistence.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📝</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Use the template below to build your confidence and say goodbye to feeling like an imposter. </strong></b></div></div><!--members-only-->
<!--kg-card-begin: html-->
<iframe src="https://mandosio.notion.site/ebd/1c3c6c673b5480d5a7c8d35dcda353e1" width="100%" height="600" frameborder="0" allowfullscreen />
<!--kg-card-end: html-->
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #97: Oracle Cloud Breach Confirmed, Kubernetes 18-Minute Attack Window, AI-Generated Threat Models ]]></title>
        <description><![CDATA[ FBI alerts on malware via document converters. Research shows only 2-5% of security alerts need immediate action. Wiz launches searchable cloud vulnerability database ]]></description>
        <link>https://mandos.io/newsletter/brief-97-oracle-cloud-breach-confirmed-kubernetes-18-minute-attack-window-ai-generated-threat-models/</link>
        <guid isPermaLink="false">67e679615857f1000174d673</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 30 Mar 2025 13:00:26 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/13.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>Hope you're enjoying a bit of downtime this weekend. While you were busy wrapping up your week, I've gathered some interesting security developments that caught my attention:</p><ul><li>FBI is warning about a clever malware distribution scheme using fake document converter websites that actually work (while secretly installing malware)</li><li>Kubernetes clusters are now being probed by attackers in as little as 18 minutes after deployment - dramatically faster than last year</li><li>Research shows teams with at least 30% women experience 40% fewer security incidents, yet women still make up only 24% of the global cybersecurity workforce</li></ul><p>There's plenty more to explore below, including AI security developments, market updates, and useful tools to check out.</p><p>Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->

<!--kg-card-begin: html-->
<div style="width:90%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 0.8rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsor
        </span>
        
        <h3 style="margin-top: 1rem; font-size: 1.5rem; font-weight: 800; color: white; line-height: 1.2;">
            📣 Never Chase Outdated Cyber Stats Again
        </h3>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1rem; line-height: 1.6; color: #e5e7eb;">
            While everyone quotes outdated statistics, you need fresh, validated facts for strategic decisions. CyberSecStats delivers a curated directory of nearly 6,000 verified cybersecurity statistics that search engines miss. Stop building your security leadership strategy on questionable data that's already obsolete.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://www.cybersecstats.com/cybersecstatsnewsletter/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.2rem 0.6rem; font-weight: 600; font-size: 1rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out;">
                Learn More →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<p><em>Reach 1,000+ cybersecurity leaders - </em><a href="https://mandos.io/contact/"><em>sponsor the next issue.</em></a></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="fbi-warns-of-malware-distribution-through-fake-online-document-converters"><a href="https://www.bleepingcomputer.com/news/security/fbi-warnings-are-true-fake-file-converters-do-push-malware/?ref=mandos.io">FBI Warns of Malware Distribution Through Fake Online Document Converters</a></h3>
<ul>
<li>
<p>The FBI Denver Field Office has issued a warning about <strong>cybercriminals</strong> creating websites that advertise free document converters but actually distribute malware, potentially leading to ransomware attacks.</p>
</li>
<li>
<p>While these fake tools do convert documents as advertised, they simultaneously install hidden <strong>malware</strong> that can provide remote access to infected devices or scrape sensitive information from uploaded documents.</p>
</li>
<li>
<p>Security researchers have confirmed these threats, identifying specific fake converter sites that distribute malicious executables and JavaScript files like Gootloader, which can deploy banking trojans and post-exploitation <strong>tools</strong> used in ransomware campaigns.</p>
</li>
</ul>
<h3 id="oracle-cloud-data-breach-confirmed-valid-by-multiple-customers"><a href="https://www.bleepingcomputer.com/news/security/oracle-customers-confirm-data-stolen-in-alleged-cloud-breach-is-valid/?ref=mandos.io">Oracle Cloud Data Breach Confirmed Valid by Multiple Customers</a></h3>
<ul>
<li>
<p>Multiple companies have <strong>verified</strong> the authenticity of data samples shared by threat actor 'rose87168', contradicting Oracle's denial of a breach affecting 6 million users.</p>
</li>
<li>
<p>Evidence suggests the attacker exploited a <strong>vulnerability</strong> (CVE-2021-35587) in Oracle Fusion Middleware 11g on the login.us2.oraclecloud.com server, which has since been taken offline.</p>
</li>
<li>
<p>The threat actor demonstrated server access by creating files on Oracle's infrastructure and claims the stolen data includes <strong>authentication</strong> information that could be used to decrypt SSO and LDAP passwords.</p>
</li>
</ul>
<h3 id="wiz-launches-comprehensive-cloud-vulnerability-database-for-security-teams"><a href="https://www.wiz.io/vulnerability-database?ref=mandos.io">Wiz Launches Comprehensive Cloud Vulnerability Database for Security Teams</a></h3>
<ul>
<li>
<p>The new Wiz Vulnerability Database provides a <strong>searchable</strong> resource for monitoring high-profile vulnerabilities specifically in cloud environments, allowing filtering by CVE ID, technology, or component name.</p>
</li>
<li>
<p>The database categorizes vulnerabilities as "High Profile" and "Most Recent," with detailed information including <strong>severity</strong> scores, affected technologies, exploitation status, and fix availability.</p>
</li>
<li>
<p>Beyond the database, Wiz offers complementary resources including a Cloud Vulnerability DB, Cloud Threat Landscape intelligence, and the PEACH framework for modeling <strong>tenant</strong> isolation in SaaS and PaaS environments.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="kubernetes-clusters-remain-prime-targets-with-18-minute-attack-window"><a href="https://drive.google.com/file/d/1AfmXd1F_Ne52oV7xP0z8Q_zSAI-eGC1d/view?usp=share_link&ref=mandos.io">Kubernetes Clusters Remain Prime Targets with 18-Minute Attack Window</a></h3>
<ul>
<li>
<p>Malicious probing attempts begin in as little as 18 minutes after AKS clusters are initially staged—dramatically faster than last year's response times (28 minutes for EKS, 1 hour 15 minutes for GKE), highlighting the need for immediate <strong>protections</strong> upon cluster creation.</p>
</li>
<li>
<p>Security maturity is improving, with the proportion of <strong>vulnerabilities</strong> in exposed pods decreasing by 50% between 2023-2024, and fewer pods running with high Kubernetes privileges (down from 8% to 6%) or container escape capabilities.</p>
</li>
<li>
<p>Despite AWS introducing EKS Access Management over a year ago, 81% of clusters still exclusively use the deprecated CONFIG_MAP authentication mode, demonstrating that adoption of new <strong>security</strong> features remains extremely slow.</p>
</li>
</ul>
<h3 id="95-of-appsec-fixes-dont-reduce-risk"><a href="https://drive.google.com/file/d/1z_E7rzwvypJ2SgOvXruGIOzwyJ24buen/view?usp=share_link&ref=mandos.io">95% of AppSec Fixes Don't Reduce Risk</a></h3>
<ul>
<li>
<p>New research analyzing 101 million security findings reveals only 2-5% of application security alerts require <strong>immediate</strong> action.</p>
</li>
<li>
<p>Known Exploited Vulnerabilities (KEV) make up the largest portion of critical issues (1.71%), followed by <strong>secrets</strong> exposure (1.62%), highlighting where security teams should focus remediation efforts.</p>
</li>
<li>
<p>Organizations face an average of 569,354 security alerts that can be reduced to just 11,836 through context-based <strong>prioritization</strong>, demonstrating the severe impact of alert fatigue on security teams.</p>
</li>
</ul>
<h3 id="googles-security-approach-scaling-through-design-automation-and-culture"><a href="https://cloud.google.com/transform/how-google-does-it-security-programs-global-scale/?ref=mandos.io">Google's Security Approach: Scaling Through Design, Automation, and Culture</a></h3>
<ul>
<li>
<p>Google's security strategy focuses on <strong>secure-by-design</strong> principles, embedding security directly into technical infrastructure rather than relying on growing security teams proportionally with assets and threats.</p>
</li>
<li>
<p>To eliminate <strong>toil</strong>, Google applies Site Reliability Engineering practices, leveraging automation and AI to reduce manual processes, while implementing security invariants and "security as code" approaches to maintain consistent control points.</p>
</li>
<li>
<p>Google cultivates a security culture where security is everyone's responsibility, maintaining a <strong>bottom-up</strong> engineering approach that values good ideas regardless of origin, while treating security as a first-class engineering discipline.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="diverse-cybersecurity-teams-with-30-women-experience-40-fewer-security-incidents"><a href="https://www.darkreading.com/cybersecurity-operations/are-we-closing-gender-gap-cybersecurity?ref=mandos.io">Diverse Cybersecurity Teams with 30% Women Experience 40% Fewer Security Incidents</a></h3>
<ul>
<li>
<p>Organizations with at least 30% women on cybersecurity teams see <strong>significantly</strong> fewer security incidents, yet women make up only 24% of the global cybersecurity workforce, with minimal improvement over time despite industry growth.</p>
</li>
<li>
<p>Female representation in leadership remains extremely low with women accounting for less than 17% of Fortune 500 CISOs and just 3% of UK CISOs, while facing a 15% <strong>pay</strong> gap despite often having higher qualifications than male counterparts.</p>
</li>
<li>
<p>Persistent barriers for women include the "confidence gap," work-life balance challenges, and "<strong>bro</strong> culture" with 19% of women reporting gender-based incidents compared to just 1% of men in the <strong>industry</strong>.</p>
</li>
</ul>
<h3 id="security-analyst-struggles-with-client-communication-despite-technical-knowledge"><a href="https://www.reddit.com/r/cybersecurity/comments/1jcnjx7/soft_skills_issue/?ref=mandos.io">Security Analyst Struggles with Client Communication Despite Technical Knowledge</a></h3>
<ul>
<li>
<p><strong>Social anxiety</strong> is preventing a security analyst from effectively explaining vulnerabilities to clients and executives, despite having strong technical understanding of the issues.</p>
</li>
<li>
<p>Experts recommend focusing on <strong>business impact</strong> rather than technical details when communicating with executives - translate vulnerabilities into terms of risk, potential financial loss, and customer data exposure.</p>
</li>
<li>
<p>Practical improvement strategies include preparation before meetings, using simple language, practicing regularly, and developing confidence by remembering that executives are just people making decisions based on the information you provide.</p>
</li>
</ul>
<h3 id="hr-filters-blocking-qualified-cybersecurity-candidates-from-reaching-hiring-managers"><a href="https://www.reddit.com/r/cybersecurity/comments/1jd423m/cybersecurity_skill_gap_issue_or_talent/?ref=mandos.io">HR Filters Blocking Qualified Cybersecurity Candidates from Reaching Hiring Managers</a></h3>
<ul>
<li>
<p>Multiple cybersecurity professionals with 10+ years of experience report their resumes are being <strong>filtered</strong> out by ATS systems before reaching hiring managers, despite being perfect matches for positions.</p>
</li>
<li>
<p>Hiring managers who discovered qualified candidates in "discard piles" expressed frustration with HR departments, with one manager stating they "wasted nearly a year" trying to fill a position while ideal candidates were being automatically rejected.</p>
</li>
<li>
<p>Job seekers report extreme competition, with one director-level candidate applying to 549 positions over a year resulting in only 7 <strong>interviews</strong>, while another experienced professional with 13+ years in cybersecurity received zero interviews from 50 applications.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-powered-threat-modeling-researcher-generates-1000-security-documents-using-gemini-20"><a href="https://xvnpw.github.io/posts/scaling-threat-modeling-with-ai/?ref=mandos.io">AI-Powered Threat Modeling: Researcher Generates 1000 Security Documents Using Gemini 2.0</a></h3>
<ul>
<li>
<p>A security researcher successfully created a <strong>pipeline</strong> to automatically generate threat models and security documentation at scale using Google's Gemini 2.0 Flash Thinking model.</p>
</li>
<li>
<p>The approach evolved from single complex prompts to a multi-step conversation strategy, generating four document types: threat models, security checklists, security requirements, and security test plans for various frameworks and libraries.</p>
</li>
<li>
<p>The experiment revealed that AI-generated security documentation can serve as valuable starting points, with the quality varying based on the <strong>complexity</strong> of the analyzed systems and the AI's familiarity with specific technologies.</p>
</li>
</ul>
<h3 id="model-context-protocol-mcp-introduces-security-challenges-for-ai-system-integrations"><a href="https://community.cisco.com/t5/security-blogs/ai-model-context-protocol-mcp-and-security/ba-p/5274394?ref=mandos.io">Model Context Protocol (MCP) introduces security challenges for AI system integrations</a></h3>
<ul>
<li>
<p>The MCP standard enables AI applications to connect with various data sources and tools through a client-server architecture, creating defined <strong>boundaries</strong> where security controls can be implemented.</p>
</li>
<li>
<p>Key security concerns include unmonitored access to sensitive data, lack of built-in approval workflows, limited audit capabilities, and <strong>privilege</strong> management challenges across multiple MCP servers.</p>
</li>
<li>
<p>Implementation requires robust security measures including standardized authentication protocols, proper data encryption, comprehensive input <strong>validation</strong>, and explicit user consent mechanisms for all data access operations.</p>
</li>
</ul>
<h3 id="openai-and-supabase-used-to-build-permissions-aware-rag-chatbot-with-oso-cloud"><a href="https://www.osohq.com/post/building-an-authorized-rag-chatbot-with-oso-cloud?ref=mandos.io">OpenAI and Supabase Used to Build Permissions-Aware RAG Chatbot with Oso Cloud</a></h3>
<ul>
<li>
<p>The article demonstrates how to create a <strong>RAG</strong> chatbot that only shares information users are authorized to see, using Oso Cloud for authorization, Supabase for vector database storage, and OpenAI for embeddings and responses.</p>
</li>
<li>
<p>The implementation includes a complete data model with teams, folders, documents, and blocks, where <strong>authorization</strong> filters ensure users only receive context from documents they have permission to access.</p>
</li>
<li>
<p>The chatbot follows a six-step process: identifying the user, converting prompts to embeddings, getting authorization filters, retrieving authorized context, generating responses, and displaying results - all demonstrated with a working <strong>CLI</strong> application.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-asset-management-firm-axonius-raises-20m-in-series-b-funding"><a href="https://www.fintechfutures.com/fintech-start-ups/cybersecurity-start-up-axonius-closes-20m-series-b?ref=mandos.io">Cybersecurity asset management firm Axonius raises $20m in Series B funding</a></h3>
<ul>
<li>
<p>Axonius secured $20 million in Series B funding led by OpenView, following a $13 million Series A round earlier in 2019, to expand their sales, marketing, and <strong>product</strong> development.</p>
</li>
<li>
<p>The company helps organizations track all <strong>assets</strong> on their network—including clouds, computers, and devices—enabling them to enforce security policies on both corporate and guest devices.</p>
</li>
<li>
<p>Axonius serves notable clients including The New York Times, Schneider Electric, and several <strong>Fortune</strong> 500 companies, focusing on the premise that effective security requires complete visibility of network assets.</p>
</li>
</ul>
<h3 id="ai-security-startup-straiker-launches-with-21-million-funding"><a href="https://siliconangle.com/2025/03/27/straiker-launches-21-million-funding-secure-enterprise-ai-applications/?ref=mandos.io">AI Security Startup Straiker Launches with $21 Million Funding</a></h3>
<ul>
<li>
<p>Straiker introduced two AI-native modules: <strong>Ascend</strong> AI for attack simulation and <strong>Defend</strong> AI for protecting applications against security and safety threats.</p>
</li>
<li>
<p>The platform analyzes intelligence across all layers of the AI stack (user, models, applications, agents, identity, data) to provide precise assessment and <strong>runtime</strong> protection beyond prompt-level threats.</p>
</li>
<li>
<p>Already serving customers including People.ai, Coupa Software, and DirecTV, Straiker is backed by a dedicated <strong>STAR</strong> team that researches emerging AI threats and adversary techniques.</p>
</li>
</ul>
<h3 id="island-technology-raises-250m-reaching-48b-valuation-for-enterprise-browser"><a href="https://www.island.io/press/island-secures-250-million-as-valuation-continues-to-soar-to-nearly-5-billion?ref=mandos.io">Island Technology raises $250M, reaching $4.8B valuation for Enterprise Browser</a></h3>
<ul>
<li>
<p>Island's <strong>Chromium-based</strong> browser embeds security capabilities directly without plugins, providing features like web filtering, isolation, exploit prevention, and zero-trust access while maintaining a familiar user experience.</p>
</li>
<li>
<p>The Series E funding round led by Coatue Management brings Island's total external funding to approximately $730M from investors including Sequoia Capital, Insight Partners, and Cyberstarts.</p>
</li>
<li>
<p>Since launching in 2022, Island has grown to 500 employees and secured over 450 customers across various <strong>industries</strong>, including Fortune 1000 companies, government agencies, and educational institutions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="evomaster"><a href="https://cybersectools.com/tools/evomaster?ref=mandos.io">EvoMaster</a></h3>
<p>EvoMaster is an AI-driven tool for automatically generating system-level test cases for web and enterprise applications. It focuses on fuzzing Web APIs, including REST, GraphQL, and RPC (e.g., gRPC and Thrift).</p>
<h3 id="the-hive-strangebee"><a href="https://cybersectools.com/tools/thehive-strangebee?ref=mandos.io">The Hive (StrangeBee)</a></h3>
<p>TheHive is a Security Case Management Platform designed for Security Operation Centers (SOCs), Computer Emergency Response Teams (CERTs), and Computer Security Incident Response Teams (CSIRTs).</p>
<h3 id="arkime"><a href="https://cybersectools.com/tools/arkime?ref=mandos.io">Arkime</a></h3>
<p>Arkime is an open-source network capture and analysis tool designed to augment existing security infrastructure. It stores and indexes network traffic in standard PCAP format, offering full network visibility to security teams.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ AI Can Now Reverse Engineer Malware - 3 Tools For Your Arsenal ]]></title>
        <description><![CDATA[ Three powerful AI tools enable analysts to automate complex binary analysis. See how security teams can reverse engineer without additional headcount. ]]></description>
        <link>https://mandos.io/blog/ai-can-now-reverse-engineer-malware-3-tools-for-your-arsenal/</link>
        <guid isPermaLink="false">67e3f5b55857f1000174cc82</guid>
        <category><![CDATA[ AI ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 27 Mar 2025 16:00:00 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/AI-In-Reverse-Engineering.png" medium="image"/>
        <content:encoded><![CDATA[ <p>A few years ago, everyone in cybersecurity was on the same page:"LLMs will never fully reverse engineer a binary." But today we're witnessing a massive change thanks to AI, forcing us to rethink our own assumptions about AI capabilities in reverse engineering.</p><p>I can tell you that what's happening now with AI-assisted reverse engineering is a massive big step of how we approach binary analysis and how will attackers improve their capabilities.</p><p>In this article, I'll walk you through three AI reverse engineering tools, explain their practical applications, and show you how to leverage them to dramatically improve your team's efficiency (if your team is focusing on reverse engineering that is...). You'll learn how these tools work, their limitations, and how to integrate them into your existing security workflows.</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">I will cover Model Context Protocol and its usage in cybersecurity in future editions.Make sure to join 1000 Mandosians!</div></div><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is AI Security Your Priority this Year?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how a fractional CISO services can help you gain visibility and control.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div>
<aside class="gh-post-upgrade-cta">
    <div class="gh-post-upgrade-cta-content" style="background-color: #14b870">
            <h2>This post is for subscribers only</h2>
            <a class="gh-btn" data-portal="signup" href="#/portal/signup" style="color:#14b870">Subscribe now</a>
            <p><small>Already have an account? <a data-portal="signin" href="#/portal/signin">Sign in</a></small></p>
    </div>
</aside>
 ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ The Builder Strikes Back: How Security Teams Must Reclaim Their Engineering Edge ]]></title>
        <description><![CDATA[ The vendor dependency trap is crippling security teams. AI is democratizing building capabilities that were once vendor-exclusive. Develop these five critical skills now before your competitors do. ]]></description>
        <link>https://mandos.io/blog/the-builder-strikes-back-how-security-teams-must-reclaim-their-engineering-edge/</link>
        <guid isPermaLink="false">67e11d89f5a0530001858a71</guid>
        <category><![CDATA[ Leadership ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 25 Mar 2025 11:36:45 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/The-New-Security-Talent-Hierarchy.png" medium="image"/>
        <content:encoded><![CDATA[ <h2 id="the-vendor-dependency-trap-weve-all-fallen-into">The Vendor Dependency Trap We've All Fallen Into</h2><p>Security teams have been slowly surrendering their technical sovereignty for over a decade. What started as a pragmatic response to cloud migration has evolved into a crippling dependency on vendor ecosystems. The modern security department has transformed from builders to buyers, from creators to consumers, from engineers to administrators.</p><p>Look around your security team. How many true builders do you have? Not people who can configure a SIEM or tune an EDR—actual engineers who can create solutions from scratch when nothing on the market fits your needs. For most organizations, that number hovers dangerously close to zero.</p><p>This isn't accidental. The SaaS revolution promised to free security teams from infrastructure management so they could focus on "more strategic work." But what actually happened? We traded infrastructure management for vendor management—endless procurement cycles, integration challenges, and budget battles that consume more time than the technical problems they supposedly solve.</p><p>The result is security teams staffed with specialists who know vendor platforms but lack fundamental building skills. We've created security departments full of people who can tell you every feature of CrowdStrike or SentinelOne but couldn't write a basic detection algorithm if the pre-built ones fail. Teams that can recite security policies but can't automate their own GRC workflows when commercial tools fall short.</p><p>This overweight vendor dependency has quietly become our industry's Achilles' heel—and the ongoing AI revolution is about to expose it.</p><h2 id="the-ai-inflection-point-that-changes-everything">The AI Inflection Point That Changes Everything</h2><p>The emergence of AI represents the most significant shift in security capabilities since cloud computing. But unlike cloud, which centralized power in the hands of vendors, AI is democratizing the ability to build and create—putting power back into the hands of security teams willing to seize it.</p><p>Through capabilities like tool calling, agents, and API integration, AI is collapsing the technical barriers that once made custom development prohibitively expensive for most security teams. Tasks that once required weeks of engineering effort can now be accomplished in hours. Integration challenges that demanded specialized knowledge can now be solved through conversational interfaces with AI assistants (albeit with its own downsides).</p><!--members-only--><p>This isn't theoretical—it's happening right now in front of our eyes. Security teams with building capabilities are already using AI to create custom detection/response automations for their unique needs that outperform vendor solutions at a fraction of the cost. They're automating GRC processes that vendors claim require expensive modules. And they're also building bespoke security tools tailored precisely to their organization's unique threat landscape instead of accepting the one-size-fits-all approaches that dominate the commercial market.</p><p>The implications are profound: the competitive advantage in security is shifting from those who can buy the best tools to those who can build the best tools. And most security teams are dangerously unprepared for this shift.</p><h2 id="the-new-security-talent-hierarchy">The New Security Talent Hierarchy</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-4b239445-cdc0-4ed2-9af7-23e4722b9212.png" class="kg-image" alt="the new security talent hierarchy" loading="lazy" width="1560" height="1210" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-4b239445-cdc0-4ed2-9af7-23e4722b9212.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-4b239445-cdc0-4ed2-9af7-23e4722b9212.png 1000w, https://mandos.io/content/images/2025/03/data-src-image-4b239445-cdc0-4ed2-9af7-23e4722b9212.png 1560w" sizes="(min-width: 720px) 720px"></figure><p>The AI revolution is creating a new talent hierarchy in security that will reshape team structures and career trajectories:</p><ol><li><strong>Builders</strong>&nbsp;will sit at the top—professionals who can create custom solutions, integrate various systems, and automate complex workflows using AI as a force multiplier. Their value will skyrocket as organizations realize the competitive advantage of custom-built security capabilities.</li><li><strong>Translators</strong>&nbsp;will form the crucial middle layer—those who can translate business and security requirements into specifications that builders and AI can execute against. They'll bridge the gap between technical possibilities and business needs.</li><li><strong>Operators</strong>&nbsp;will remain essential but increasingly augmented—those who execute daily security functions will find their roles enhanced by AI but will need to develop adjacent building skills to maintain their value.</li></ol><p>This hierarchy represents a fundamental inversion of how many security teams currently operate, where technical builders are often undervalued compared to policy experts, compliance specialists, and vendor relationship managers.</p><p>The most dangerous position in this new hierarchy? The pure specialist who can neither build nor translate—the compliance expert who can't automate workflows, the threat analyst who can't create detection algorithms, the security architect who can't integrate systems. These roles won't disappear overnight, but their leverage and compensation will steadily erode as AI makes their specialized knowledge more accessible to those with building skills.</p><h2 id="the-building-skills-gap-is-worse-than-you-think">The Building Skills Gap Is Worse Than You Think</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-93a1c89b-d548-4dcf-8a41-d13944c4fdc4.png" class="kg-image" alt="analyzing the security team skills gap" loading="lazy" width="2000" height="1358" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-93a1c89b-d548-4dcf-8a41-d13944c4fdc4.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-93a1c89b-d548-4dcf-8a41-d13944c4fdc4.png 1000w, https://mandos.io/content/images/size/w1600/2025/03/data-src-image-93a1c89b-d548-4dcf-8a41-d13944c4fdc4.png 1600w, https://mandos.io/content/images/2025/03/data-src-image-93a1c89b-d548-4dcf-8a41-d13944c4fdc4.png 2020w" sizes="(min-width: 720px) 720px"></figure><p>The most security teams have systematically eliminated building capabilities from their talent pool. In the rush to adopt vendor solutions, they've optimized for professionals who can implement and operate commercial tools rather than create new ones.</p><p>This building skills gap manifests in several critical ways:</p><ol><li><strong>Technical debt accumulation</strong>: Security teams struggle to integrate disparate vendor solutions, creating fragmented architectures held together by manual processes and spreadsheets.</li><li><strong>Customization paralysis</strong>: When vendor solutions don't quite fit business requirements, teams lack the capability to extend or modify them, leading to suboptimal security controls.</li><li><strong>Automation stagnation</strong>: Critical security workflows remain manual because teams can't build the connective tissue between systems that vendors don't prioritize.</li><li><strong>Budget inflation</strong>: Organizations pay premium prices for vendor features they could build internally at a fraction of the cost with the right talent.</li></ol><p>The most alarming aspect of this skills gap is how invisible it remains to many security leaders. They've accepted vendor dependency as the natural state of security operations rather than recognizing it as a strategic vulnerability that limits their team's effectiveness.</p><h2 id="the-five-building-capabilities-every-security-team-needs-now">The Five Building Capabilities Every Security Team Needs Now</h2><p>To thrive in the AI era, security teams must develop five critical building capabilities:</p><ol><li><strong>Programmatic thinking</strong>: The ability to break complex security problems into logical components that can be solved systematically—whether through code, configuration, or AI prompting.</li><li><strong>API fluency</strong>: Understanding how to leverage APIs to create integrations between systems, automate workflows, and extend vendor capabilities beyond their out-of-box limitations.</li><li><strong>Data manipulation</strong>: Skills to transform, normalize, and analyze security data across disparate formats and structures to derive actionable insights beyond what vendor analytics provide.</li><li><strong>Automation design</strong>: The capability to identify repetitive security processes and create automated workflows that reduce manual effort while improving consistency and coverage.</li><li><strong>AI orchestration</strong>: Expertise in directing AI tools to perform complex security tasks through effective prompting, tool calling, and output validation.</li></ol><p>These capabilities don't require every security professional to become a software engineer. But they do require a fundamental shift in mindset from consumption to creation, from dependence to self-sufficiency.</p><p>The organizations that develop these capabilities will gain an immeasurable advantage: they'll implement security controls faster, respond to threats more effectively, and operate at a fraction of the cost compared to bloated teams that remain dependent on vendor roadmaps and release cycles.</p><h2 id="how-to-transform-your-team-from-consumers-to-creators">How to Transform Your Team from Consumers to Creators</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-e36131d3-4e7c-432f-a86f-a92b77c15b15.png" class="kg-image" alt="transforming security teams into creators" loading="lazy" width="2000" height="1769" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-e36131d3-4e7c-432f-a86f-a92b77c15b15.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-e36131d3-4e7c-432f-a86f-a92b77c15b15.png 1000w, https://mandos.io/content/images/size/w1600/2025/03/data-src-image-e36131d3-4e7c-432f-a86f-a92b77c15b15.png 1600w, https://mandos.io/content/images/2025/03/data-src-image-e36131d3-4e7c-432f-a86f-a92b77c15b15.png 2068w" sizes="(min-width: 720px) 720px"></figure><p>Rebuilding your security team's creation capabilities requires deliberate action across hiring, training, and organizational structure:</p><ol><li><strong>Rebalance your hiring profile</strong>: For every three specialists you hire, add one builder with strong programming, integration, and automation skills—even if they lack traditional security backgrounds.</li><li><strong>Create hybrid roles</strong>: Establish positions that blend traditional security domains with building responsibilities. Your GRC analyst should also automate compliance workflows; your threat hunter should also build detection algorithms.</li><li><strong>Implement building rotations</strong>: Require every security team member to spend time working directly with builders on integration and automation projects to develop adjacent skills.</li><li><strong>Establish an internal security platform team</strong>: Create a dedicated function responsible for building internal tools, automations, and integrations that vendors don't provide.</li><li><strong>Reward creation over consumption</strong>: Modify your performance metrics to recognize and reward team members who build solutions rather than just effectively operating vendor tools.</li><li><strong>Partner with engineering</strong>: Forge stronger relationships with software engineering teams to share building practices, tools, and potentially resources.</li></ol><p>The most effective approach combines these strategies with a clear message: in the AI era, building is no longer optional—it's a core security function that determines your team's effectiveness, efficiency, and ultimately its survival.</p><h2 id="managing-vendor-relationships-in-the-builder-era">Managing Vendor Relationships in the Builder Era</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/03/data-src-image-edb0f073-a6ce-4ab2-9288-d9c82339af28.png" class="kg-image" alt="Managing Vendor Relationships in the Builder Era" loading="lazy" width="1708" height="1276" srcset="https://mandos.io/content/images/size/w600/2025/03/data-src-image-edb0f073-a6ce-4ab2-9288-d9c82339af28.png 600w, https://mandos.io/content/images/size/w1000/2025/03/data-src-image-edb0f073-a6ce-4ab2-9288-d9c82339af28.png 1000w, https://mandos.io/content/images/size/w1600/2025/03/data-src-image-edb0f073-a6ce-4ab2-9288-d9c82339af28.png 1600w, https://mandos.io/content/images/2025/03/data-src-image-edb0f073-a6ce-4ab2-9288-d9c82339af28.png 1708w" sizes="(min-width: 720px) 720px"></figure><p>As your team develops stronger building capabilities, your vendor relationships will fundamentally change—and vendors won't like it. You'll shift from being a passive consumer to an active co-creator who:</p><ol><li><strong>Demands open APIs and extensibility</strong>&nbsp;as non-negotiable requirements in procurement</li><li><strong>Builds around vendor limitations</strong>&nbsp;rather than waiting for roadmap promises</li><li><strong>Creates competitive leverage</strong>&nbsp;by maintaining the ability to replace vendors who don't deliver value</li><li><strong>Negotiates from strength</strong>&nbsp;with a clear understanding of build-versus-buy economics</li></ol><p>This shift will create tension. Vendors have built business models around customer dependency and will resist your move toward self-sufficiency. They'll claim their proprietary approaches are superior to anything you could build. They'll warn about support issues for custom integrations. They'll emphasize compliance risks of non-standard implementations.</p><p>Stand firm. The vendors worth keeping will adapt to this new reality, embracing their role as platforms that amplify your team's building capabilities rather than replacing them. The rest will reveal themselves as dependencies you're better off without.</p><p>Don't get me wrong. Most great innovations in our industry come from established vendors and startups who are changing the status quo—companies like Wiz and many others. Without them many organizations would have failed long time ago and those who think they can solve problems just by building internally are delusional.</p><p>We need vendors and solution providers; they are our best partners in solving big, complex problems. But the truth is that the niche problems unique to your organization are often more painful than the big, common problems vendors solve. This is where building internally becomes the differentiator between successful and failed security teams.</p><h2 id="the-bottom-line-build-or-be-left-behind">The Bottom Line: Build or Be Left Behind</h2><p>The security industry stands at an inflection point. AI is democratizing the ability to build, integrate, and automate security capabilities that were once the exclusive domain of vendors or specialized engineering teams.</p><p>Security leaders face a clear choice: develop building capabilities within their teams or accept a future of perpetual vendor dependency, escalating costs, and competitive disadvantage.</p><p>The most successful security organizations of the next decade won't be those with the biggest budgets or the most comprehensive vendor portfolios. They'll be those that combine deep security expertise with the ability to build precisely what they need when they need it—leveraging AI as the ultimate force multiplier for human creativity and problem-solving.</p><p>The question isn't whether your security team needs building capabilities—it's whether you'll develop them before your competitors do.</p><h3 id="before-you-go">Before you go</h3><p>If you found this article useful, I'd really appreciate if you could forward it to your community and share your feedback below.</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='24bcf30e-807a-41d6-9cf5-b0361a780e42' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #96: Apache Tomcat RCE Exploit, Google&#x27;s $32B Wiz Acquisition, Copilot and Cursor Coding Backdoors ]]></title>
        <description><![CDATA[ From a software engineer to landing a security role at Microsoft. Machine identities pose 7.5x higher risk than human users. AWS enhances VPC endpoint visibility. ]]></description>
        <link>https://mandos.io/newsletter/brief-96-apache-tomcat-rce-exploit-googles-32b-wiz-acquisition-software-engineer-to-security-role-2/</link>
        <guid isPermaLink="false">67de757db6cf760001aacddb</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 23 Mar 2025 13:00:57 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/12.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Hope you're enjoying a bit of downtime this weekend. While you were busy wrapping up another week, the security landscape kept evolving with some developments worth noting:</p><ul><li>Apache Tomcat is facing active exploitation of a critical RCE vulnerability just 30 hours after disclosure - a reminder of how quickly threat actors move these days</li><li>Machine identities in cloud environments are presenting 7.5x higher risk than human identities, with organizations managing an average of 41,605 service accounts</li><li>Google is making waves with its record $32 billion acquisition of Wiz, marking the largest cybersecurity deal ever and signaling major shifts in the cloud security market</li></ul><p>There's plenty more to unpack this week, including interesting resume insights and new tools to have on your radar. </p><p>Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="apache-tomcat-rce-vulnerability-actively-exploited-within-30-hours"><a href="https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html?ref=mandos.io">Apache Tomcat RCE Vulnerability Actively Exploited Within 30 Hours</a></h3>
<ul>
<li>
<p>A critical <strong>RCE</strong> vulnerability (CVE-2025-24813) in Apache Tomcat versions 9.x, 10.1.x, and 11.x is being actively exploited after a proof-of-concept was released just 30 hours after disclosure.</p>
</li>
<li>
<p>The exploit targets Tomcat's file-based <strong>session</strong> persistence mechanism, allowing attackers to upload malicious serialized Java payloads via PUT requests that execute during deserialization without requiring authentication.</p>
</li>
<li>
<p>Patches are available in Tomcat versions 9.0.99, 10.1.35, and 11.0.3, but security researchers warn attackers will likely expand tactics beyond session storage to upload JSP files, modify configurations, and plant <strong>backdoors</strong>.</p>
</li>
</ul>
<h3 id="abyssworker-driver-used-in-medusa-ransomware-attacks-to-disable-security-tools"><a href="https://www.elastic.co/security-labs/abyssworker?ref=mandos.io">ABYSSWORKER Driver Used in MEDUSA Ransomware Attacks to Disable Security Tools</a></h3>
<ul>
<li>
<p>The malicious driver, signed with revoked Chinese certificates, is deployed alongside MEDUSA ransomware to target and <strong>disable</strong> endpoint detection and response (EDR) systems.</p>
</li>
<li>
<p>ABYSSWORKER uses multiple techniques including process protection, callback removal, and driver function replacement to <strong>blind</strong> security tools and prevent detection.</p>
</li>
<li>
<p>The driver requires a specific password (7N6bCAoECbItsUR5-h4Rp2nkQxybfKb0F-wgbJGHGh20pWUuN1-ZxfXdiOYps6HTp0X) to enable its functionality and contains numerous <strong>IOCTLs</strong> for file manipulation, process termination, and security tool evasion.</p>
</li>
</ul>
<h3 id="black-basta-ransomware-group-linked-to-russian-authorities-through-leaked-chat-logs"><a href="https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html?ref=mandos.io">Black Basta ransomware group linked to Russian authorities through leaked chat logs</a></h3>
<ul>
<li>
<p>Leaked messages reveal Black Basta's alleged leader Oleg Nefedov (aka GG) claimed to receive help from Russian <strong>officials</strong> after his arrest in Armenia, using a "green corridor" to escape detention within three days.</p>
</li>
<li>
<p>The group operates from two Moscow offices, uses ChatGPT for various <strong>malicious</strong> activities, and has developed a post-exploitation C2 framework called Breaker alongside a PHP-based brute-forcing tool named BRUTED for targeting corporate <strong>firewalls</strong> and VPN solutions.</p>
</li>
<li>
<p>Technical analysis shows Black Basta is developing new ransomware derived from Conti's source code, suggesting a possible <strong>rebranding</strong> effort, while maintaining connections with other ransomware operations including Rhysida and CACTUS.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="aws-releases-cloudtrail-network-activity-events-for-vpc-endpoints"><a href="https://www.wiz.io/blog/aws-vpc-endpoint-cloudtrail?ref=mandos.io">AWS Releases CloudTrail Network Activity Events for VPC Endpoints</a></h3>
<ul>
<li>
<p>CloudTrail network activity events provide visibility into API calls passing through VPC Endpoints, helping troubleshoot endpoint policies and detect potential <strong>exfiltration</strong> attempts.</p>
</li>
<li>
<p>Currently supports five AWS services (CloudTrail, EC2, KMS, S3, and Secrets Manager) with the same pricing structure as Data Events ($0.10 per 100,000 events).</p>
</li>
<li>
<p>At minimum, organizations should enable logging for <strong>VpceAccessDenied</strong> events, which offers critical visibility into denied requests without significant cost implications.</p>
</li>
</ul>
<h3 id="cloudflare-enhances-dlp-solution-with-ai-powered-context-analysis-to-reduce-false-positives"><a href="https://blog.cloudflare.com/improving-data-loss-prevention-accuracy-with-ai-context-analysis/?ref=mandos.io">Cloudflare Enhances DLP Solution with AI-Powered Context Analysis to Reduce False Positives</a></h3>
<ul>
<li>
<p>Cloudflare's new <strong>algorithm</strong> uses AI to analyze context around potential data leaks, adapting to an organization's unique traffic patterns and learning from administrator feedback to reduce false positives.</p>
</li>
<li>
<p>The system leverages Workers AI for text <strong>embeddings</strong> and Vectorize for similarity searches, comparing new potential matches against previously reported true and false positives to improve detection accuracy.</p>
</li>
<li>
<p>Currently in closed beta with approximately 400ms added <strong>latency</strong> for matching requests, the feature will expand beyond HTTP traffic to include CASB and Email Security by the end of 2025.</p>
</li>
</ul>
<h3 id="machine-identities-pose-75x-higher-risk-than-human-identities-in-cloud-environments"><a href="https://drive.google.com/drive/u/0/folders/1xtaZQieBOIBlPQi_un658BzRd5um0bU1?ref=mandos.io">Machine Identities Pose 7.5x Higher Risk Than Human Identities in Cloud Environments</a></h3>
<ul>
<li>
<p>Organizations manage an average of 41,605 service accounts compared to just 915 human users, with machine identities being <strong>exponentially</strong> more numerous and difficult to secure.</p>
</li>
<li>
<p>Real-time threat detection and response is now achievable within the "555 Benchmark" (5 seconds to detect, 5 minutes to investigate, 5 minutes to respond), with organizations initiating response actions in under 4 minutes on average.</p>
</li>
<li>
<p>The adoption of automated security responses has nearly <strong>tripled</strong> over the past year, with more organizations implementing preventive actions like container kill, stop, or pause functions when drift is detected.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="software-engineer-transitions-to-cybersecurity-role-at-microsoft-through-data-security-experience"><a href="https://www.msn.com/en-us/money/other/the-r%C3%A9sum%C3%A9-a-software-engineer-used-to-land-a-cybersecurity-job-at-microsoft/ar-AA1Ay4r1?ref=mandos.io">Software Engineer Transitions to Cybersecurity Role at Microsoft Through Data Security Experience</a></h3>
<ul>
<li>
<p>Ankit Masrani, a 36-year-old software engineer, successfully pivoted to cybersecurity at Microsoft after 6.5 years at AWS, where he gained experience with customer-managed key <strong>encryption</strong> and data security practices.</p>
</li>
<li>
<p>Now a principal software engineer on Microsoft's Security Platform, Masrani develops sovereignty controls ensuring sensitive customer information remains within geographic <strong>boundaries</strong>, applying his background in IT, computer science, and data experience.</p>
</li>
<li>
<p>For others looking to make similar transitions, Masrani recommends developing skills in big data technologies, cloud services, and security fundamentals including data <strong>governance</strong>, regional regulations like GDPR, and best practices for handling sensitive information.</p>
</li>
</ul>
<h3 id="cybersecurity-leadership-evolving-beyond-technical-expertise-to-include-business-strategy"><a href="https://www.darkreading.com/cybersecurity-operations/why-cybersecurity-needs-more-business-minded-leaders?ref=mandos.io">Cybersecurity Leadership Evolving Beyond Technical Expertise to Include Business Strategy</a></h3>
<ul>
<li>
<p>Today's cybersecurity leaders increasingly come from <strong>finance</strong>, law, and corporate strategy backgrounds, bringing risk-management perspectives that complement traditional technical approaches.</p>
</li>
<li>
<p>The evolving threat landscape requires security executives who can navigate <strong>regulatory</strong> compliance, financial risk management, and operational resilience while communicating effectively with boards.</p>
</li>
<li>
<p>Cybersecurity must be approached as an enterprisewide <strong>risk</strong> rather than just a technical challenge or compliance checkbox to drive long-term organizational resilience.</p>
</li>
</ul>
<h3 id="cirt-manager-working-excessive-hours-with-inadequate-compensation"><a href="https://www.reddit.com/r/cybersecurity/comments/1ja18je/how_much_are_you_guys_working/?share_id=xH_yo2qfw66JpHZfXbtHl&utm_content=1&utm_medium=ios_app&utm_name=ioscss&utm_source=share&utm_term=1">CIRT Manager Working Excessive Hours with Inadequate Compensation</a></h3>
<ul>
<li>
<p><strong>Overworked</strong> manager handling international support alone for 4 months, working split shifts (8am-4pm and 8:30pm-11pm) while team members resist late meetings.</p>
</li>
<li>
<p>Manager feels adequately compensated (mid $100-200K range) but acknowledges competitors offer $20-50K more plus <strong>bonuses</strong> for similar positions.</p>
</li>
<li>
<p>Current workload includes multiple security functions (threat hunting, logging, forensics, pen testing) with nightly logging fixes that often fail by morning, suggesting unsustainable work patterns.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-workloads-grow-500-while-reducing-public-exposure-by-38"><a href="https://drive.google.com/file/d/1NRzqUVZzBBTj90fhiZ-AZu8yNCigE9fP/view?ref=mandos.io">AI Workloads Grow 500% While Reducing Public Exposure by 38%</a></h3>
<ul>
<li>
<p>Organizations are increasingly adopting <strong>AI</strong> technologies, with workloads using AI/ML packages growing by 500% over the past year.</p>
</li>
<li>
<p>Despite this massive growth, public exposure of AI workloads decreased by 38%, indicating that organizations are prioritizing <strong>security</strong> in their AI implementations.</p>
</li>
<li>
<p>The adoption of GenAI security tools is accelerating, with 45% of Sysdig customers enabling their AI security analyst within four months of its release, primarily used by <strong>SecOps</strong> teams for alert triage and investigation.</p>
</li>
</ul>
<h3 id="hiddenlayer-reports-rising-ai-security-threats-and-governance-challenges"><a href="https://drive.google.com/file/d/1jMAoXBxjrq2KA4x8Irbl7JLN8gz2T2aF/view?ref=mandos.io">HiddenLayer Reports Rising AI Security Threats and Governance Challenges</a></h3>
<ul>
<li>
<p>74% of IT leaders confirmed AI <strong>breaches</strong> in 2024 (up from 67% last year), with 87% able to identify the source, while 45% of companies have concealed AI security incidents due to potential public backlash.</p>
</li>
<li>
<p>Organizations face significant <strong>governance</strong> challenges with 72% acknowledging shadow AI issues (up from 61%), while only 32% deploy technology solutions to address AI threats and just 16% secure models with red teaming.</p>
</li>
<li>
<p>Despite concerns, positive trends include 96% of companies implementing formal AI security frameworks, 81% establishing AI governance committees, and 95% increasing their <strong>budgets</strong> for AI security in 2025.</p>
</li>
</ul>
<h3 id="github-copilot-and-cursor-vulnerable-to-rules-file-backdoor-attack"><a href="https://www.pillar.security/blog/new-vulnerability-in-github-copilot-and-cursor-how-hackers-can-weaponize-code-agents?utm_source=cyber&utm_medium=social&utm_campaign=cyber">GitHub Copilot and Cursor Vulnerable to "Rules File Backdoor" Attack</a></h3>
<ul>
<li>
<p>Pillar Security researchers discovered a new supply chain attack vector that allows hackers to inject <strong>malicious</strong> instructions into configuration files used by AI coding assistants, manipulating them to generate compromised code.</p>
</li>
<li>
<p>The attack exploits hidden <strong>Unicode</strong> characters in rule files that remain invisible during code reviews, effectively weaponizing the AI assistant itself as an attack vector that can silently propagate through projects.</p>
</li>
<li>
<p>With 97% of enterprise developers using AI coding tools, this vulnerability creates significant risk as neither GitHub nor Cursor consider this their responsibility, leaving organizations to implement their own <strong>mitigation</strong> strategies like rule file validation.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-to-acquire-cybersecurity-firm-wiz-for-32-billion-in-record-deal"><a href="https://apnews.com/article/google-alphabet-wiz-32-billion-e50fb41b9a84a1056a116f963e6efed0?ref=mandos.io">Google to Acquire Cybersecurity Firm Wiz for $32 Billion in Record Deal</a></h3>
<ul>
<li>
<p>Google has agreed to purchase <strong>cloud</strong> security startup Wiz for $32 billion in an all-cash transaction, marking the largest acquisition in Google's 26-year history and the biggest-ever cybersecurity deal.</p>
</li>
<li>
<p>The acquisition aims to strengthen Google <strong>Cloud</strong> division, which has seen significant growth with revenue jumping 64% to $43.2 billion last year, as the company competes with Microsoft and Amazon in the AI-driven cloud computing market.</p>
</li>
<li>
<p>The deal faces potential <strong>regulatory</strong> scrutiny amid Google's ongoing antitrust battles, including a recent ruling that its search engine is an illegal monopoly, with both companies expecting the acquisition to close in 2026.</p>
</li>
</ul>
<h3 id="orion-security-raises-6m-to-combat-data-exfiltration-with-context-aware-ai"><a href="https://siliconangle.com/2025/03/18/orion-security-raises-6m-plug-sensitive-data-leaks-ai-smarts/?ref=mandos.io">Orion Security Raises $6M to Combat Data Exfiltration with Context-Aware AI</a></h3>
<ul>
<li>
<p>Orion Security's platform creates a comprehensive map of organizational data flows, using <strong>AI</strong> to distinguish between legitimate business activities and potential risks, addressing the growing threat of data <strong>exfiltration</strong>.</p>
</li>
<li>
<p>The startup's approach moves beyond traditional manual policies and rigid rules-based systems, using proprietary reasoning algorithms and LLM-powered classification to understand the <strong>context</strong> of data movement.</p>
</li>
<li>
<p>Data exfiltration has become increasingly costly (averaging $5 million per breach) and sophisticated, with threats ranging from North Korean hackers posing as contractors to accidental leaks through <strong>generative</strong> AI tools.</p>
</li>
</ul>
<h3 id="vulncheck-secures-12m-series-a-funding-to-enhance-exploit-intelligence-platform"><a href="https://www.businesswire.com/news/home/20250318054563/en/VulnCheck-Secures-%2412-Million-in-Series-A-Funding-to-Meet-Surging-Global-Demand-for-Exploit-Intelligence-Solutions?ref=mandos.io">VulnCheck secures $12M Series A funding to enhance exploit intelligence platform</a></h3>
<ul>
<li>
<p>VulnCheck raised $12 million in Series A funding led by Ten Eleven Ventures, bringing total funding to nearly $20 million for international expansion and platform enhancement after achieving 3x year-over-year <strong>ARR</strong> growth.</p>
</li>
<li>
<p>The company's 2024 Trends in <strong>Exploitation</strong> Report revealed 768 vulnerabilities were publicly reported as exploited in the wild, a 20% increase over 2023, with 23.6% of known exploited vulnerabilities being exploited on or before CVE disclosure.</p>
</li>
<li>
<p>VulnCheck's platform collects data from nearly 500 channels and over 400 million records across all CVEs, refreshing every eight hours to help security teams <strong>prioritize</strong> and remediate critical vulnerabilities before attackers strike.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="upstream-security"><a href="https://cybersectools.com/tools/upstream-security-platform?ref=mandos.io">Upstream Security</a></h3>
<p>The Upstream Security Platform is a cloud-based solution for monitoring and securing connected vehicles and mobility IoT devices, offering features such as cybersecurity detection, API protection, and fraud detection.</p>
<h3 id="trojai"><a href="https://cybersectools.com/tools/trojai?ref=mandos.io">TrojAI</a></h3>
<p>TrojAI is an AI security platform that detects vulnerabilities in AI models and defends against attacks on AI applications.</p>
<h3 id="cyera"><a href="https://cybersectools.com/tools/cyera?ref=mandos.io">Cyera</a></h3>
<p>Cyera is a data security platform that discovers, classifies, and secures sensitive data across various environments, offering features such as DSPM, identity data access, and data privacy compliance.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #95: GitHub Action Backdoor, Microsoft Zero-Days, GitGuardian&#x27;s Secrets Report ]]></title>
        <description><![CDATA[ A major GitHub Action used by 23,000+ repos was compromised, leaking CI/CD secrets. Google&#39;s Red Team simulates real-world attacks. New AI security agents learn organizational context for better threat detection. ]]></description>
        <link>https://mandos.io/newsletter/brief-95-github-action-backdoor-microsoft-zero-days-gitguardians-secrets-report/</link>
        <guid isPermaLink="false">67d577a4679cce0001498eb8</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 16 Mar 2025 13:00:09 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/11-2.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Hope you're enjoying a bit of downtime this weekend. While you were busy wrapping up another hectic week, the security world kept moving with some developments worth knowing about:</p><ul><li>A popular GitHub Action used in 23,000+ repositories was compromised, leaking CI/CD secrets - if you're using tj-actions/changed-files, you'll want to take action immediately</li><li>GitGuardian's latest report found approximately 100,000 valid secrets in public Docker images, with 70% of secrets detected in 2022 still active today</li><li>The job market's shifting - 60% of security professionals are considering changing jobs despite competitive salaries, with career progression being the main driver</li></ul><p>Let's dive into this week's security updates and see what you need to know for the week ahead!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="github-action-tj-actionschanged-files-compromised-leaking-cicd-secrets"><a href="https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised?ref=mandos.io">GitHub Action tj-actions/changed-files Compromised, Leaking CI/CD Secrets</a></h3>
<ul>
<li>
<p>The popular GitHub Action tj-actions/changed-files (used in 23,000+ repositories) was <strong>compromised</strong> on March 14, 2025, with attackers retroactively modifying multiple version tags to reference a malicious commit that dumps CI/CD secrets in workflow logs.</p>
</li>
<li>
<p>StepSecurity detected the breach through anomaly detection and has released a secure replacement (step-security/changed-files). GitHub temporarily removed the compromised action before restoring it with the malicious code removed.</p>
</li>
<li>
<p>Users should immediately replace all instances of tj-actions/changed-files with the StepSecurity alternative, review workflow logs for <strong>leaked</strong> secrets, and rotate any exposed credentials, especially for <strong>public</strong> repositories where logs are accessible to anyone.</p>
</li>
</ul>
<h3 id="microsoft-patches-57-security-flaws-including-6-actively-exploited-zero-days"><a href="https://thehackernews.com/2025/03/urgent-microsoft-patches-57-security.html?ref=mandos.io">Microsoft Patches 57 Security Flaws, Including 6 Actively Exploited Zero-Days</a></h3>
<ul>
<li>
<p>Microsoft's latest Patch Tuesday addresses 57 vulnerabilities, with 6 <strong>zero-days</strong> already being actively exploited in the wild, including flaws in Windows NTFS, Win32 Kernel, and Microsoft Management Console.</p>
</li>
<li>
<p>Four of the zero-days affect core Windows file system components and could be chained together for remote code execution and information disclosure, with one exploit using malicious <strong>VHD</strong> files that users might be tricked into opening.</p>
</li>
<li>
<p>The PipeMagic <strong>backdoor</strong>, linked to one of the zero-days (CVE-2025-24983), has been targeting entities in Asia and Saudi Arabia since 2022, distributed as fake OpenAI ChatGPT applications in recent campaigns.</p>
</li>
</ul>
<h3 id="apple-patches-webkit-zero-day-vulnerability-actively-exploited-in-targeted-attacks"><a href="https://support.apple.com/en-us/100100?ref=mandos.io">Apple Patches WebKit Zero-Day Vulnerability Actively Exploited in Targeted Attacks</a></h3>
<ul>
<li>
<p>Apple has released security updates to fix CVE-2025-24201, an out-of-bounds write <strong>vulnerability</strong> in WebKit that allowed attackers to break out of the Web Content sandbox through malicious web content.</p>
</li>
<li>
<p>The zero-day flaw was exploited in "extremely <strong>sophisticated</strong>" attacks targeting specific individuals using iOS versions prior to 17.2, though Apple provided no details about the victims or <strong>threat</strong> actors.</p>
</li>
<li>
<p>Updates are available for iOS/iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, and visionOS 2.3.2, marking the third actively exploited zero-day Apple has patched this <strong>year</strong>.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="gitguardianthe-state-of-secrets-sprawl-2025-report"><a href="https://drive.google.com/file/d/13VyzhIzIMtYKMsG3RF6ASlvfa7v5vY89/view?usp=share_link&ref=mandos.io">GitGuardian - The State of Secrets Sprawl 2025 Report</a></h3>
<ul>
<li>
<p>GitGuardian's analysis of 15 million public Docker images revealed approximately 100,000 <strong>valid</strong> secrets including AWS keys, GCP keys, and GitHub tokens belonging to Fortune 500 companies.</p>
</li>
<li>
<p>70% of valid secrets detected in public GitHub repositories in 2022 remain <strong>active</strong> today, highlighting a critical remediation gap even after detection.</p>
</li>
<li>
<p>Repositories using GitHub <strong>Copilot</strong> have a 40% higher secrets leak rate (6.4%) compared to the average public repository (4.6%), suggesting AI coding assistants may prioritize productivity over security.</p>
</li>
</ul>
<h3 id="googles-red-team-simulates-cyberattacks-to-strengthen-security-defenses"><a href="https://cloud.google.com/transform/how-google-does-it-red-teaming-at-scale?ref=mandos.io">Google's Red Team Simulates Cyberattacks to Strengthen Security Defenses</a></h3>
<ul>
<li>
<p>Google's Red Team, established in 2016, acts as a <strong>sparring</strong> partner for defense teams by simulating real-world attacks based on known threat actors' behaviors to identify security gaps.</p>
</li>
<li>
<p>The team operates with few constraints and maintains detailed activity logs to help defenders distinguish between Red Team exercises and actual malicious attacks, fostering <strong>trust</strong> across the organization.</p>
</li>
<li>
<p>Their approach includes threat intelligence-driven exercises, dedicated remediation tracking, and a <strong>blameless</strong> culture that focuses on improving systems rather than reprimanding individuals when vulnerabilities are discovered.</p>
</li>
</ul>
<h3 id="cybersecurity-report-reveals-escalating-software-supply-chain-attacks"><a href="https://drive.google.com/file/d/12CyvJC2e8Ymu41RUp_1GrDXHJwM_qEtU/view?usp=share_link&ref=mandos.io">Cybersecurity Report Reveals Escalating Software Supply Chain Attacks</a></h3>
<ul>
<li>
<p><strong>Cryptocurrency</strong> applications were heavily targeted, with 23 malicious campaigns discovered across npm (61%) and PyPI (39%) platforms, serving as a warning sign for other industries.</p>
</li>
<li>
<p>Commercial <strong>binaries</strong> pose significant risks, with ReversingLabs identifying seven common security issues including malware, tampering, and exposed secrets in widely used software packages.</p>
</li>
<li>
<p>Open-source packages remain vulnerable despite decreased malware incidents, with popular packages containing an average of 68 vulnerabilities (including 6 <strong>critical</strong>-severity flaws) and a 12% increase in leaked developer secrets.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-professionals-share-career-mistakes-and-lessons-learned"><a href="https://www.reddit.com/r/cybersecurity/comments/1j5v1m3/what_mistakes_did_you_make_in_your_career_and/?ref=mandos.io">Cybersecurity Professionals Share Career Mistakes and Lessons Learned</a></h3>
<ul>
<li>
<p><strong>Communication</strong> and soft skills are crucial - many professionals regret focusing solely on technical aspects while neglecting the ability to explain security concepts to non-technical stakeholders and <strong>collaborate</strong> with business units.</p>
</li>
<li>
<p>Finding the right balance between security and business needs is essential - several experienced practitioners warn against being the "no" person or security cop, instead recommending a risk-based approach that offers <strong>solutions</strong> rather than just identifying problems.</p>
</li>
<li>
<p>Work-life balance matters significantly - professionals who burned out from chasing money or prestige emphasize that maintaining personal relationships and health ultimately leads to more sustainable and fulfilling <strong>careers</strong>.</p>
</li>
</ul>
<h3 id="60-of-cybersecurity-professionals-considering-job-change-despite-high-salaries"><a href="https://www.csoonline.com/article/3839266/60-of-cybersecurity-pros-looking-to-change-employers.html?ref=mandos.io">60% of Cybersecurity Professionals Considering Job Change Despite High Salaries</a></h3>
<ul>
<li>
<p>Career <strong>progression</strong> is the primary reason for dissatisfaction, particularly among senior professionals, with 53% of cybersecurity functional leaders planning to leave their current positions within the next year.</p>
</li>
<li>
<p>Security architects and engineers command top salaries (averaging $206,000 and $191,000 respectively), but compensation alone isn't enough to retain talent, as professionals with expertise in <strong>cloud</strong> security, application security, and threat intelligence earn significantly more.</p>
</li>
<li>
<p>Work arrangements are crucial for retention, with 59% of cybersecurity staff expressing strong preference for <strong>remote</strong> work, while employers forcing office returns risk increased turnover and recruitment difficulties in an already talent-scarce <strong>industry</strong>.</p>
</li>
</ul>
<h3 id="cybersecurity-career-offers-mix-of-collaboration-technical-challenges-and-good-pay"><a href="https://www.reddit.com/r/cybersecurity/comments/1j6x6wj/is_cybersecurity_a_good_career_why_do_you_enjoy/?ref=mandos.io">Cybersecurity Career Offers Mix of Collaboration, Technical Challenges, and Good Pay</a></h3>
<ul>
<li>
<p>Cybersecurity is <strong>not</strong> primarily solitary work - professionals report frequent meetings, team collaboration, and cross-departmental communication as core aspects of the job.</p>
</li>
<li>
<p>The field offers diverse roles spanning technical and non-technical paths, with many professionals citing the constant <strong>puzzles</strong> and evolving challenges as key motivators rather than just compensation.</p>
</li>
<li>
<p>While the pay is competitive, professionals warn about industry <strong>hype</strong> - documentation, meetings, and continuous learning are significant parts of the job that influencers often downplay when promoting the field.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="weaviate-introduces-agentic-architectures-for-retrieval-intensive-applications"><a href="https://drive.google.com/file/d/1tCMBNGb-m66D5ksPQEkZuAtYNyU-nPgK/view?ref=mandos.io">Weaviate Introduces Agentic Architectures for Retrieval-Intensive Applications</a></h3>
<ul>
<li>
<p>Agentic architectures consist of AI agents with <strong>memory</strong> and tools, where each agent uses a Large Language Model (LLM) as its "brain" to make autonomous decisions for specific tasks.</p>
</li>
<li>
<p>Single-agent architectures are simpler but may struggle with complex tasks, while multi-agent systems offer better handling of complex tasks through specialized agents arranged in patterns like <strong>hierarchical</strong>, sequential, or parallel configurations.</p>
</li>
<li>
<p>Vector databases serve dual purposes in these architectures: as <strong>tools</strong> for Retrieval-Augmented Generation (RAG) pipelines and as <strong>memory</strong> storage to help agents retrieve information from past interactions semantically.</p>
</li>
</ul>
<h3 id="floki-ai-agentic-workflow-engine-built-on-dapr-framework"><a href="https://blog.openthreatresearch.com/floki-building-an-ai-agentic-workflow-engine-dapr/?ref=mandos.io">Floki: AI Agentic Workflow Engine Built on Dapr Framework</a></h3>
<ul>
<li>
<p>Floki is an open-source framework that enables <strong>orchestration</strong> of autonomous AI agents using Dapr's workflow engine, supporting both deterministic workflows and event-driven interactions.</p>
</li>
<li>
<p>The system leverages Dapr's built-in capabilities for <strong>fault-tolerance</strong>, persistent state management, and CloudEvents-based messaging to enable reliable multi-agent collaboration through pub/sub patterns.</p>
</li>
<li>
<p>The framework has been donated to the Dapr community and officially released as <strong>Dapr Agents</strong>, providing developers with tools to create, orchestrate and manage LLM-based autonomous agents with built-in <strong>observability</strong>.</p>
</li>
</ul>
<h3 id="researchers-develop-security-ai-agents-that-learn-organizational-context"><a href="https://www.detectionatscale.com/p/teaching-ai-agents-your-organization?ref=mandos.io">Researchers Develop Security AI Agents That Learn Organizational Context</a></h3>
<ul>
<li>
<p>AI agents can now learn organizational <strong>context</strong> by ingesting policies, technical architecture details, and business processes to distinguish between normal operations and security threats.</p>
</li>
<li>
<p>These agents use <strong>retrieval-augmented</strong> generation to dynamically access relevant information during investigations, combining short-term memory for active cases with long-term memory for persistent organizational knowledge.</p>
</li>
<li>
<p>Implementation requires establishing reliable data sources, validation cycles, and update mechanisms while maintaining appropriate <strong>access</strong> controls as organizations evolve.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="blackwall-raises-%E2%82%AC45m-series-b-to-protect-smbs-from-malicious-bot-traffic"><a href="https://www.prnewswire.com/news-releases/botguard-raises-45-million-series-b-led-by-dawn-capital-rebrands-to-blackwall-302399837.html?ref=mandos.io">Blackwall Raises €45M Series B to Protect SMBs from Malicious Bot Traffic</a></h3>
<ul>
<li>
<p>Blackwall (formerly BotGuard) secured €45M in Series B funding led by Dawn Capital to expand its <strong>infrastructure</strong> protection services that defend against automated threats across 2.3 million websites.</p>
</li>
<li>
<p>The company targets a critical security gap by partnering with Hosting and Managed Service Providers to protect SMBs, which face 43% of all cyber attacks but typically lack enterprise-level security resources against <strong>malicious</strong> bot traffic.</p>
</li>
<li>
<p>Blackwall's GateKeeper product helps service providers reduce operational costs by up to 25% while creating new revenue streams, with plans to double headcount and accelerate growth in the U.S. and <strong>APAC</strong> markets.</p>
</li>
</ul>
<h3 id="neural-defend-secures-600k-pre-seed-funding-to-fight-ai-powered-financial-fraud"><a href="https://idtechwire.com/ai-startup-neural-defend-raises-600k-to-combat-deepfake-financial-fraud/?ref=mandos.io">Neural Defend Secures $600K Pre-Seed Funding to Fight AI-Powered Financial Fraud</a></h3>
<ul>
<li>
<p>Neural Defend, founded in 2024 with dual headquarters in India and San Francisco, has raised over $600,000 to develop real-time, <strong>multimodal</strong> deepfake detection technology targeting identity fraud in financial transactions.</p>
</li>
<li>
<p>The investment comes as financial institutions face growing <strong>deepfake</strong> threats, with industry data showing that over 40% of fraud attempts now use AI and traditional document review processes identify sophisticated fakes less than 1% of the time.</p>
</li>
<li>
<p>The funding round was led by Inflection Point Ventures with participation from MIT SBXI, Techstars San Francisco, and Soonicorn Ventures, as cybersecurity analysts project deepfake-related <strong>crimes</strong> could exceed $52 billion by 2030.</p>
</li>
</ul>
<h3 id="chainguard-in-talks-for-350m-funding-round-at-35bn-valuation"><a href="https://www.verdict.co.uk/chainguard-raise-350m-valuation/?cf-view=&ref=mandos.io">Chainguard in talks for $350m funding round at $3.5bn valuation</a></h3>
<ul>
<li>
<p>US cybersecurity startup Chainguard is reportedly in discussions with Kleiner Perkins to raise $350m, which would <strong>triple</strong> its valuation to $3.5bn since its last funding round in July 2024.</p>
</li>
<li>
<p>The company previously raised $140m in a Series C round led by Redpoint Ventures, Lightspeed Venture Partners, and IVP, with participation from existing <strong>investors</strong> including Amplify and Sequoia Capital.</p>
</li>
<li>
<p>Chainguard focuses on <strong>software</strong> security, specifically reimagining software delivery and consumption to provide a safe source for open source software through their Chainguard Images product.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="anvilogic"><a href="https://cybersectools.com/tools/anvilogic?ref=mandos.io">Anvilogic</a></h3>
<p>Anvilogic is a SIEM platform that streamlines detection engineering, offers cost-effective data management, and enhances threat detection capabilities.</p>
<h3 id="scubagear"><a href="https://cybersectools.com/tools/scubagear?ref=mandos.io">ScubaGear</a></h3>
<p>ScubaGear assesses Microsoft 365 tenant configurations against CISA Secure Configuration Baselines, using PowerShell and Open Policy Agent to compare settings and generate compliance reports.</p>
<h3 id="github-actions-attack-diagram"><a href="https://cybersectools.com/tools/github-actions-attack-diagram?ref=mandos.io">GitHub Actions Attack Diagram</a></h3>
<p>A visual guide illustrating attack paths and techniques for exploiting vulnerabilities in GitHub Actions configurations.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #94: ESXi Server Attacks, Webcam-Based Ransomware, Google&#x27;s AI Red Team Path ]]></title>
        <description><![CDATA[ 80% of organizations struggle to identify high-risk data in hybrid clouds. State actors bypass MFA via LinkedIn/WhatsApp social engineering. Anthropic&#39;s Claude outperforms GPT-4o in security testing. ]]></description>
        <link>https://mandos.io/newsletter/brief-94-esxi-server-attacks-webcam-based-ransomware-googles-ai-red-team-path/</link>
        <guid isPermaLink="false">67caac79715ff50001b6fab7</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 09 Mar 2025 13:00:51 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/10.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>This week brings some interesting developments worth your attention. As you enjoy your morning coffee, here's what's happening:<br><br>• VMware ESXi servers are facing active exploitation of a critical vulnerability, with over 37,000 exposed instances worldwide. If your organization uses ESXi, you'll want to prioritize those patches.<br><br>• The job market is evolving - we're seeing an oversupply of security generalists while specialized skills (like OT security and zero-trust) remain in high demand. Might be time to focus on developing those niche capabilities.<br><br>• An interesting finding on LLM hacking capabilities shows that while technically possible, AI tools still require significant expert supervision to be effective for attacks - good news for defenders, at least for now.<br><br>Dive into the full newsletter for more details on these stories and other developments shaping our industry this week.</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>

<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="over-37000-vmware-esxi-servers-vulnerable-to-actively-exploited-critical-flaw"><a href="https://www.bleepingcomputer.com/news/security/over-37-000-vmware-esxi-servers-vulnerable-to-ongoing-attacks/?ref=mandos.io">Over 37,000 VMware ESXi Servers Vulnerable to Actively Exploited Critical Flaw</a></h3>
<ul>
<li>
<p>A critical out-of-bounds write vulnerability (CVE-2025-22224) affecting VMware ESXi is being actively <strong>exploited</strong> in the wild, with ShadowServer reporting approximately 37,000 internet-exposed vulnerable instances.</p>
</li>
<li>
<p>The flaw enables local attackers with administrative privileges on VM guests to escape the sandbox and execute code on the host as the VMX process, with CISA mandating federal agencies to patch by March 25, 2025, or discontinue using the <strong>product</strong>.</p>
</li>
<li>
<p>Most vulnerable servers are located in China (4,400), France (4,100), United States (3,800), and Germany (2,800), with Broadcom providing patches but no <strong>workarounds</strong> for this critical vulnerability.</p>
</li>
</ul>
<h3 id="akira-ransomware-gang-bypasses-edr-by-encrypting-network-from-unsecured-webcam"><a href="https://www.bleepingcomputer.com/news/security/akira-ransomware-encrypted-network-from-a-webcam-to-bypass-edr/?ref=mandos.io">Akira Ransomware Gang Bypasses EDR by Encrypting Network from Unsecured Webcam</a></h3>
<ul>
<li>
<p>Akira threat actors initially gained access through an exposed remote access solution, then pivoted to using an unsecured <strong>webcam</strong> running Linux after their Windows encryptor was blocked by the victim's EDR solution.</p>
</li>
<li>
<p>The attackers mounted Windows SMB network shares from the webcam device, which had no EDR protection, allowing them to encrypt files across the victim's network while generating unmonitored malicious SMB traffic.</p>
</li>
<li>
<p>Security firm S-RM confirmed that patches were available for the webcam vulnerabilities, highlighting the importance of isolating IoT devices from sensitive networks and maintaining regular <strong>firmware</strong> updates for all connected devices.</p>
</li>
</ul>
<h3 id="microsoft-365-to-prompt-users-for-onedrive-backups-amid-multiple-security-threats"><a href="https://www.bleepingcomputer.com/news/security/malicious-chrome-extensions-can-spoof-password-managers-in-new-attack/?ref=mandos.io">Microsoft 365 to Prompt Users for OneDrive Backups, Amid Multiple Security Threats</a></h3>
<ul>
<li>
<p>Microsoft is implementing a new feature in Microsoft 365 apps that will <strong>prompt</strong> users to back up their files to OneDrive, potentially improving data security as various threats emerge.</p>
</li>
<li>
<p>A malicious Chrome extension attack discovered by SquareX Labs can <strong>impersonate</strong> legitimate extensions like password managers by using the chrome.management API to disable the real extension and display phishing forms to steal credentials.</p>
</li>
<li>
<p>Over 37,000 VMware ESXi servers remain <strong>vulnerable</strong> to ongoing attacks, while a ransomware gang successfully encrypted a network by accessing it through a webcam to bypass endpoint detection and response (EDR) solutions.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="organizations-face-significant-data-security-challenges-in-hybrid-cloud-environments"><a href="https://drive.google.com/file/d/135vzgVw4EALeyny3-4YrMSLT5353E-Tr/view?ref=mandos.io">Organizations Face Significant Data Security Challenges in Hybrid Cloud Environments</a></h3>
<ul>
<li>
<p>Survey reveals 80% of respondents lack high confidence in identifying high-risk data sources, with 31% reporting insufficient <strong>tooling</strong> to identify their riskiest data sources.</p>
</li>
<li>
<p><strong>Misalignment</strong> exists between management and operational teams, with executives focusing on strategic goals while staff struggle with resource constraints—54% rely on semi-automated processes and 22% on entirely manual processes.</p>
</li>
<li>
<p>Organizations are shifting toward risk-based approaches, prioritizing vulnerability identification (7.06/8) and vulnerability prioritization (6.15/8) over compliance-driven strategies, with 54% using four or more <strong>tools</strong> to manage data risks.</p>
</li>
</ul>
<h3 id="state-sponsored-threat-actor-compromises-cloud-environment-via-social-engineering"><a href="https://drive.google.com/file/d/1D9zgMMX3aAnd6OZwu1Ogm60AOwY-oR7n/view?ref=mandos.io">State-Sponsored Threat Actor Compromises Cloud Environment via Social Engineering</a></h3>
<ul>
<li>
<p>Attackers used <strong>LinkedIn</strong> and WhatsApp to target key development staff, convincing them to run malicious code that harvested access keys and credentials from corporate laptops.</p>
</li>
<li>
<p>The threat actor bypassed <strong>MFA</strong> by stealing session tokens, gaining access to Microsoft 365 and AWS environments through both direct API access and web console via compromised Entra ID.</p>
</li>
<li>
<p>The sophisticated attack demonstrates how threat actors can chain together minor permission gaps to achieve privilege escalation, highlighting critical weaknesses in <strong>identity</strong> governance and cloud security monitoring.</p>
</li>
</ul>
<h3 id="sophisticated-infostealer-malware-sneakthief-sets-new-standard-for-2024-cyber-threats"><a href="https://drive.google.com/file/d/1hw46AukEoYFk_GsQ-G7PrbUReOSTjhcl/view?usp=share_link&ref=mandos.io">Sophisticated Infostealer Malware "SneakThief" Sets New Standard for 2024 Cyber Threats</a></h3>
<ul>
<li>
<p>"SneakThief" malware employs multi-stage <strong>infiltration</strong> techniques including process injection, encrypted communications, and boot persistence to remain hidden while stealing valuable data.</p>
</li>
<li>
<p>Top ten MITRE ATT&amp;CK techniques account for over 90% of observed malicious activity, with Process Injection (T1055), Command and Scripting <strong>Interpreter</strong> (T1059), and Credentials from Password Stores (T1555) being most prevalent.</p>
</li>
<li>
<p>Modern <strong>infostealers</strong> now perform an average of 14 malicious actions per sample, while ransomware groups have evolved to multi-stage extortion campaigns that combine data theft with traditional <strong>encryption</strong> tactics.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-and-hack-the-box-launch-ai-red-teamer-path-for-security-education"><a href="https://www.hackthebox.com/blog/google-ai-red-teamer?ref=mandos.io">Google and Hack The Box Launch AI Red Teamer Path for Security Education</a></h3>
<ul>
<li>
<p>The partnership introduces a structured learning program designed to equip cybersecurity professionals with skills to evaluate, test, and defend AI systems against <strong>adversarial</strong> threats like data poisoning and model evasion.</p>
</li>
<li>
<p>The curriculum aligns with Google's Secure AI Framework (SAIF) and provides hands-on labs focused on <strong>red teaming</strong> methodologies specifically for AI security challenges.</p>
</li>
<li>
<p>Target audiences include penetration testers expanding into AI security, AI engineers developing secure models, and developers working with AI-integrated applications, with plans to expand coverage of <strong>MITRE</strong> Atlas and OWASP LLM/ML frameworks.</p>
</li>
</ul>
<h3 id="entry-level-cybersecurity-jobs-in-us-typically-pay-50-80k-varying-by-location-and-experience"><a href="https://www.reddit.com/r/cybersecurity/comments/1j1wayt/question_to_experienced_professionals_what_is_the/?ref=mandos.io">Entry-level cybersecurity jobs in US typically pay $50-80K, varying by location and experience</a></h3>
<ul>
<li>
<p>Most respondents indicate entry-level <strong>SOC</strong> analyst positions start at $50-60K, with some reporting increases to $60-70K after probationary periods or in higher cost-of-living areas.</p>
</li>
<li>
<p>True entry-level cybersecurity positions are relatively rare, with many employers preferring candidates who have 2-5 years of prior <strong>IT</strong> experience, which can push salaries toward the $70-90K range.</p>
</li>
<li>
<p><strong>Location</strong> significantly impacts salary ranges, with coastal and high cost-of-living areas offering higher compensation (up to $90-100K), while specialized roles in consulting, engineering, or finance sectors may command premium starting salaries.</p>
</li>
</ul>
<h3 id="cybersecurity-job-market-shifts-generalist-oversupply-while-specialized-skills-remain-in-demand"><a href="https://www.theregister.com/2025/03/03/cybersecurity_jobs_market/?ref=mandos.io">Cybersecurity Job Market Shifts: Generalist Oversupply While Specialized Skills Remain in Demand</a></h3>
<ul>
<li>
<p>The cybersecurity job market has evolved from "hire anyone who can spell cybersecurity" to a more competitive landscape, with <strong>generalists</strong> facing potential oversupply while specific skill shortages persist in areas like operational technology and zero-trust expertise.</p>
</li>
<li>
<p>HR practices are complicating the hiring process through "ghost jobs" (advertised positions that don't exist), AI-based resume filtering that rejects qualified candidates, and unrealistic job requirements that don't match actual needs or <strong>compensation</strong> levels.</p>
</li>
<li>
<p>Industry experts recommend employers work with existing security staff to create realistic job descriptions, focus on hiring for aptitude rather than experience for junior roles, and note that <strong>networking</strong> has become increasingly critical for job seekers in the security field.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="llm-hacking-research-shows-limited-practical-threat-despite-technical-feasibility"><a href="https://drive.google.com/file/d/1JS6l1PJ3iXxfMbzp0003wUlhQ0587Y7C/view?usp=share_link&ref=mandos.io">LLM Hacking Research Shows Limited Practical Threat Despite Technical Feasibility</a></h3>
<ul>
<li>
<p>OWASP researchers found that while LLMs can technically perform hacking tasks, they require extensive <strong>supervision</strong> from experts and are impractical for low-skill threat actors due to high time investment (82 developer hours for just five tasks).</p>
</li>
<li>
<p>GPT-4o outperformed Claude and local DeepSeek models (which failed completely), suggesting that advanced LLM hacking requires <strong>credentials</strong> for commercial APIs, increasing both cost and risk of detection for malicious actors.</p>
</li>
<li>
<p>LLMs demonstrated significant limitations including rigid goal-following (missing obvious vulnerabilities), installation loops creating "cycles of spend," and noisy fallback behaviors that would likely trigger <strong>detection</strong> in real environments.</p>
</li>
</ul>
<h3 id="ai-agents-set-to-transform-work-functions-and-reshape-industries"><a href="https://drive.google.com/file/d/10Y2rLXXpqH4ryEtPhYRvvm9Mij3h8msr/view?usp=share_link&ref=mandos.io">AI Agents Set to Transform Work Functions and Reshape Industries</a></h3>
<ul>
<li>
<p>AI is entering the "Agentic" phase, where <strong>autonomous</strong> AI systems can perceive environments and take actions to achieve specific goals without constant human input.</p>
</li>
<li>
<p>Five types of AI agents are emerging: simple reflex, model-based reflex, goal-based, utility-based, and <strong>learning</strong> agents - with applications across customer support, online shopping, education, healthcare, and business decision-making.</p>
</li>
<li>
<p>While promising increased productivity, the shift raises concerns about job <strong>displacement</strong> and control problems, with experts predicting AI will affect nearly 40% of all jobs in coming years.</p>
</li>
</ul>
<h3 id="security-researcher-publishes-comprehensive-guide-to-hacking-ai-applications"><a href="https://josephthacker.com/hacking/2025/02/25/how-to-hack-ai-apps.html?ref=mandos.io">Security Researcher Publishes Comprehensive Guide to Hacking AI Applications</a></h3>
<ul>
<li>
<p>Security researcher Joseph (rez0) has released a detailed guide covering <strong>methodologies</strong> for hacking AI applications, focusing on systems that use language models as features.</p>
</li>
<li>
<p>The guide explores various attack vectors including prompt injection, traditional web vulnerabilities triggered through AI, and <strong>multimodal</strong> attacks that use invisible Unicode characters or image-based techniques.</p>
</li>
<li>
<p>The researcher includes a responsibility model for AI security, explaining how vulnerabilities should be attributed between model providers, application developers, and users, along with potential <strong>mitigations</strong> for the identified security issues.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="anthropics-claude-35-sonnet-tops-ai-security-rankings-in-calypsoais-new-index"><a href="https://www.prnewswire.com/news-releases/calypsoai-launches-security-index-provides-first-comprehensive-safety-ranking-of-major-genai-models-302386190.html?ref=mandos.io">Anthropic's Claude 3.5 Sonnet Tops AI Security Rankings in CalypsoAI's New Index</a></h3>
<ul>
<li>
<p>CalypsoAI has launched the first comprehensive security ranking system for major GenAI models, using their new <strong>Inference Red-Team</strong> solution that successfully compromised all tested models through automated attacks and "Agentic Warfare" techniques.</p>
</li>
<li>
<p>The CalypsoAI Security Index (CASI) shows Anthropic's Claude 3.5 Sonnet leading with a 96.25 score, while popular models like OpenAI's GPT-4o scored significantly lower at 75.06, revealing substantial <strong>vulnerabilities</strong> across even the most advanced AI systems.</p>
</li>
<li>
<p>The index provides critical metrics beyond security scores, including Risk-to-Performance ratio and Cost of Security, giving organizations essential data to make informed decisions about which AI models can be safely <strong>deployed</strong> in enterprise environments.</p>
</li>
</ul>
<h3 id="rapid7-enhances-exposure-management-with-data-visibility-and-ai-driven-risk-scoring"><a href="https://siliconangle.com/2025/02/25/rapid7-expands-exposure-management-improved-attack-surface-visibility-context/?ref=mandos.io">Rapid7 Enhances Exposure Management with Data Visibility and AI-Driven Risk Scoring</a></h3>
<ul>
<li>
<p>Rapid7's expanded offering provides continuous visibility into <strong>sensitive</strong> data across multicloud environments, integrating with AWS Macie, Google Cloud DLP, and Microsoft Defender for automated data classification.</p>
</li>
<li>
<p>New AI-driven <strong>vulnerability</strong> scoring enhances risk prioritization by generating intelligence-driven risk scores, helping security teams focus on critical exposures with greater accuracy.</p>
</li>
<li>
<p>Updates to Remediation Hub streamline the <strong>remediation</strong> process by embedding guidance directly within asset inventory pages, eliminating platform switching and accelerating mean-time-to-remediate.</p>
</li>
</ul>
<h3 id="ninjaone-secures-500-million-in-series-c-funding-at-5-billion-valuation"><a href="https://www.businesswire.com/news/home/20250224242763/en/NinjaOne-Secures-5-Billion-Valuation-and-500-Million-Funding-to-Redefine-Automated-Endpoint-Management?ref=mandos.io">NinjaOne secures $500 million in Series C funding at $5 billion valuation</a></h3>
<ul>
<li>
<p>The <strong>endpoint</strong> management platform raised funding led by ICONIQ Growth and CapitalG to drive R&amp;D in autonomous management, patching, and vulnerability remediation while supporting its pending $262M acquisition of <strong>Dropsuite</strong>.</p>
</li>
<li>
<p>NinjaOne remains founder-led with co-founders Sal Sferlazza and Chris Matarese maintaining majority control of the company, which serves over 24,000 customers including Nvidia, Lyft, and Porsche.</p>
</li>
<li>
<p>The company plans to expand its <strong>AI</strong> capabilities and IT use cases while maintaining its commitment to customer support, having recently launched NinjaOne AI for Patch Sentiment, Mobile Device Management, and free <strong>Warranty</strong> Tracking.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="clouddefenseai"><a href="https://cybersectools.com/tools/cloud-defense-ai?ref=mandos.io">CloudDefense.AI</a></h3>
<p>CloudDefense.AI is a Cloud Native Application Protection Platform (CNAPP) that safeguards cloud infrastructure and cloud-native apps with expertise, precision, and confidence.</p>
<h3 id="wiz"><a href="https://cybersectools.com/tools/wiz?ref=mandos.io">Wiz</a></h3>
<p>Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.</p>
<h3 id="anomali"><a href="https://cybersectools.com/tools/anomali?ref=mandos.io">Anomali</a></h3>
<p>Anomali is an AI-Powered Security Operations Platform that delivers speed, scale, and performance at a reduced cost, combining ETL, SIEM, XDR, SOAR, and TIP to detect, investigate, respond, and remediate threats.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>

<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #93: Trump Drops Russia Threats, Microsoft Copilot Leaks Private Data, NVIDIA&#x27;s AI Red Teams ]]></title>
        <description><![CDATA[ Two critical Microsoft Copilot vulnerabilities exposing private repos and corporate data. Orange Group confirms 12,000 files stolen by HellCat ransomware affiliate. jQuery dominates high-risk OSS flaws. ]]></description>
        <link>https://mandos.io/newsletter/brief-93-trump-drops-russia-threats-microsoft-copilot-leaks-private-data-nvidias-ai-red-teams/</link>
        <guid isPermaLink="false">67c1b4fbe9b9870001a07ef8</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 02 Mar 2025 13:00:57 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/03/9.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>This week's cybersecurity landscape brings several developments worth your attention. As you enjoy your morning coffee, here's what's happening:<br><br>• The Trump Administration has quietly removed Russia from the cybersecurity threat list in both public statements and internal directives, despite Russia's previously established status as a major threat actor.<br><br>• Microsoft Copilot has a concerning vulnerability that allows it to access private GitHub repositories through Bing's caching mechanism, potentially exposing sensitive data from over 16,000 organizations.<br><br>• Many SOC Analysts are battling imposter syndrome despite years of experience and multiple certifications – a reminder that even seasoned professionals in our field share these feelings.<br><br>Dive into the full newsletter below.</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>

<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="trump-administration-drops-russia-from-cybersecurity-threat-list"><a href="https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security?ref=mandos.io">Trump Administration Drops Russia from Cybersecurity Threat List</a></h3>
<ul>
<li>
<p>Recent policy shift shows US no longer characterizing Russia as a <strong>cybersecurity</strong> threat in both public statements and internal directives, despite Russia being previously considered on par with China as a major threat actor.</p>
</li>
<li>
<p>State Department official Liesyl Franz omitted Russia from her UN speech on cyber threats, while a memo at the Cybersecurity and Infrastructure Security Agency (<strong>CISA</strong>) reportedly instructed analysts not to follow or report on Russian threats.</p>
</li>
<li>
<p>This change aligns with broader Trump administration efforts to improve relations with Moscow, including recent UN votes supporting Russia, despite intelligence agencies previously warning about Russia's <strong>enduring</strong> capabilities to target critical infrastructure.</p>
</li>
</ul>
<h3 id="microsoft-copilot-exposes-private-github-repositories-through-bing-cache"><a href="https://www.lasso.security/blog/lasso-major-vulnerability-in-microsoft-copilot?ref=mandos.io">Microsoft Copilot Exposes Private GitHub Repositories Through Bing Cache</a></h3>
<ul>
<li>
<p>Researchers discovered that Microsoft Copilot can access and reveal content from private GitHub repositories that were once public, even after they've been made private, through Bing's <strong>caching</strong> mechanism.</p>
</li>
<li>
<p>The vulnerability affects over 16,000 organizations including Fortune 500 companies, exposing 300+ private <strong>tokens</strong> and 100+ internal packages potentially vulnerable to dependency confusion attacks.</p>
</li>
<li>
<p>Despite Microsoft implementing a partial fix by disabling public access to cached pages, Copilot can still access this "<strong>zombie</strong> data" - information users believe is private but remains accessible through Microsoft's AI tools.</p>
</li>
</ul>
<h3 id="orange-group-confirms-data-breach-after-hacker-leaks-internal-documents"><a href="https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/?ref=mandos.io">Orange Group confirms data breach after hacker leaks internal documents</a></h3>
<ul>
<li>
<p>A hacker named Rey, affiliated with the HellCat ransomware group, <strong>exfiltrated</strong> nearly 12,000 files (6.5GB) from Orange Group's Romanian branch, containing customer and employee information.</p>
</li>
<li>
<p>The threat actor gained access by exploiting compromised credentials and <strong>vulnerabilities</strong> in Orange's Jira software and internal portals, maintaining access for over a month before extracting data during a three-hour window.</p>
</li>
<li>
<p>Orange confirmed the breach occurred on a "non-critical back office application" with no impact on customer operations, and is working with authorities to <strong>mitigate</strong> the incident's effects.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ransomware-remains-top-threat-for-2025-as-ai-agents-loom-on-horizon"><a href="https://drive.google.com/file/d/1r0gRKeWiRbp3TjZ5x5gYnPtFbwn54HlO/view?ref=mandos.io">Ransomware Remains Top Threat for 2025 as AI Agents Loom on Horizon</a></h3>
<ul>
<li>
<p><strong>Ransomware</strong> continues as the primary cybersecurity concern with attacks becoming faster, stealthier, and more numerous in 2024, with the USA accounting for 51% of all known attacks.</p>
</li>
<li>
<p>While current generative AI has had limited impact on the threat landscape, the emergence of <strong>autonomous</strong> AI agents in 2025 could transform cybersecurity by enabling both defenders and attackers to scale operations dramatically.</p>
</li>
<li>
<p>The ransomware ecosystem is evolving with "dark horse" groups gaining market share as tools become more accessible, while attackers increasingly use legitimate <strong>administration</strong> tools (Living Off the Land tactics) to evade detection.</p>
</li>
</ul>
<h3 id="jquery-dominates-high-risk-vulnerabilities-in-open-source-software"><a href="https://drive.google.com/file/d/14qfyNsQwfX4g_LbdReFELsqYiUrrioR-/view?ref=mandos.io">jQuery Dominates High-Risk Vulnerabilities in Open Source Software</a></h3>
<ul>
<li>
<p>The 2025 Black Duck Open Source Security and Risk Analysis report reveals that <strong>jQuery</strong> accounts for 8 of the top 10 high-risk vulnerabilities found in open source components, with 32% of scanned codebases containing this library.</p>
</li>
<li>
<p><strong>Transitive</strong> dependencies represent 64% of open source components in applications, creating significant hidden risk as 81% of codebases contain high or critical-risk vulnerabilities, with nearly half introduced through these indirect dependencies.</p>
</li>
<li>
<p>Organizations face maintenance challenges with 90% of codebases containing outdated components and 56% containing <strong>license</strong> conflicts, highlighting the need for comprehensive Software Bill of Materials (SBOM) tracking.</p>
</li>
</ul>
<h3 id="google-cloud-introduces-quantum-safe-digital-signatures-in-preview-for-post-quantum-cryptography-preparation"><a href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-prepare-early-for-PQC-resilient-cryptographic-threats/?ref=mandos.io">Google Cloud Introduces Quantum-Safe Digital Signatures in Preview for Post-Quantum Cryptography Preparation</a></h3>
<ul>
<li>
<p>Google Cloud has released <strong>quantum-safe</strong> digital signatures in preview as part of their Cloud Key Management Service, following NIST's publication of quantum-safe cryptographic standards last summer.</p>
</li>
<li>
<p>Organizations should begin preparing for post-quantum cryptography now, as NIST suggests retiring current public-key <strong>cryptosystems</strong> by 2030-2035, and implementation will take significant time despite seeming like a distant concern.</p>
</li>
<li>
<p>The primary risks include "harvest now, decrypt later" attacks where adversaries collect encrypted data to decrypt once quantum computing advances, and the potential for <strong>CRQC</strong> (cryptographically-relevant quantum computers) to break existing cryptographic infrastructure.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="soc-analyst-struggles-with-imposter-syndrome-despite-2-years-of-experience"><a href="https://www.reddit.com/r/SecurityCareerAdvice/comments/1iz3smu/soc_analyst_feel_like_i_am_not_learning_and_an/?ref=mandos.io">SOC Analyst Struggles with Imposter Syndrome Despite 2 Years of Experience</a></h3>
<ul>
<li>
<p>Despite having a cybersecurity degree and multiple certifications (Security+, BTL1, SC-900), this analyst feels their <strong>foundational</strong> knowledge is poor and struggles to investigate alerts in Microsoft <strong>Sentinel</strong>.</p>
</li>
<li>
<p>The analyst's learning approach may be ineffective - they spend more time writing notes than understanding concepts, and have difficulty applying information when investigating alerts.</p>
</li>
<li>
<p>Fellow professionals reassure that imposter syndrome is common in cybersecurity, with even industry <strong>experts</strong> sharing similar experiences throughout their careers, suggesting persistence and continuous learning are key to overcoming these feelings.</p>
</li>
</ul>
<h3 id="reddit-thread-reveals-solo-vciso-experiences-and-business-challenges"><a href="https://www.reddit.com/r/cybersecurity/comments/1iycjso/solo_vcisos/?ref=mandos.io">Reddit Thread Reveals Solo vCISO Experiences and Business Challenges</a></h3>
<ul>
<li>
<p>Solo virtual CISOs typically manage 2-8 clients simultaneously, with one professional recommending a maximum of 20 <strong>billable</strong> hours per week to avoid burnout while running their consultancy.</p>
</li>
<li>
<p>Successful vCISOs emphasize the importance of prior experience managing information security teams, strong organizational skills, and understanding that the role involves more <strong>compliance</strong> and governance work than technical security tasks.</p>
</li>
<li>
<p>Most vCISO services operate on a fixed fee model based on estimated monthly hours, with professionals noting that business communication skills and industry-specific experience are crucial for long-term success.</p>
</li>
</ul>
<h3 id="cybersecurity-industry-undergoing-fundamental-shift-in-required-skills-despite-talent-shortage"><a href="https://www.darkreading.com/cloud-security/betting-losing-farm-traditional-cybersecurity?ref=mandos.io">Cybersecurity Industry Undergoing Fundamental Shift in Required Skills Despite Talent Shortage</a></h3>
<ul>
<li>
<p>The cybersecurity field is experiencing a <strong>seismic</strong> transformation where traditional skills (endpoints, networks, operating systems) are no longer sufficient in an era of cloud computing, remote work, and AI.</p>
</li>
<li>
<p>Future cybersecurity professionals will need to be solution <strong>builders</strong> rather than configuration experts, similar to how software engineers operate - creating integrated, scalable security stacks using cloud technologies.</p>
</li>
<li>
<p>The industry parallels early 20th century farming's transformation, where employers increasingly prefer candidates with specialized <strong>cloud</strong> platform expertise and coding abilities over security generalists, sometimes even promoting software engineers directly into security roles.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="in-case-you-missed-five-ai-agent-types-transforming-enterprise-cybersecurity"><a href="https://mandos.io/blog/5-ai-agent-types-modern-security-teams-must-know-about/">In case you missed: Five AI Agent Types Transforming Enterprise Cybersecurity</a></h3>
<ul>
<li>
<p>Modern security systems utilize different AI agent architectures, from basic <strong>reflex</strong> agents (simple if-then rules) to sophisticated learning agents that adapt over time.</p>
</li>
<li>
<p>Each agent type serves specific security functions - model-based agents maintain internal representations of network states, goal-based agents work toward security objectives, and utility-based agents balance competing priorities like security versus <strong>usability</strong>.</p>
</li>
<li>
<p>The future of cybersecurity lies in <strong>hybrid</strong> approaches that combine multiple agent types, allowing organizations to leverage the strengths of each architecture while minimizing their individual weaknesses.</p>
</li>
</ul>
<h3 id="microsoft-copilot-studio-agents-vulnerable-to-enumeration-and-data-extraction"><a href="https://medium.com/@attias.dor/the-burn-notice-part-1-5-revealing-shadow-copilots-812def588a7a?ref=mandos.io">Microsoft Copilot Studio Agents Vulnerable to Enumeration and Data Extraction</a></h3>
<ul>
<li>
<p>Microsoft's low-code AI agent platform has a <strong>security</strong> flaw allowing attackers to enumerate and access exposed agents through predictable URL patterns derived from tenant IDs and common agent names.</p>
</li>
<li>
<p>Once discovered, unauthenticated agents can serve as knowledge <strong>oracles</strong>, potentially leaking sensitive financial data from knowledge bases connected to SharePoint, Excel sheets, and other corporate resources.</p>
</li>
<li>
<p>Despite Microsoft updating default settings to warn about "No Authentication" configurations, the researchers believe many of the 100,000 organizations using Copilot Studio will still have <strong>misconfigured</strong> agents accessible to threat actors.</p>
</li>
</ul>
<h3 id="nvidia-defines-llm-red-teaming-as-systematic-testing-to-identify-ai-vulnerabilities"><a href="https://developer.nvidia.com/blog/defining-llm-red-teaming/?ref=mandos.io">NVIDIA Defines LLM Red Teaming as Systematic Testing to Identify AI Vulnerabilities</a></h3>
<ul>
<li>
<p>LLM red teaming involves systematically testing AI models to identify <strong>vulnerabilities</strong> and unwanted behaviors, with two main categories: security red teaming (focusing on traditional security properties) and content-based red teaming (examining unwanted outputs).</p>
</li>
<li>
<p>Red teamers employ various strategies including social engineering, technical manipulation, and context <strong>exploitation</strong>, motivated by professional requirements, social factors, or personal interest in discovering model weaknesses.</p>
</li>
<li>
<p>NVIDIA uses red teaming as part of their Trustworthy AI process, with findings incorporated into their Model Card++ documentation and the open-source <strong>garak</strong> toolkit that tests LLMs against over 120 vulnerability categories.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="zscaler-launches-asset-exposure-management-service-to-improve-cyber-asset-visibility"><a href="https://siliconangle.com/2025/02/25/zscaler-launches-asset-exposure-management-enhanced-cyber-asset-tracking/?ref=mandos.io">Zscaler launches Asset Exposure Management service to improve cyber asset visibility</a></h3>
<ul>
<li>
<p>The new service <strong>consolidates</strong> data from multiple sources including Zscaler's Zero Trust Exchange platform (which processes 500 billion security transactions daily) to provide organizations with accurate asset inventory and risk visibility.</p>
</li>
<li>
<p>Asset Exposure Management helps identify security <strong>gaps</strong> by detecting assets lacking essential protection measures like EDR solutions or running outdated software, while automating remediation workflows.</p>
</li>
<li>
<p>The solution addresses challenges faced by IT teams in regulated industries like healthcare and financial services where asset tracking is crucial to avoid <strong>noncompliance</strong> penalties.</p>
</li>
</ul>
<h3 id="archipelo-launches-devspm-platform-with-12m-funding-to-secure-developer-and-ai-generated-code"><a href="https://finance.yahoo.com/news/archipelo-emerges-stealth-12m-funding-130000072.html?ref=mandos.io">Archipelo Launches DevSPM Platform with $12M Funding to Secure Developer and AI-Generated Code</a></h3>
<ul>
<li>
<p>Archipelo has emerged from stealth with a new <strong>DevSPM</strong> (Developer Security Posture Management) platform that addresses security risks at their source—developer actions and AI-assisted coding workflows—before vulnerabilities reach production environments.</p>
</li>
<li>
<p>The San Francisco-based startup secured $12M in funding led by Dell Technologies Capital with participation from notable investors including Zoom CEO Eric Yuan, creating a new cybersecurity category focused on the 74% of security breaches caused by <strong>human error</strong>.</p>
</li>
<li>
<p>The platform offers four key capabilities: Developer Detection &amp; Response, AI Code Risk Monitoring, Automated Developer Tool Inventory, and Developer Security Posture Analytics—already serving Fortune 500 enterprises in <strong>financial services</strong>, technology, and defense sectors.</p>
</li>
</ul>
<h3 id="ransomware-defense-firm-mimic-secures-50m-series-a-funding-led-by-google-ventures-and-menlo-ventures"><a href="https://mimic.com/blog/mimic-series-a-funding/?ref=mandos.io">Ransomware defense firm Mimic secures $50M Series A funding led by Google Ventures and Menlo Ventures</a></h3>
<ul>
<li>
<p>Mimic's SaaS platform detects <strong>ransomware</strong> in fractions of a second, with former Mandiant CEO Kevin Mandia joining the board and Greg Davison (ex-Mandiant/Google) appointed as Head of <strong>Revenue</strong>.</p>
</li>
<li>
<p>Seattle-based <strong>retailer</strong> REI has been announced as a major customer, with their CISO Mike Hughes highlighting Mimic's capabilities in early detection and rapid recovery as vital to their business continuity.</p>
</li>
<li>
<p>The company unveiled its new Signal <strong>Generator</strong> feature that allows customers to safely simulate ransomware impacts within their networks to test security posture without handling actual malware.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="roboshadow"><a href="https://cybersectools.com/tools/roboshadow?ref=mandos.io">RoboShadow</a></h3>
<p>A cybersecurity platform that offers vulnerability scanning, Windows Defender and 3rd party AV management, and MFA compliance reporting, among other features.</p>
<h3 id="zoho-vault"><a href="https://cybersectools.com/tools/zoho-vault?ref=mandos.io">Zoho Vault</a></h3>
<p>Zoho Vault is a secure password management tool that allows you to store and automatically fill in passwords on websites and apps.</p>
<h3 id="clouddefenseai"><a href="https://cybersectools.com/tools/cloud-defense-ai?ref=mandos.io">CloudDefense.AI</a></h3>
<p>CloudDefense.AI is a Cloud Native Application Protection Platform (CNAPP) that safeguards cloud infrastructure and cloud-native apps with expertise, precision, and confidence.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>

<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ 5 AI Agent Types Modern Security Teams Must Know About ]]></title>
        <description><![CDATA[ I&#39;ve decoded the AI agent types that are revolutionizing enterprise cybersecurity programs. Are you leveraging all five? Discover which ones your security team is missing and how you can use them for your advantage. ]]></description>
        <link>https://mandos.io/blog/5-ai-agent-types-modern-security-teams-must-know-about/</link>
        <guid isPermaLink="false">67c060f217b0a30001078402</guid>
        <category><![CDATA[ AI ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Thu, 27 Feb 2025 15:57:43 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/5-AI-Agent-Types-Modern-Security-Teams-Must-Know-About.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Behind every successful cybersecurity system or information security program there will be an AI agent. </p><p>A system designed to perceive their environment and take actions to achieve specific outcomes.</p><p>But not all AI agents are created equal.</p><p>In this post I will guide you through the five most crucial types of AI agents and help you understand their application in cybersecurity.</p><p>Let's start with the most basic one.</p><h2 id="simple-reflex-agents">Simple Reflex Agents</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/02/1-4.png" class="kg-image" alt="simple reflex AI agent process" loading="lazy" width="2000" height="1822" srcset="https://mandos.io/content/images/size/w600/2025/02/1-4.png 600w, https://mandos.io/content/images/size/w1000/2025/02/1-4.png 1000w, https://mandos.io/content/images/size/w1600/2025/02/1-4.png 1600w, https://mandos.io/content/images/size/w2400/2025/02/1-4.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>Simple reflex agents represent the most basic form of artificial intelligence. They follow basic rules without thinking about the long-term effects of what they do. Remember 5 years ago when every EDR/SIEM provider was selling products with "AI" slapped on it? This is it, if-else statements on steroids.</p><h3 id="how-they-work">How They Work</h3><!--members-only--><p>The architecture of a simple reflex agent follows this basic flow:</p><ol><li>Receive input from sensors/environment</li><li>Match the current input to predefined rules</li><li>Execute the corresponding action</li><li>Repeat</li></ol><p>In security contexts, simple reflex agents power:</p><ul><li><strong>Signature-based antivirus software</strong>&nbsp;that identifies known malware patterns and immediately quarantines matching files</li><li><strong>Basic firewall rules</strong>&nbsp;that block traffic from specific IP addresses or ports</li><li><strong>Simple intrusion detection systems</strong>&nbsp;that trigger alerts when they detect predefined attack patterns</li></ul><h3 id="limitations-in-security-contexts">Limitations in Security Contexts</h3><p>While it might be useful as a first line of defense, simple reflex agents suffer from significant limitations:</p><ul><li>They can only detect known threats with exact matching patterns</li><li>They cannot adapt to new attack vectors without manual rule updates</li><li>They generate high rates of false positives in complex environments</li><li>They're easily circumvented by slight variations in attack methods.</li></ul><p>It's like a basic WAF that triggers an alert when it detects a special character like in request header. Provide a combination or encoded characters and your "AI powered WAF" will be bypassed. It does not analyze patterns over time, or consider the context of the activity.</p><p>The next AI agent might be a bit more interesting.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="model-based-reflex-ai-agents">Model-Based Reflex AI Agents</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/02/2-3.png" class="kg-image" alt="model-based agents in cybersecurity" loading="lazy" width="2000" height="2129" srcset="https://mandos.io/content/images/size/w600/2025/02/2-3.png 600w, https://mandos.io/content/images/size/w1000/2025/02/2-3.png 1000w, https://mandos.io/content/images/size/w1600/2025/02/2-3.png 1600w, https://mandos.io/content/images/2025/02/2-3.png 2217w" sizes="(min-width: 720px) 720px"></figure><p>Model-based agents are capable of maintaining an internal representation (model) of the world. This allows them to track the state of their environment even when it's not observable at any single moment.</p><h3 id="how-they-work-1">How They Work</h3><p>Model-based agents:</p><ol><li>Maintain an internal state that represents the world</li><li>Update this state based on new perceptions</li><li>Consult transition models to understand how the world evolves</li><li>Use condition-action rules based on the current state (not just current perception)</li></ol><p>In security, model-based agents can enable:</p><ul><li><strong>Network behavior analysis systems</strong>&nbsp;that maintain models of "normal" network states and flag deviations</li><li><strong>Stateful inspection firewalls</strong>&nbsp;that track the status of active connections</li><li><strong>Context-aware security tools</strong>&nbsp;that consider the relationship between different events</li></ul><p>Model-based agents offer significant improvements for security applications:</p><ul><li>They can detect multi-step attacks by maintaining state</li><li>They reduce false positives by considering context</li><li>They function with incomplete information</li><li>They can even infer hidden states based on partial observations</li></ul><p>One example of a model-based security agent is an impossible travel tracking. Unlike a simple reflex agent that only flags individual suspicious logins, this system maintains a model of user behavior patterns. So, it can detect when someone attempts to log in from an unusual location shortly after a successful login from a different continent.</p><p>Now, what if AI agents could take actions to achieve goals?</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="goal-based-agents">Goal-Based Agents</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/02/3-4.png" class="kg-image" alt="exploring the dimensions of goal-based agents" loading="lazy" width="2000" height="1484" srcset="https://mandos.io/content/images/size/w600/2025/02/3-4.png 600w, https://mandos.io/content/images/size/w1000/2025/02/3-4.png 1000w, https://mandos.io/content/images/size/w1600/2025/02/3-4.png 1600w, https://mandos.io/content/images/size/w2400/2025/02/3-4.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>Goal-based agents take intelligence a step further by considering desired outcomes. Instead of just reacting to the environment based on rules (boring and outdated), they actively plan sequences of actions to achieve specific goals.</p><h3 id="how-they-work-2">How They Work</h3><p>These agents:</p><ol><li>Maintain an internal state representation</li><li>Define explicit goals</li><li>Consider different possible action sequences</li><li>Choose actions that move toward goal states</li></ol><p>In security operations, goal-based agents can play a huge roal:</p><ul><li><strong>Security orchestration and automated response (SOAR) platforms</strong>&nbsp;that work toward specific security objectives</li><li><strong>Penetration testing tools</strong>&nbsp;that systematically probe for weaknesses to achieve the goal of identifying vulnerabilities</li><li><strong>Automated incident response systems</strong>&nbsp;that work toward the goal of containing threats</li></ul><p>Goal-based agents provide critical capabilities to security teams:</p><ul><li>They can proactively identify paths to security breaches before attackers do</li><li>They can balance multiple security objectives simultaneously</li><li>They adapt to changing environments by finding new paths to their goals</li><li>They provide logical justifications for their actions (the path to the goal)</li></ul><p>Imagine an automated IR system that receives an alert about potential data exfiltration. Rather than simply blocking the specific connection (a reflex action), a goal-based agent would establish the goal of "contain the threat while preserving evidence for investigation." To achive this, it might isolate the affected system, capture network traffic and create memory dumps. All actions chosen specifically to achieve the defined goal.</p><p>The following AI agent adds some more spice to goal setting. </p><h2 id="utility-based-agent">Utility-Based Agent</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/02/4-7.png" class="kg-image" alt="utility-based agents in cybersecurity" loading="lazy" width="2000" height="1364" srcset="https://mandos.io/content/images/size/w600/2025/02/4-7.png 600w, https://mandos.io/content/images/size/w1000/2025/02/4-7.png 1000w, https://mandos.io/content/images/size/w1600/2025/02/4-7.png 1600w, https://mandos.io/content/images/size/w2400/2025/02/4-7.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>Utility-based agents refine the goal-based approach by adding a critical capability. They can check and compare the desirability of different states or outcomes. Instead of seeing the world in black and white (goal achieved or not achieved), they operate on a spectrum of preference.</p><h3 id="how-they-work-3">How They Work</h3><p>These sophisticated agents:</p><ol><li>Maintain an internal state representation</li><li>Check different possible outcomes using a utility function</li><li>Calculate the expected utility of various action sequences</li><li>Choose actions that maximize expected utility</li></ol><p>Utility-based reasoning enables:</p><ul><li><strong>Risk management frameworks</strong>&nbsp;that balance security measures against operational impact</li><li><strong>Resource allocation systems</strong>&nbsp;that optimize deployment of security controls across complex infrastructures</li><li><strong>Alert prioritization engines</strong>&nbsp;that rank incidents based on potential business impact</li></ul><p>In security operations, utility-based agents shine because:</p><ul><li>They can make optimal decisions when facing uncertain outcomes</li><li>They balance competing priorities (security vs. usability vs. cost)</li><li>They adapt to changing risk appetites by adjusting utility functions</li><li>They handle scenarios where perfect security is impossible or impractical</li></ul><p>A utility-based security agent might manage access control during a suspected breach. If goal-based agent would lock down all systems, the utility-based agent will first calculate the utility of various response levels. </p><p>For example: it might determine that completely locking critical healthcare systems carries extreme negative utility (potential loss of life), while the utility loss from potential data theft is lower. It would then implement graduated controls that maximize overall utility—perhaps implementing additional authentication steps rather than a complete lockdown.</p><p>The next AI agent is my personal favorite.</p><h2 id="learning-agents">Learning Agents</h2><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/02/5-3.png" class="kg-image" alt="the anatomy of learning agents in security" loading="lazy" width="2000" height="1359" srcset="https://mandos.io/content/images/size/w600/2025/02/5-3.png 600w, https://mandos.io/content/images/size/w1000/2025/02/5-3.png 1000w, https://mandos.io/content/images/size/w1600/2025/02/5-3.png 1600w, https://mandos.io/content/images/size/w2400/2025/02/5-3.png 2400w" sizes="(min-width: 720px) 720px"></figure><p>Learning agents are capable of combining aspects of all previous types while adding the crucial ability to improve through experience. Rather than relying on pre-programmed knowledge, these agents adjust their behavior based on feedback about their performance.</p><h3 id="how-they-work-4">How They Work</h3><p>The architecture of a learning agent typically includes:</p><ol><li>A performance element that selects external actions</li><li>A learning element that makes improvements to the performance element</li><li>A critic that evaluates performance and provides feedback</li><li>A problem generator that suggests exploratory actionspseudocode</li></ol><p>Learning agents have revolutionized security through:</p><ul><li><strong>Advanced malware detection systems</strong>&nbsp;that continuously improve their recognition capabilities</li><li><strong>User and entity behavior analytics (UEBA)</strong>&nbsp;that learn normal patterns and detect anomalies</li><li><strong>Adaptive authentication systems</strong>&nbsp;that adjust security requirements based on risk signals</li><li><strong>Next-generation AV</strong>&nbsp;that identifies malicious behavior without relying solely on signatures</li></ul><p>What makes learning agents invaluable for security:</p><ul><li>They can detect novel, previously unseen threats</li><li>They reduce false positives over time by learning from mistakes</li><li>They adapt to evolving attacker techniques without manual updates</li><li>They personalize security responses to specific environments</li></ul><p>A learning-based endpoint protection platform begins with some knowledge of malicious behavior but refines its understanding. When it flags a custom internal application as malicious, security analysts provide feedback. </p><p>The system learns from this correction, adjusting its model to recognize similar legitimate applications in the future. Simultaneously, when it blocks a new ransomware variant, this success reinforces its detection patterns. </p><p>Over time, the system becomes increasingly accurate at distinguishing between benign and malicious activity specific to the organization's environment.</p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><h2 id="the-security-implications-of-agent-architecture">The Security Implications of Agent Architecture</h2><p>Understanding these five agent types can help you ask better questions to your vendors and select better products. </p><p>Furthermore, if you are planning on developing in-house AI agents (which I highly recommend), this can help you design and put in place the right agent for your use case.</p><table>
<thead>
<tr>
<th>Agent Type</th>
<th>Security Strength</th>
<th>Security Weakness</th>
</tr>
</thead>
<tbody>
<tr>
<td>Simple Reflex</td>
<td>Fast response to known threats</td>
<td>Blindness to novel attacks</td>
</tr>
<tr>
<td>Model-Based</td>
<td>Context awareness reduces false positives</td>
<td>Limited by quality of world model</td>
</tr>
<tr>
<td>Goal-Based</td>
<td>Proactive security planning</td>
<td>May pursue security at expense of usability</td>
</tr>
<tr>
<td>Utility-Based</td>
<td>Balanced security decisions</td>
<td>Complex to configure correctly</td>
</tr>
<tr>
<td>Learning</td>
<td>Adaptation to new threats</td>
<td>Potential for manipulation during learning phase</td>
</tr>
</tbody>
</table>
<p>When evaluating or designing security solutions, consider:</p><ol><li><strong>Environment observability</strong>: How complete is your visibility? Simple reflex agents need full observability; model-based agents can work with partial information.</li><li><strong>Threat landscape</strong>: Are you primarily defending against known threats (reflex agents may suffice) or novel attacks (learning agents necessary)?</li><li><strong>Decision complexity</strong>: Do you need nuanced decisions that balance multiple factors? Utility-based agents excel here.</li><li><strong>Adaptation requirements</strong>: How frequently does your environment change? Learning agents provide the greatest adaptability.</li><li><strong>Explainability needs</strong>: Simple reflex and goal-based agents often provide clearer reasoning for their actions than complex learning systems.</li></ol><h2 id="the-future-is-hybrid">The Future is Hybrid</h2><p>While I've presented these agent types as distinct categories, modern security systems increasingly implement hybrid approaches. Today's most advanced security platforms combine:</p><ul><li>Simple reflex components for immediate response to known threats</li><li>Model-based reasoning for context awareness</li><li>Goal-based planning for proactive security</li><li>Utility functions for balanced decision-making</li><li>Learning capabilities for continuous improvement</li></ul><p><br>What type of AI agent powers your security infrastructure? Are you leveraging the right architecture for your threat model? These questions are becoming increasingly central to effective cybersecurity strategy in our AI-driven world.</p><hr><h3 id="before-you-go">Before you go</h3><p>If you found this post useful, I'd really appreciate if you could forward it to your community.</p><p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #92: Russian APTs Target Signal, GitHub Security Issues, Importance of Career Growth ]]></title>
        <description><![CDATA[ Security architects face limited career growth, GoLang backdoor using telegram as C2 channel, 86% of orgs have exposed secrets in private GitHub repos ]]></description>
        <link>https://mandos.io/newsletter/brief-92-russian-apts-target-signal-github-security-issues-importance-of-career-growth/</link>
        <guid isPermaLink="false">67b8609d5302b70001152805</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 23 Feb 2025 13:00:58 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/8.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Hope you're having a great weekend. There's quite a bit happening in our space this week that I think you'll find valuable:</p><ul><li>Russian threat actors found a clever way to intercept Signal messages through device-linking - definitely worth checking if your team uses Signal for sensitive communications.</li><li>NVIDIA shared write-up about Agent Morpheus that analyzes CVEs in seconds instead of the usual days-long process. If you're dealing with vulnerability management, this could save you tons of time.</li><li>Interesting data from IANS Research shows that even with great salaries, security pros are looking elsewhere due to limited growth paths. Might be worth reviewing your team's career development plans if you're in a leadership role.</li></ul><p>Let's dive into the details below.</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="russia-aligned-threat-actors-target-signal-messenger-through-device-linking-attacks"><a href="https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/?ref=mandos.io">Russia-Aligned Threat Actors Target Signal Messenger Through Device-Linking Attacks</a></h3>
<ul>
<li>
<p>Multiple <strong>Russian state</strong> threat actors are exploiting Signal's "linked devices" feature by tricking users into scanning malicious QR codes that connect victim accounts to <strong>attacker-controlled</strong> devices, enabling real-time message interception.</p>
</li>
<li>
<p>Threat actors including <strong>APT44</strong> (Sandworm) and UNC5792 use various methods including fake military apps, group invites, and security alerts to deliver malicious QR codes, while also deploying tools to steal Signal <strong>databases</strong> directly from compromised devices.</p>
</li>
<li>
<p>The targeting extends beyond Signal to other messaging apps like WhatsApp and Telegram, with attacks combining both remote phishing operations and <strong>close-access</strong> physical device exploitation when possible.</p>
</li>
</ul>
<h3 id="new-threat-actors-ta2726-and-ta2727-emerge-in-web-inject-campaigns-introduce-macos-frigidstealer"><a href="https://www.proofpoint.com/us/blog/threat-insight/update-fake-updates-two-new-actors-and-new-mac-malware?ref=mandos.io">New Threat Actors TA2726 and TA2727 Emerge in Web Inject Campaigns, Introduce MacOS FrigidStealer</a></h3>
<ul>
<li>
<p>TA2726 operates as a <strong>TDS provider</strong>, facilitating traffic distribution for multiple threat actors including TA569, primarily targeting North America with SocGholish, while redirecting other regions to TA2727's malware campaigns.</p>
</li>
<li>
<p>TA2727 delivers multiple payloads based on geography and device type, including Lumma Stealer (Windows), Marcher (Android), and a newly discovered <strong>FrigidStealer</strong> targeting MacOS systems through fake browser update lures.</p>
</li>
<li>
<p>The threat landscape has become increasingly complex with multiple actors using similar <strong>web inject</strong> techniques, making attribution challenging, with infrastructure patterns showing both actors leveraging compromised legitimate websites to distribute their <strong>malware</strong>.</p>
</li>
</ul>
<h3 id="golang-backdoor-uses-telegram-as-command-control-channel"><a href="https://www.netskope.com/blog/telegram-abused-as-c2-channel-for-new-golang-backdoor?ref=mandos.io">Golang Backdoor Uses Telegram as Command &amp; Control Channel</a></h3>
<ul>
<li>
<p>A <strong>Russian</strong> backdoor malware written in Golang has been discovered that uses <strong>Telegram</strong> for C2 communications, making detection challenging by blending with legitimate API traffic.</p>
</li>
<li>
<p>The malware installs itself as "svchost.exe" in Windows temp directory and supports three main commands: executing <strong>PowerShell</strong> commands, self-persistence, and self-destruction. A screenshot feature exists but is not yet implemented.</p>
</li>
<li>
<p>The backdoor uses a hardcoded Telegram bot token for C2 operations and executes commands through hidden PowerShell windows, demonstrating how threat actors leverage legitimate cloud services to avoid traditional detection methods.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="wiz-report-github-dominates-enterprise-vcs-with-80-market-share-reveals-security-gaps"><a href="https://drive.google.com/file/d/1wYeOMLRMwLocddHGpp_e1xla5UuPszsc/view?ref=mandos.io">Wiz Report: GitHub Dominates Enterprise VCS with 80% Market Share, Reveals Security Gaps</a></h3>
<ul>
<li>
<p>GitHub leads enterprise version control systems with <strong>80%</strong> market share, while only 5% of organizations use multiple VCS platforms. Public repositories are 3x more common on GitHub compared to other platforms.</p>
</li>
<li>
<p>Analysis reveals concerning secrets exposure with <strong>7%</strong> of private repos containing secrets (including cloud keys), and <strong>86%</strong> of organizations having at least one private repo with exposed secrets.</p>
</li>
<li>
<p>Branch protection is inadequately implemented across repositories, with only <strong>31%</strong> of private repos and 66% of public repos having protection enabled, while <strong>80%</strong> of GitHub Actions workflows run with excessive write permissions.</p>
</li>
</ul>
<h3 id="my-post-about-security-industrys-leadership-crisis-highlighted-by-tool-focused-hiring-practices"><a href="https://www.linkedin.com/posts/nikolozk_cybersecurity-does-not-have-a-talent-shortage-activity-7297241147746189312-avi2?ref=mandos.io">My Post About Security Industry's Leadership Crisis Highlighted by Tool-Focused Hiring Practices</a></h3>
<ul>
<li>
<p>A <strong>SOC Manager</strong> candidate with engineering leadership experience was rejected solely due to lack of proficiency in a specific security tool, despite having relevant leadership capabilities.</p>
</li>
<li>
<p>The interview focused exclusively on technical tool knowledge while ignoring crucial <strong>leadership competencies</strong> like incident response coordination, team development, process improvement, and crisis management.</p>
</li>
<li>
<p>This widespread <strong>hiring practice</strong> in cybersecurity demonstrates a fundamental misunderstanding of leadership roles, prioritizing tactical tool knowledge over strategic management skills that typically require years to develop.</p>
</li>
</ul>
<h3 id="deloitte-caq-survey-cybersecurity-remains-top-priority-for-audit-committees-in-2025"><a href="https://drive.google.com/file/d/1vo3g7UB8g24_RNjTpOLL4624e5vcsF0F/view?ref=mandos.io">Deloitte &amp; CAQ Survey: Cybersecurity Remains Top Priority for Audit Committees in 2025</a></h3>
<ul>
<li>
<p>Survey of 237 audit committee members shows <strong>cybersecurity</strong> remains the #1 priority beyond financial reporting, with 62% of committees having primary oversight and 71% discussing it quarterly.</p>
</li>
<li>
<p><strong>Enterprise risk management</strong> ranks as second priority, with 52% of audit committees having primary oversight, though this drops to 21% for financial services companies who typically delegate to risk committees.</p>
</li>
<li>
<p><strong>Finance talent</strong> and internal audit oversight is crucial as 92% of committees have primary responsibility, with 82% believing there's opportunity to extract more value from internal audit functions.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-professionals-seek-career-growth-despite-high-salaries-ians-research-reports"><a href="https://securityboulevard.com/2025/02/cybersecurity-salaries-stay-competitive-retention-challenges-persist/?ref=mandos.io">Cybersecurity Professionals Seek Career Growth Despite High Salaries, IANS Research Reports</a></h3>
<ul>
<li>
<p>Average compensation remains strong with <strong>security architects</strong> earning $206,000 annually, while 61% of professionals now work across multiple domains including SecOps, GRC, and AppSec, reflecting industry-wide resource constraints.</p>
</li>
<li>
<p>Only one-third would recommend their employer, with <strong>retention</strong> challenges stemming from limited advancement opportunities - fewer than 40% are satisfied with career progression prospects despite competitive pay.</p>
</li>
<li>
<p>Regional <strong>compensation</strong> disparities reach up to $61,000 annually between U.S. West and Southeast regions, while <strong>IT experience</strong> proves crucial with 70% of security engineers citing it as critical for their current roles.</p>
</li>
</ul>
<h3 id="top-8-in-demand-cybersecurity-certifications-reveal-industry-skills-requirements"><a href="https://www.coursera.org/articles/popular-cybersecurity-certifications?ref=mandos.io">Top 8 In-Demand Cybersecurity Certifications Reveal Industry Skills Requirements</a></h3>
<ul>
<li>
<p>Most sought-after certification is <strong>CISSP</strong>, requiring 5+ years experience across multiple security domains, with average salary potential of $217,127 for CISO positions.</p>
</li>
<li>
<p>Entry-level professionals should prioritize <strong>CompTIA Security+</strong> certification ($404), which covers core security skills and can lead to roles paying $89-157k, with no strict prerequisites beyond recommended Network+ certification.</p>
</li>
<li>
<p>Advanced specialized certifications like <strong>CEH</strong> and <strong>CISA</strong> require 2-5 years experience and command salaries of $130-235k for roles in penetration testing, security architecture, and IT auditing.</p>
</li>
</ul>
<h3 id="reddit-user-with-10k-in-bug-bounties-struggles-to-land-entry-level-pentesting-role"><a href="https://www.reddit.com/r/cybersecurity/comments/1itcu4f/earning_thousands_yet_still_struggling_to_land_a/?ref=mandos.io">Reddit User With $10K in Bug Bounties Struggles to Land Entry-Level Pentesting Role</a></h3>
<ul>
<li>
<p>Despite earning over <strong>$10,000</strong> in bug bounties and achieving top ranking in a HackerOne program, the candidate faces challenges in securing interviews, highlighting the competitive nature of red team positions versus available opportunities</p>
</li>
<li>
<p>Technical skills include development of Python scripts, BurpSuite plugins, and experience with common <strong>pentesting</strong> tools, but resume feedback suggests need for better documentation of achievements and impact metrics</p>
</li>
<li>
<p>Career experts recommend focusing on <strong>blue team</strong> roles for entry-level positions, improving resume structure to highlight work experience, and including detailed project outcomes, <strong>CVEs</strong>, and public disclosures</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="nvidia-launches-ai-powered-cve-analysis-tool-for-enterprise-security"><a href="https://developer.nvidia.com/blog/applying-generative-ai-for-cve-analysis-at-an-enterprise-scale/?ref=mandos.io">NVIDIA Launches AI-Powered CVE Analysis Tool for Enterprise Security</a></h3>
<ul>
<li>
<p>NVIDIA developed "Agent <strong>Morpheus</strong>" - a <strong>generative AI</strong> system that analyzes Common Vulnerabilities and Exposures (CVEs) in software containers, reducing analysis time from days to seconds by autonomously determining vulnerability exploitability.</p>
</li>
<li>
<p>The system uses <strong>retrieval-augmented generation</strong> with four specialized Llama3 models to create analysis checklists, investigate vulnerabilities, summarize findings, and generate standardized VEX format reports without human prompting.</p>
</li>
<li>
<p>When processing containers with multiple CVEs, the system achieves a 9.3x speed improvement through <strong>parallel processing</strong>, analyzing 20 CVEs in about 5 minutes versus 47 minutes when run serially.</p>
</li>
</ul>
<h3 id="this-video-shows-multi-agent-swarm-developing-red-team-tools-using-local-llms"><a href="https://www.youtube.com/watch?v=KIvso5oaS8c&ref=mandos.io">This Video Shows Multi-Agent Swarm Developing Red Team Tools Using Local LLMs</a></h3>
<ul>
<li>
<p>BugOut leverages a local <strong>DeepSeek</strong> LLM to generate Python-based red team tools through an iterative process where planning agents first discuss objectives before passing requirements to a coding agent for implementation.</p>
</li>
<li>
<p>The system uses a <strong>swarm architecture</strong> where multiple agents collaborate - planning agents refine requirements and constraints, while a coding agent generates executable Python scripts with built-in unit tests and error handling.</p>
</li>
<li>
<p>Code generation happens locally using a 16B parameter model, with <strong>isolation</strong> enforced through subprocess execution rather than direct eval(), and the system continues refining code through multiple iterations until successful execution or timeout.</p>
</li>
</ul>
<h3 id="ai-soc-solutions-evolution-copilot-and-autonomous-approaches-reshape-security-operations"><a href="https://www.cybersec-automation.com/p/cyber-copilot-vs-ai-soc?ref=mandos.io">AI SOC Solutions Evolution: Copilot and Autonomous Approaches Reshape Security Operations</a></h3>
<ul>
<li>
<p><strong>Copilot</strong> solutions function as AI assistants, responding to analyst prompts for alert investigation, enrichment, and threat hunting, offering flexibility but requiring specific queries and human guidance for optimal results.</p>
</li>
<li>
<p>Autonomous investigation tools operate independently with <strong>pre-built automation</strong>, handling alert triage, correlation, and response actions without manual intervention, ideal for high-volume environments but potentially limited in flexibility.</p>
</li>
<li>
<p>The emerging trend points toward a hybrid approach combining both methodologies - autonomous systems handle routine <strong>triage</strong> while copilots enable deeper investigation, with some solutions already integrating into existing <strong>SIEM/SOAR</strong> platforms for enhanced efficiency.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="israeli-cybersecurity-startup-dream-raises-100m-led-by-bain-capital-at-11b-valuation"><a href="https://www.insurancejournal.com/news/international/2025/02/19/812405.htm?ref=mandos.io">Israeli Cybersecurity Startup Dream Raises $100M Led by Bain Capital at $1.1B Valuation</a></h3>
<ul>
<li>
<p>Dream, founded by former NSO Group CEO, develops <strong>AI models</strong> for cybersecurity, focusing on protecting critical infrastructure and government entities through preparation, detection, and remediation of cyber threats.</p>
</li>
<li>
<p>Company projects $100M in annual recurring revenue for 2025 and plans to double its workforce to 300 employees, expanding operations into US and South America from current offices in Tel Aviv, Vienna, and <strong>Abu Dhabi</strong>.</p>
</li>
<li>
<p>Dream's technology includes specialized <strong>foundational models</strong> for cyber language, anomaly detection, and deep-learning trained on historical cyberattacks, serving customers across Europe, Middle East, and Southeast Asia in <strong>critical infrastructure</strong> sectors.</p>
</li>
</ul>
<h3 id="blockchain-security-startup-blockaid-raises-50m-series-b-investment"><a href="https://www.securityweek.com/blockaid-raises-50-million-to-secure-blockchain-applications/?ref=mandos.io">Blockchain Security Startup Blockaid Raises $50M Series B Investment</a></h3>
<ul>
<li>
<p>Company has secured total funding of <strong>$83M</strong>, with latest round led by Ribbit Capital, targeting expansion of their web3 security platform that protects blockchain applications through transaction validation and simulation.</p>
</li>
<li>
<p>Platform has prevented over <strong>$5.3B</strong> in potential losses by blocking 71 million attacks and securing 787 million dApp connections for major clients including <strong>Coinbase</strong>, MetaMask, and Uniswap.</p>
</li>
<li>
<p>Funding will support scaling of R&amp;D and engineering teams to enhance <strong>machine learning</strong> capabilities and expand security offerings against evolving blockchain-based threats.</p>
</li>
</ul>
<h3 id="gomboc-ai-raises-13m-for-deterministic-ai-cloud-security-remediation-platform"><a href="https://siliconangle.com/2025/02/19/gomboc-ai-secures-13m-tackle-cloud-security-backlogs-deterministic-ai/?ref=mandos.io">Gomboc AI Raises $13M for Deterministic AI Cloud Security Remediation Platform</a></h3>
<ul>
<li>
<p>Company launches platform using <strong>deterministic AI</strong> to automatically fix cloud security misconfigurations through Infrastructure as Code, moving beyond traditional alert-based approaches to provide consistent, repeatable remediation solutions.</p>
</li>
<li>
<p>Platform integrates with existing cloud infrastructure to reduce security backlogs by providing automated, context-aware fixes while maintaining compliance with <strong>NIST</strong> and CIS frameworks, without requiring customer data for model training.</p>
</li>
<li>
<p>Investment round led by Ballistic Ventures with participation from <strong>Glilot Capital</strong> and Hetz Ventures, targeting the growing need for automated security remediation in <strong>DevSecOps</strong> environments.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="adversa-ai"><a href="https://cybersectools.com/tools/adversa-ai?ref=mandos.io">Adversa AI</a></h3>
<p>Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.</p>
<h3 id="llm-guard"><a href="https://cybersectools.com/tools/sentinelone-purple-ai?ref=mandos.io">LLM Guard</a></h3>
<p>LLM Guard is a security toolkit that enhances the safety and security of interactions with Large Language Models (LLMs) by providing features like sanitization, harmful language detection, data leakage prevention, and resistance against prompt injection attacks.</p>
<h3 id="lakera"><a href="https://cybersectools.com/tools/lakera?ref=mandos.io">Lakera</a></h3>
<p>Lakera is an automated safety and security assessment tool for GenAI application</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #91: AWS AMI Attack, NVIDIA Container Escape, InfoSec Salaries ]]></title>
        <description><![CDATA[ Malicious AI models found on Hugging Face. Multiple PE firms compete for Trend Micro. Security leadership salaries reach $261.5K median ]]></description>
        <link>https://mandos.io/newsletter/brief-91-aws-ami-attack-nvidia-container-escape-infosec-salaries/</link>
        <guid isPermaLink="false">67af0af0ce02f4000112883b</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 16 Feb 2025 13:00:26 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/7.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>This week brings some interesting developments across the security landscape. AWS users should pay attention to a new supply chain attack targeting AMI deployments, while Meta's making waves with their new AI-powered testing tool that's already improving security across their major platforms. On the career front, the latest salary index shows security leadership roles breaking past $260K, though the gap between public and private sector compensation continues to widen.<br><br>Let's dive into this week's security updates and see what matters for your Monday morning.</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="aws-ami-name-confusion-attack-enables-malicious-image-deployment"><a href="https://securitylabs.datadoghq.com/articles/whoami-a-cloud-image-name-confusion-attack/?ref=mandos.io">AWS AMI Name Confusion Attack Enables Malicious Image Deployment</a></h3>
<ul>
<li>
<p>A newly discovered <strong>supply chain</strong> attack allows threat actors to trick AWS services into using malicious AMIs by exploiting image name pattern matching when the <code>owners</code> attribute is not specified during AMI searches.</p>
</li>
<li>
<p>The vulnerability affects approximately 1% of organizations using AWS and impacted AWS's internal systems. AWS has released "<strong>Allowed AMIs</strong>" feature in December 2024 as a security control to prevent unauthorized AMI usage.</p>
</li>
<li>
<p>The attack can be detected using Datadog's new Cloud SIEM rule that monitors for <code>ec2:DescribeImages</code> API calls without owner filters followed by <code>ec2:RunInstances</code>. The open source "<strong>whoAMI-scanner</strong>" tool can also identify instances running unverified AMIs.</p>
</li>
</ul>
<h3 id="south-american-foreign-ministry-targeted-with-novel-finaldraft-malware-using-microsoft-graph-api"><a href="https://www.elastic.co/security-labs/fragile-web-ref7707?ref=mandos.io">South American Foreign Ministry Targeted with Novel FINALDRAFT Malware Using Microsoft Graph API</a></h3>
<ul>
<li>
<p>Threat actor <strong>REF7707</strong> deployed sophisticated malware against a South American foreign ministry, telecommunications entity, and university, using valid network credentials for lateral movement via Windows Remote Management.</p>
</li>
<li>
<p>The malware, named FINALDRAFT, is a remote administration tool that leverages Microsoft's <strong>Graph API</strong> to execute commands through Outlook draft folders, featuring 37 command handlers for process injection and file manipulation.</p>
</li>
<li>
<p>A <strong>Linux variant</strong> of FINALDRAFT was discovered, suggesting a cross-platform <strong>espionage</strong> campaign with both Windows and Linux versions sharing similar command-and-control functionality through Microsoft's email services.</p>
</li>
</ul>
<h3 id="nvidia-container-toolkit-vulnerability-enables-host-system-access-through-container-escape"><a href="https://www.wiz.io/blog/nvidia-ai-vulnerability-deep-dive-cve-2024-0132?ref=mandos.io">NVIDIA Container Toolkit Vulnerability Enables Host System Access Through Container Escape</a></h3>
<ul>
<li>
<p>Critical vulnerability (<strong>CVE-2024-0132</strong>) in NVIDIA Container Toolkit allows attackers to escape container isolation by exploiting a Time-of-Check/Time-of-Use vulnerability in <strong>libnvidia-container</strong>, enabling full host system access.</p>
</li>
<li>
<p>Exploit technique involves manipulating container filesystem mounts to access the host's root filesystem and <strong>docker.sock</strong>, allowing attackers to launch privileged containers and achieve complete host compromise.</p>
</li>
<li>
<p>Affects multiple cloud providers using NVIDIA's toolkit, with potential for cross-tenant attacks in Kubernetes environments. Fixed in version <strong>1.17.4</strong>, which addresses both the original vulnerability and a subsequent bypass (CVE-2025-23359).</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="threat-actors-standardize-enterprise-level-attack-methods-across-all-business-sizes"><a href="https://drive.google.com/file/d/1ruxSZ4ewLOZj3SBbi8c-_7Uto_v8U4P7/view?usp=share_link&ref=mandos.io">Threat Actors Standardize Enterprise-Level Attack Methods Across All Business Sizes</a></h3>
<ul>
<li>
<p>Advanced techniques like defense tampering and <strong>BYOVD</strong> privilege escalations have become standard across organizations of all sizes, with attackers adapting enterprise-level strategies for smaller targets.</p>
</li>
<li>
<p><strong>Infostealers</strong> and malicious scripts dominated the threat landscape (46% of incidents), while ransomware groups shifted focus to data theft and extortion rather than encryption due to improved detection capabilities.</p>
</li>
<li>
<p>Healthcare and education sectors were most targeted (38% of incidents), with attackers heavily exploiting <strong>RATs</strong> like AsyncRAT and abusing legitimate <strong>RMM</strong> tools for network infiltration and lateral movement.</p>
</li>
</ul>
<h3 id="paris-peace-forum-policy-report-shows-ai-governance-parallels-in-cyber-policy-evolution"><a href="https://drive.google.com/file/d/1cRQsfAfvTJlRyBUuxhdODpI3EdfBOr4y/view?usp=share_link&ref=mandos.io">Paris Peace Forum Policy Report Shows AI Governance Parallels in Cyber Policy Evolution</a></h3>
<ul>
<li>
<p>International cyber policy experience over the past 20 years offers valuable <strong>frameworks</strong> and lessons for governing emerging AI risks, particularly around trust-building and stakeholder inclusion.</p>
</li>
<li>
<p>Current global AI governance efforts show significant <strong>fragmentation</strong>, with 118 countries excluded from major initiatives, highlighting need for more inclusive participation similar to cyber policy development.</p>
</li>
<li>
<p>The report identifies AI-driven <strong>cyber threats</strong> as the most pressing short-term risk, requiring adaptation of existing cybersecurity frameworks rather than creating entirely new governance structures.</p>
</li>
</ul>
<h3 id="2025-ciso-compensation-survey-shows-growing-pay-gap-between-public-and-private-sectors"><a href="https://www.hitchpartners.com/ciso-security-leadership-survey-results-25?ref=mandos.io">2025 CISO Compensation Survey Shows Growing Pay Gap Between Public and Private Sectors</a></h3>
<ul>
<li>
<p>Public company CISOs experienced a <strong>6.1%</strong> year-over-year increase in cash compensation, while private sector CISOs saw only 1.7% growth, highlighting a widening compensation gap between sectors.</p>
</li>
<li>
<p>Gender pay disparities persist, with female CISOs in private companies earning 83% of male counterparts' salaries, though the gap narrows to 92.5% in public companies. <strong>Diversity</strong> remains a critical challenge in security leadership.</p>
</li>
<li>
<p>Security leaders face significant protection gaps, with over 50% of private company CISOs lacking <strong>indemnification</strong> policies or Directors &amp; Officers insurance, while public company CISOs generally receive better benefits and protections.</p>
</li>
</ul>
<p>Note: I've focused on the key compensation, diversity, and protection findings from the comprehensive survey, highlighting the most significant trends that security leaders should be aware of. The bold words emphasize critical aspects that organizations should consider when evaluating their security leadership structure and compensation packages.</p>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="global-infosec-salary-index-2025-released-with-head-of-security-leading-at-2615k"><a href="https://isecjobs.com/salaries/?ref=mandos.io">Global InfoSec Salary Index 2025 Released with Head of Security Leading at $261.5K</a></h3>
<ul>
<li>
<p>Dataset shows <strong>Head of Security</strong> and Director of Security as highest-paid roles, with median salaries of $261,500 and $257,500 respectively, based on community-sourced data from professionals worldwide.</p>
</li>
<li>
<p>The index reveals significant salary variations across 118 roles, with <strong>entry-level</strong> positions like SOC Analyst starting at $70,600, while specialized roles like Privacy Engineer command $200,000 median salaries.</p>
</li>
<li>
<p>Comprehensive data available through multiple channels including weekly updated <strong>GitHub</strong> repository and downloadable public domain dataset, with salary information from over 1,123 Security Engineers contributing to the index.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-share-mixed-views-on-certification-requirements-for-career-growth"><a href="https://www.reddit.com/r/cybersecurity/comments/1ikrzjz/am_i_in_the_wrong_career_if_i_dont_want_to_study/?ref=mandos.io">Cybersecurity Professionals Share Mixed Views on Certification Requirements for Career Growth</a></h3>
<ul>
<li>
<p>Industry veterans report successful careers without certifications, with multiple professionals having 10-30 years of experience in <strong>InfoSec</strong> roles while holding few or no certifications.</p>
</li>
<li>
<p>Continuous learning remains essential, but professionals emphasize that learning can occur through hands-on experience, <strong>practical implementation</strong>, and on-the-job training rather than formal certification.</p>
</li>
<li>
<p>Career advancement challenges include overcoming <strong>HR filters</strong> and employer mandates, with some organizations requiring specific certifications (like CISSP) for position retention or advancement, while others focus purely on demonstrated skills.</p>
</li>
</ul>
<h3 id="ai-tools-fuel-cybersecurity-job-demand-amid-rising-threats"><a href="https://www.businessinsider.nl/cybersecurity-jobs-are-in-high-demand-execs-in-the-field-explain-why/?ref=mandos.io">AI Tools Fuel Cybersecurity Job Demand Amid Rising Threats</a></h3>
<ul>
<li>
<p>AI accessibility has created new attack vectors, with threat actors leveraging AI for enhanced <strong>phishing</strong> campaigns and <strong>deepfakes</strong>, capable of generating convincing malicious content in minutes without requiring advanced technical skills.</p>
</li>
<li>
<p>Global cybersecurity workforce gap reaches <strong>4.8 million</strong> jobs in 2024, with positions taking 21% longer to fill than other IT roles due to rapidly evolving threat landscape and required skill sets.</p>
</li>
<li>
<p>Information security analyst employment projected to grow 33% by 2033, with Chief Information Security Officers (CISOs) earning up to <strong>$1 million</strong> annually as organizations prioritize defense against sophisticated cyber threats.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="meta-launches-ai-powered-software-testing-tool-for-automated-bug-detection"><a href="https://engineering.fb.com/2025/02/05/security/revolutionizing-software-testing-llm-powered-bug-catchers-meta-ach/?ref=mandos.io">Meta Launches AI-Powered Software Testing Tool for Automated Bug Detection</a></h3>
<ul>
<li>
<p>Meta's new <strong>Automated Compliance Hardening</strong> (ACH) tool combines <strong>LLM</strong> capabilities with mutation testing to automatically generate both realistic test cases and code mutations, focusing on specific types of faults rather than just code coverage.</p>
</li>
<li>
<p>The system has been successfully deployed across Meta's major platforms (Facebook Feed, Instagram, Messenger, WhatsApp) to detect and prevent <strong>privacy</strong> regressions by automatically generating tests from plain text descriptions of potential vulnerabilities.</p>
</li>
<li>
<p>Unlike traditional <strong>mutation testing</strong> approaches that rely on rule-based systems, ACH uses LLMs to create more realistic fault scenarios and automatically generates the corresponding test cases, significantly reducing manual effort while providing verifiable assurances of test effectiveness.</p>
</li>
</ul>
<h3 id="owasp-releases-llm-security-solutions-framework-for-ai-application-development"><a href="https://drive.google.com/file/d/1AqZ4JIZyEyW8RjONWl7DmPVdiB_3pBE2/view?usp=share_link&ref=mandos.io">OWASP Releases LLM Security Solutions Framework for AI Application Development</a></h3>
<ul>
<li>
<p>Document outlines security solutions landscape for <strong>LLM applications</strong>, targeting developers, AppSec teams, and security leaders with focus on four major application architectures: prompt-centric, AI agents, plugins/extensions, and complex applications.</p>
</li>
<li>
<p>Framework aligns with OWASP Top 10 for LLMs and CISO Governance Checklist, providing vendor-agnostic guidance on securing the complete <strong>AI lifecycle</strong> from development through deployment, addressing gaps in traditional security tools.</p>
</li>
<li>
<p>Emphasizes unique security challenges including <strong>prompt injection</strong>, data leakage, and unauthorized access, while maintaining a vendor-neutral stance to help organizations properly define business outcomes for <strong>LLMSecOps</strong> investments.</p>
</li>
</ul>
<h3 id="ai-model-repositories-and-infrastructure-face-multiple-security-threats"><a href="https://securityintelligence.com/articles/how-red-teaming-helps-safeguard-the-infrastructure-behind-ai-models/?ref=mandos.io">AI Model Repositories and Infrastructure Face Multiple Security Threats</a></h3>
<ul>
<li>
<p>Researchers found thousands of malicious files on <strong>Hugging Face</strong>, including compromised models capable of stealing credentials - in one case, attackers impersonated 23AndMe to distribute a model that stole AWS passwords.</p>
</li>
<li>
<p>AI model theft through <strong>extraction attacks</strong> is increasing, where attackers systematically query black-box models through APIs to collect enough data for reverse engineering, particularly targeting cloud-hosted systems.</p>
</li>
<li>
<p>Organizations must address "<strong>excessive agency</strong>" risks where AI systems have unnecessary permissions across integrated environments, while implementing proper access controls and conducting <strong>red team</strong> assessments to identify vulnerabilities in AI infrastructure.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="multiple-private-equity-firms-compete-to-acquire-trend-micro-in-potential-multi-billion-deal"><a href="https://siliconangle.com/2025/02/13/private-equity-firms-reportedly-competing-buy-cybersecurity-provider-trend-micro/?ref=mandos.io">Multiple Private Equity Firms Compete to Acquire Trend Micro in Potential Multi-Billion Deal</a></h3>
<ul>
<li>
<p>Major private equity firms including <strong>Bain</strong>, <strong>KKR</strong>, Advent International, and EQT AB have expressed interest in acquiring Japanese cybersecurity provider Trend Micro, which currently has a market cap of $8.54 billion.</p>
</li>
<li>
<p>Trend Micro's flagship platform Vision One protects over 500,000 organizations and 250 million devices, with recent quarterly <strong>revenue</strong> growth of 6% to $456 million and operating income increase of 42% to $99 million.</p>
</li>
<li>
<p>The company's shares jumped 16% following acquisition reports, though sources indicate Trend Micro may opt to remain <strong>independent</strong> rather than pursuing a sale.</p>
</li>
</ul>
<h3 id="cyberark-acquires-access-management-startup-zilla-security-for-165m"><a href="https://www.cyberark.com/press/cyberark-acquires-zilla-security-to-reshape-identity-governance-and-administration-for-the-modern-enterprise/?ref=mandos.io">CyberArk Acquires Access Management Startup Zilla Security for $165M</a></h3>
<ul>
<li>
<p>CyberArk enhances its identity security portfolio by acquiring Zilla Security, whose platform streamlines <strong>compliance</strong> processes through automated user access reviews and permission management for enterprise applications.</p>
</li>
<li>
<p>Zilla's technology helps implement <strong>separation-of-duties</strong> controls and automatically detects suspicious activities like unauthorized admin account creation, while also identifying potential access-related vulnerabilities.</p>
</li>
<li>
<p>The acquisition will result in two new standalone products - Zilla Comply and Zilla <strong>Provisioning</strong> - integrating with CyberArk's existing suite of secure access management solutions.</p>
</li>
</ul>
<h3 id="andesite-ai-launches-human-ai-security-operations-platform-with-23m-funding"><a href="https://siliconangle.com/2025/02/11/andesite-ai-raises-23m-brings-bionic-security-operations-center-market/?ref=mandos.io">Andesite AI Launches Human-AI Security Operations Platform with $23M Funding</a></h3>
<ul>
<li>
<p>New <strong>bionic</strong> SOC platform combines human expertise with AI to help security teams shift from reactive alert triaging to proactive threat hunting, while maintaining data within security boundaries.</p>
</li>
<li>
<p>Platform features include context-aware AI for data unification, evidentiary AI for decision tracking, and adaptive automation for streamlined <strong>workflows</strong>, meeting standards like SOC2 Type I and NIST AI Risk Management Framework.</p>
</li>
<li>
<p>Investment from General Catalyst and Red Cell Partners will support platform enhancement and expansion into key industries, addressing the challenge of overwhelming <strong>alerts</strong> and fragmented security tools that plague modern <strong>SOC</strong> teams.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="crowdstrike-charlotte-ai"><a href="https://cybersectools.com/tools/crowdstrike-charlotte-ai?ref=mandos.io">Crowdstrike Charlotte AI</a></h3>
<p>CrowdStrike Charlotte AI is a conversational AI assistant that accelerates security operations by automating tasks and providing faster intelligence through generative AI capabilities.</p>
<h3 id="whylabs-llm-security"><a href="https://cybersectools.com/tools/whylabs-llm-security?ref=mandos.io">WhyLabs LLM Security</a></h3>
<p>WhyLabs is a platform that provides security, monitoring, and observability capabilities for Large Language Models (LLMs) and AI applications, enabling teams to protect against malicious prompts, data leaks, misinformation, and other vulnerabilities.</p>
<h3 id="calypsoai"><a href="https://cybersectools.com/tools/calypsoai?ref=mandos.io">CalypsoAI</a></h3>
<p>CalypsoAI is a platform that provides centralized security, observability, and control for deploying and scaling large language models and generative AI across an enterprise.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #90:  Microsoft Outlook RCE, Cloud Security Certs, OpenAI EU Data Centers ]]></title>
        <description><![CDATA[ Major ASP.NET security breach affects thousands. AI platforms face new security challenges as malicious code discovered in ML models ]]></description>
        <link>https://mandos.io/newsletter/brief-90-microsoft-outlook-rce-cloud-security-certs-openai-eu-data-centers/</link>
        <guid isPermaLink="false">67a75623c2d0410001a82885</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 09 Feb 2025 13:00:26 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/6.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>Hope you're having a relaxing weekend! While you were busy wrapping up another hectic week, the security world kept spinning with some interesting developments I thought you'd want to know about.</p><ul><li>Zyxel devices are facing active exploitation through a new zero-day (heads up if you're using their CPE series!)</li><li>Hugging Face caught some sneaky malware hiding in ML models (yes, even AI platforms aren't safe)</li><li>Some good news for job seekers - SOC roles are still a solid way to break into security</li></ul><p>Plus updates on new tools, funding rounds, and more that caught my attention this week.</p><p>Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="zero-day-vulnerability-in-zyxel-cpe-devices-under-active-exploitation"><a href="https://www.greynoise.io/blog/active-exploitation-of-zero-day-zyxel-cpe-vulnerability-cve-2024-40891?ref=mandos.io">Zero-day Vulnerability in Zyxel CPE Devices Under Active Exploitation</a></h3>
<ul>
<li>
<p>Critical <strong>command injection</strong> vulnerability (CVE-2024-40891) affecting Zyxel CPE Series devices enables unauthenticated attackers to execute arbitrary commands through telnet, with over 1,500 devices exposed online.</p>
</li>
<li>
<p>The vulnerability has been incorporated into <strong>Mirai</strong> botnet variants, with researchers observing significant overlap between IPs exploiting this vulnerability and known Mirai infrastructure.</p>
</li>
<li>
<p>Currently <strong>unpatched</strong> vulnerability requires immediate attention - recommended mitigations include filtering unusual telnet requests to management interfaces, restricting admin interface access to trusted IPs, and disabling unused remote management features.</p>
</li>
</ul>
<h3 id="critical-microsoft-outlook-rce-vulnerability-cve-2024-21413-under-active-exploitation"><a href="https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-microsoft-outlook-now-exploited-in-attacks/?ref=mandos.io">Critical Microsoft Outlook RCE Vulnerability CVE-2024-21413 Under Active Exploitation</a></h3>
<ul>
<li>
<p>Newly discovered <strong>RCE vulnerability</strong> in Microsoft Outlook (CVE-2024-21413) allows attackers to bypass Protected View and execute malicious code through specially crafted email links using the file:// protocol.</p>
</li>
<li>
<p>The "Moniker Link" flaw affects multiple Office products and can lead to <strong>NTLM credential theft</strong> when users preview or open malicious emails, with the Preview Pane itself serving as an attack vector.</p>
</li>
<li>
<p>CISA has added this to their Known Exploited Vulnerabilities catalog, requiring federal agencies to patch by February 27, while strongly recommending private organizations to <strong>prioritize patching</strong> against ongoing attacks.</p>
</li>
</ul>
<h3 id="microsoft-discovers-3000-public-aspnet-machine-keys-used-in-viewstate-code-injection-attacks"><a href="https://www.microsoft.com/en-us/security/blog/2025/02/06/code-injection-attacks-using-publicly-disclosed-asp-net-machine-keys/?ref=mandos.io">Microsoft Discovers 3,000+ Public ASP.NET Machine Keys Used in ViewState Code Injection Attacks</a></h3>
<ul>
<li>
<p>Unattributed threat actor exploited publicly available ASP.NET machine key to deploy <strong>Godzilla</strong> post-exploitation framework through ViewState code injection, leading Microsoft to identify over 3,000 exposed machine keys in public repositories.</p>
</li>
<li>
<p>The attack leverages ViewState's Base64-encoded data field to inject malicious code, which gets executed when processed by ASP.NET Runtime due to matching <strong>ValidationKey</strong> and <strong>DecryptionKey</strong> values.</p>
</li>
<li>
<p>Microsoft recommends immediate key rotation, released detection scripts on Github, and warns that compromised servers may require complete <strong>reformatting</strong> due to potential backdoors even after key rotation.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="dspm-implementation-success-requires-focus-on-three-critical-kpi-categories"><a href="https://www.wiz.io/blog/dspm-kpis?ref=mandos.io">DSPM Implementation Success Requires Focus on Three Critical KPI Categories</a></h3>
<ul>
<li>
<p>Track <strong>critical issues</strong> by monitoring toxic combinations of vulnerabilities, misconfigurations, and access paths that could lead attackers to sensitive data. This helps prioritize remediation efforts on the most severe attack paths requiring immediate attention.</p>
</li>
<li>
<p>Monitor data exposure through measuring the percentage of exposed critical data, which helps identify potential breach risks and enables targeted fixes. Focus on implementing proper <strong>access governance</strong> controls to ensure only authorized users can reach sensitive information.</p>
</li>
<li>
<p>Maintain strong <strong>compliance</strong> posture scores against relevant industry standards (like GDPR, HIPAA) through continuous monitoring and automated assessment of regulatory requirements, helping avoid penalties while building customer trust.</p>
</li>
</ul>
<h3 id="open-source-cybersecurity-products-face-three-key-monetization-paths"><a href="https://ventureinsecurity.net/p/will-the-next-wave-of-cybersecurity?ref=mandos.io">Open Source Cybersecurity Products Face Three Key Monetization Paths</a></h3>
<ul>
<li>
<p><strong>Enterprises</strong> are hesitant to adopt security startups due to data sensitivity concerns, leading companies to choose between massive VC funding, server-hosted products, or the open source route.</p>
</li>
<li>
<p>Companies can monetize open source security tools through three main approaches: selling <strong>centralization</strong> features, offering <strong>SaaS</strong> versions, or providing support and consultancy services.</p>
</li>
<li>
<p>Real-world success stories include Workbrew's enterprise version of Homebrew, <strong>Fleet</strong> and Kolide building upon osquery, demonstrating how open source projects can evolve into commercial security products.</p>
</li>
</ul>
<h3 id="2024-saw-20-increase-in-publicly-reported-vulnerability-exploits"><a href="https://vulncheck.com/blog/2024-exploitation-trends?ref=mandos.io">2024 Saw 20% Increase in Publicly Reported Vulnerability Exploits</a></h3>
<ul>
<li>
<p>A total of <strong>768</strong> CVEs were reported as exploited in the wild in 2024, marking a 20% increase from 2023's 639 cases, with 112 unique sources providing initial evidence.</p>
</li>
<li>
<p>Analysis shows that <strong>23.6%</strong> of Known Exploited Vulnerabilities (KEVs) were exploited on or before their CVE disclosure date, slightly down from 27% in 2023, challenging the focus on zero-day threats.</p>
</li>
<li>
<p>Monthly exploitation reports maintained a baseline of 30-50 vulnerabilities, with notable <strong>spikes</strong> occurring during specific industry events and following the introduction of new reporting resources.</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="wiz-launches-cloud-security-certification-program-for-industry-professionals"><a href="https://www.wiz.io/blog/introducing-wiz-certified?ref=mandos.io">Wiz Launches Cloud Security Certification Program for Industry Professionals</a></h3>
<ul>
<li>
<p>Wiz introduces new <strong>certification</strong> program starting with Cloud Fundamentals exam, designed to validate expertise in Wiz Cloud technology deployment and management for customers, partners, and security professionals.</p>
</li>
<li>
<p>Program addresses growing demand for cloud security expertise, citing research showing 57% of companies use multiple cloud platforms and 50% have <strong>exposed</strong> databases or storage buckets.</p>
</li>
<li>
<p>Future specialized exams will build upon the Cloud Fundamentals certification, creating a comprehensive <strong>professional development</strong> path for cloud security practitioners seeking to demonstrate their expertise.</p>
</li>
</ul>
<h3 id="cybersecurity-job-market-requires-experience-over-certifications-soc-roles-serve-as-entry-point"><a href="https://www.reddit.com/r/cybersecurity/comments/1ikbs96/degrees_and_certs_are_not_a_replacement_for/?ref=mandos.io">Cybersecurity Job Market Requires Experience Over Certifications, SOC Roles Serve as Entry Point</a></h3>
<ul>
<li>
<p>Practical experience and <strong>infrastructure</strong> knowledge are more valuable than degrees or certifications alone, with SOC Analyst and Support roles serving as foundational stepping stones for advanced positions.</p>
</li>
<li>
<p>Current market is experiencing <strong>oversaturation</strong> at entry-level, particularly for SOC analysts without infrastructure experience, while security engineering positions remain in high demand.</p>
</li>
<li>
<p>Alternative pathways include starting in <strong>help desk</strong> or IT roles, leveraging internal transfers, and focusing on industries outside tech - such as retail and state finance housing authorities which are actively recruiting for junior security positions.</p>
</li>
</ul>
<h3 id="soc-lead-interview-experience-highlights-toxic-hiring-practices-in-cybersecurity"><a href="https://www.reddit.com/r/cybersecurity/comments/1ij7paa/got_rejected_in_the_middle_of_the_interview/?ref=mandos.io">SOC Lead Interview Experience Highlights Toxic Hiring Practices in Cybersecurity</a></h3>
<ul>
<li>
<p>Candidate with years of SOC experience was dismissed during interview primarily due to lack of knowledge in a specific <strong>tool</strong>, despite broader security expertise and transferable skills.</p>
</li>
<li>
<p>Community response emphasizes this as a red flag, noting that strong SOC leaders should be evaluated on <strong>leadership</strong> capabilities and fundamental security knowledge rather than tool-specific expertise.</p>
</li>
<li>
<p>Multiple security professionals shared similar experiences, suggesting some organizations use undisclosed tool requirements as a pretense for having pre-selected internal candidates or attempting to find exact replicas of departing <strong>SMEs</strong>.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="malicious-python-code-found-in-ml-models-on-hugging-face-platform"><a href="https://www.reversinglabs.com/blog/rl-identifies-malware-ml-model-hosted-on-hugging-face?ref=mandos.io">Malicious Python Code Found in ML Models on Hugging Face Platform</a></h3>
<ul>
<li>
<p>ReversingLabs discovered "<strong>nullifAI</strong>" attack technique using broken <strong>Pickle</strong> files to distribute malware through ML models, bypassing Hugging Face's security scanning by exploiting file validation weaknesses.</p>
</li>
<li>
<p>The malicious models contained <strong>reverse shell</strong> payloads that execute before the corrupted Pickle file fails to load, connecting to hardcoded IP addresses while evading detection from Hugging Face's Picklescan security tool.</p>
</li>
<li>
<p>After responsible disclosure, Hugging Face removed the malicious models within 24 hours and updated their scanning tools, but researchers warn that Pickle's inherent security weaknesses make it fundamentally risky for <strong>collaborative platforms</strong> sharing untrusted code.</p>
</li>
</ul>
<h3 id="aws-outlines-data-authorization-framework-for-generative-ai-applications"><a href="https://aws.amazon.com/blogs/security/implement-effective-data-authorization-mechanisms-to-secure-your-data-used-in-generative-ai-applications-part-2/?ref=mandos.io">AWS Outlines Data Authorization Framework for Generative AI Applications</a></h3>
<ul>
<li>
<p>Four key locations for sensitive data management in GenAI apps: <strong>LLM training</strong>, vector databases, tools, and agents - each requiring distinct authorization approaches.</p>
</li>
<li>
<p>RAG implementations should enforce authorization before sending data to LLMs, with options for both application-level and <strong>metadata filtering</strong> to control access to sensitive information.</p>
</li>
<li>
<p>Data governance across visibility, access control, quality and ownership is critical, with AWS services like <strong>DataZone</strong> and Lake Formation helping manage sensitive data authorization.</p>
</li>
</ul>
<h3 id="openai-launches-european-data-residency-for-enterprise-services"><a href="https://openai.com/index/introducing-data-residency-in-europe/?ref=mandos.io">OpenAI Launches European Data Residency for Enterprise Services</a></h3>
<ul>
<li>
<p>OpenAI introduces <strong>data residency</strong> options in Europe for ChatGPT Enterprise, ChatGPT Edu, and API Platform, allowing organizations to meet local data <strong>sovereignty</strong> requirements while maintaining zero data retention for API requests.</p>
</li>
<li>
<p>The platform implements enterprise-grade security measures including <strong>AES-256</strong> encryption for data at rest and TLS 1.2+ for data in transit, with a strict policy of not training models on customer data unless explicitly opted in.</p>
</li>
<li>
<p>The service supports <strong>GDPR</strong> compliance and includes a comprehensive Data Processing Addendum, currently serving major European organizations like Booking.com, BBVA, Zalando, and Oxford University.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="axoflow-secures-7m-seed-funding-for-security-data-management-platform"><a href="https://www.morningstar.com/news/business-wire/20250122676193/axoflow-raises-7m-seed-round-led-by-ebrd-to-unlock-high-quality-security-data-and-reduce-siem-costs?ref=mandos.io">Axoflow Secures $7M Seed Funding for Security Data Management Platform</a></h3>
<ul>
<li>
<p>Company founded by creator of <strong>syslog-ng</strong> launches platform to automatically discover, classify, parse, normalize, and enrich security data, promising over 50% reduction in data volume and associated costs.</p>
</li>
<li>
<p>Platform focuses on improving data quality through automated <strong>data curation</strong> pipeline, eliminating need for manual coding while preventing "invisible data loss" - a critical concern for compliance in regulated industries.</p>
</li>
<li>
<p>Solution targets enterprises with hybrid environments, supporting both <strong>cloud</strong> and <strong>on-premises</strong> deployments, with early adoption by large enterprise customers and demonstrations planned for RSA Conference and Gartner Risk and Security Summit.</p>
</li>
</ul>
<h3 id="dune-security-raises-6m-seed-round-for-ai-powered-risk-management-platform"><a href="https://www.leadsontrees.com/news/dune-security-secures-6m-seed-funding-for-revolutionary-user-adaptive-risk-management-platform?ref=mandos.io">Dune Security Raises $6M Seed Round for AI-Powered Risk Management Platform</a></h3>
<ul>
<li>
<p>Company secured funding from multiple investors including Craft Ventures and Alumni Ventures to develop their <strong>adaptive</strong> security platform that quantifies and manages employee-related security risks.</p>
</li>
<li>
<p>Platform uses <strong>artificial intelligence</strong> to identify high-risk users and automatically implement tailored security controls and training interventions based on individual behavior patterns.</p>
</li>
<li>
<p>Solution integrates with existing security infrastructure to help enterprises address the human element of cybersecurity through <strong>behavioral</strong> analytics and dynamic <strong>risk assessment</strong>.</p>
</li>
</ul>
<h3 id="threatmate-secures-32m-seed-funding-for-ai-powered-attack-surface-management-platform"><a href="https://www.securityweek.com/threatmate-raises-3-2-million-for-attack-surface-management-platform/?ref=mandos.io">ThreatMate Secures $3.2M Seed Funding for AI-Powered Attack Surface Management Platform</a></h3>
<ul>
<li>
<p>The Delaware-based startup's platform leverages <strong>artificial intelligence</strong> to provide enterprise-grade cyber protection specifically designed for MSPs serving small to medium-sized businesses, offering comprehensive visibility through a single dashboard.</p>
</li>
<li>
<p>Platform capabilities include automated penetration testing, risk scoring, <strong>dark web</strong> monitoring, and asset discovery, with multi-tenant design enabling MSPs to monitor internal, external, and <strong>cloud</strong> environments.</p>
</li>
<li>
<p>Investment led by Top Down Ventures' Founders Fund I will accelerate product development and expand <strong>go-to-market</strong> operations, with additional backing from Blu Ventures and Runtime Ventures.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="drata"><a href="https://cybersectools.com/tools/drata?ref=mandos.io">Drata</a></h3>
<p>Drata is a cloud-based platform that automates security and compliance processes, evidence collection, and audit preparation for various industry standards and regulations.</p>
<h3 id="logrhythm-axon"><a href="https://cybersectools.com/tools/sentinelone-purple-ai?ref=mandos.io">LogRhythm Axon</a></h3>
<p>A cloud-native SIEM platform that provides security analytics, intuitive workflow, and simplified incident response to help security teams defend against cyber threats.</p>
<h3 id="tessian"><a href="https://cybersectools.com/tools/tessian?ref=mandos.io">Tessian</a></h3>
<p>Tessian is an AI-powered cloud email security solution that protects against advanced phishing, account compromise, data exfiltration, and helps coach users on email security.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #89: DeepSeek AI Breach, TeamViewer Zero-Day, AWS Security Automation ]]></title>
        <description><![CDATA[ Critical vulnerabilities in TeamViewer and Apple M-Series chips expose millions to attacks. ESXi ransomware actors evolve tactics using SSH tunneling ]]></description>
        <link>https://mandos.io/newsletter/brief-89-deepseek-ai-breach-teamviewer-zero-day-aws-security-automation/</link>
        <guid isPermaLink="false">679de7aa726dab0001587c54</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 02 Feb 2025 13:00:03 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/5-1.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>Hope you're enjoying your weekend! While you were busy wrapping up another week, the security world kept spinning with some pretty interesting developments. Here's what caught my attention:</p><ul><li>Apple's M-series processors have a couple of sneaky new vulnerabilities that let attackers steal data right through your browser</li><li>An AWS engineer built something cool - an AI tool that automatically generates security guardrails for Terraform</li><li>A quarter of CISOs are thinking about switching careers due to burnout (we need to talk about this!)</li></ul><p>Plus plenty more stories that'll make you go "hmmm..." Grab your favorite Sunday beverage and dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="teamviewer-patches-privilege-escalation-vulnerability-in-windows-client"><a href="https://www.securityweek.com/teamviewer-patches-high-severity-vulnerability-in-windows-applications/?ref=mandos.io">TeamViewer Patches Privilege Escalation Vulnerability in Windows Client</a></h3>
<ul>
<li>
<p>High-severity vulnerability (<strong>CVE-2025-0065</strong>) with <strong>CVSS 7.8</strong> discovered in TeamViewer's Windows applications, allowing local attackers to perform argument injection in 'TeamViewer_service.exe' for privilege escalation.</p>
</li>
<li>
<p>Affects multiple versions (11.x through 15.x) of TeamViewer Full Client and Host applications. Fixed in versions 15.62, 14.7.48799, 13.2.36226, 12.0.259319, and 11.0.259318.</p>
</li>
<li>
<p>No evidence of <strong>exploitation</strong> in wild, but TeamViewer has history of being targeted by threat actors for remote access and <strong>malware</strong> deployment in attacks.</p>
</li>
</ul>
<h3 id="apple-m-series-cpus-vulnerable-to-new-side-channel-attacks-flop-and-slap"><a href="https://www.bleepingcomputer.com/news/security/new-apple-cpu-side-channel-attack-steals-data-from-browsers/?ref=mandos.io">Apple M-Series CPUs Vulnerable to New Side-Channel Attacks FLOP and SLAP</a></h3>
<ul>
<li>
<p>Researchers discovered two new <strong>side-channel</strong> vulnerabilities affecting Apple M2/M3/A15/A17 processors, allowing attackers to steal sensitive data through malicious websites using JavaScript or WebAssembly without requiring malware installation.</p>
</li>
<li>
<p>The attacks (FLOP and SLAP) exploit flaws in <strong>speculative execution</strong> implementations to bypass browser sandboxing and steal cross-origin data from Safari and Chrome, including email contents, calendar events, and location history.</p>
</li>
<li>
<p>While Apple acknowledged the vulnerabilities reported in March and September 2024, they remain <strong>unpatched</strong> but claim there is no immediate risk to users. The only current mitigation is disabling JavaScript, which impacts website functionality.</p>
</li>
</ul>
<h3 id="esxi-ransomware-attackers-exploit-ssh-tunneling-for-stealth-persistence"><a href="https://www.sygnia.co/blog/esxi-ransomware-ssh-tunneling-defense-strategies/?ref=mandos.io">ESXi Ransomware Attackers Exploit SSH Tunneling for Stealth Persistence</a></h3>
<ul>
<li>
<p>Threat actors are targeting <strong>VMware</strong> ESXi infrastructure not just for ransomware deployment, but also as network pivot points using SSH tunneling techniques to avoid detection while moving laterally through networks.</p>
</li>
<li>
<p>Attackers gain initial access through stolen admin credentials or by exploiting vulnerabilities, then establish persistence using native SSH functionality for remote port-forwarding to <strong>C2</strong> servers, taking advantage of ESXi's high uptime.</p>
</li>
<li>
<p>ESXi's distributed logging system complicates forensic investigation, but key detection opportunities exist in monitoring <strong>syslog</strong> files for suspicious activities like SSH service enabling, firewall rule modifications, and unusual port forwarding commands.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="aws-engineer-develops-ai-powered-security-guardrails-generator-for-terraform"><a href="https://naman16.github.io/cloud-security/AWS%20Security%20Guardrails%20%26%20Terraform/?ref=mandos.io">AWS Engineer Develops AI-Powered Security Guardrails Generator for Terraform</a></h3>
<ul>
<li>
<p>Created a Python-based automation framework that uses <strong>Claude 3.5</strong> to transform security requirements from Checkov and Prowler into comprehensive AWS service security guidelines and corresponding <strong>Terraform</strong> modules.</p>
</li>
<li>
<p>The solution consists of two main components: a Requirements Generator that consolidates scanning tool outputs, and a Terraform Creator that automatically generates secure, reusable <strong>IaC</strong> modules with built-in security controls.</p>
</li>
<li>
<p>Implementation focuses on reducing engineering burden through "secure-by-design" principles, enabling teams to inherit security best practices through standardized modules while maintaining flexibility for <strong>customization</strong> across different cloud providers and requirements.</p>
</li>
</ul>
<h3 id="wiz-cto-shares-insights-on-top-container-security-challenges-in-2025-ama"><a href="https://www.reddit.com/r/cybersecurity/comments/1iba3cp/im_the_cto_of_container_security_at_wiz_ama/?ref=mandos.io">Wiz CTO Shares Insights on Top Container Security Challenges in 2025 AMA</a></h3>
<ul>
<li>
<p><strong>RBAC</strong> and identity management remain critical vulnerabilities, with default Kubernetes networking allowing unrestricted Pod-to-Node communication and widespread use of embedded long-lived secrets in container images.</p>
</li>
<li>
<p>Container image security coverage is a major challenge at scale, particularly in tracing vulnerabilities back to source code and ensuring proper <strong>signing</strong> and scanning policies are enforced before deployment.</p>
</li>
<li>
<p>The rise of AI workloads introduces new risks around model security, with researchers uncovering patterns of <strong>lateral movement</strong> between AI infrastructure components and <strong>resource hijacking</strong> for cryptomining activities.</p>
</li>
</ul>
<h3 id="software-development-environments-show-universal-high-risk-security-issues-in-2025-report"><a href="https://drive.google.com/file/d/1PfdabdiAoaqa-305059wPT0crzJ-CPFN/view?usp=share_link&ref=mandos.io">Software Development Environments Show Universal High-Risk Security Issues in 2025 Report</a></h3>
<ul>
<li>
<p>100% of organizations have <strong>exposed secrets</strong> in their development environments, with 36% of secrets found outside source code in tickets, logs, and artifacts. On average, 33% of repositories contain exposed secrets.</p>
</li>
<li>
<p><strong>AI security</strong> emerges as a significant concern with 46% of organizations using AI models in source code in risky ways, while <strong>misconfigurations</strong> affect 89% of organizations' pipelines.</p>
</li>
<li>
<p>Security testing shows major inefficiencies with 78% of organizations having duplicate <strong>SCA scanners</strong> and 85% having least privilege violations, while compliance rates with security frameworks range from just 33% (OWASP CI/CD) to 76% (ISO).</p>
</li>
</ul>
<div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">📖</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Discover my collection of industry reports, guides and cheat sheets in </strong></b>‣ <a href="https://mandos.io/cyber-strategy-os/"><b><strong style="white-space: pre-wrap;">Cyber Strategy OS</strong></b></a><b><strong style="white-space: pre-wrap;">.</strong></b></div></div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ciso-burnout-drives-25-to-consider-leaving-profession-survey-shows"><a href="https://www.csoonline.com/article/3814554/how-cisos-can-fight-burnout-and-extend-their-careers.html?ref=mandos.io">CISO Burnout Drives 25% to Consider Leaving Profession, Survey Shows</a></h3>
<ul>
<li>
<p>BlackFog survey reveals 1 in 4 CISOs contemplate career change due to <strong>burnout</strong> and challenging work conditions, with most working 16.5 extra hours weekly while facing 24/7 on-call responsibilities</p>
</li>
<li>
<p>Key stressors include lack of authority despite full accountability, limited C-suite visibility, and increasing cyber threats from <strong>AI-powered</strong> attacks while dealing with resource constraints</p>
</li>
<li>
<p>Industry experts recommend negotiating better employment terms including <strong>D&amp;O liability</strong> protection, developing business communication skills, and prioritizing mental health to extend CISO careers</p>
</li>
</ul>
<h3 id="cybersecurity-career-survey-shows-strong-emphasis-on-software-development-skills-and-work-life-balance"><a href="https://www.reddit.com/r/cybersecurity/comments/1i9gn80/what_would_have_you_done_differently/?ref=mandos.io">Cybersecurity Career Survey Shows Strong Emphasis on Software Development Skills and Work-Life Balance</a></h3>
<ul>
<li>
<p><strong>Software engineering</strong> skills are increasingly vital for security roles, with multiple professionals noting that learning to code before transitioning to security provides significant career advantages, particularly in tech companies.</p>
</li>
<li>
<p>Career longevity and advancement are hindered by excessive <strong>company loyalty</strong>, with multiple respondents reporting 7-17 year tenures ending in layoffs despite dedicated service and strong performance.</p>
</li>
<li>
<p>Professionals emphasize the importance of maintaining proper <strong>work-life boundaries</strong>, noting that long on-call periods and 60-80 hour workweeks led to burnout without proportional career benefits.</p>
</li>
</ul>
<h3 id="redditors-share-2024-cybersecurity-salaries"><a href="https://www.reddit.com/r/cybersecurity/comments/1ia1iuu/2024_end_of_year_salary_sharing_thread/?ref=mandos.io">Redditors Share 2024 Cybersecurity Salaries</a></h3>
<ul>
<li>
<p>Entry-level positions like SOC Analysts and Security Engineer roles range from <strong>$75K-95K</strong> base salary, with internships around <strong>$47K</strong>. Most common certifications at this level include Security+ and CySA+.</p>
</li>
<li>
<p>Mid-level positions with 3-5 years experience like Senior Security Engineers and Detection Engineers earn <strong>$100K-150K</strong> base salary. Common requirements include hands-on experience and certifications like <strong>CISSP</strong>.</p>
</li>
<li>
<p>Senior and leadership positions like Intelligence Analysts at FAANG companies can reach <strong>$300K+</strong> total compensation including base salary, bonuses and stock options. Career progression focuses more on networking and reputation than certifications.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="deepseek-ai-services-expose-sensitive-data-through-unsecured-clickhouse-database"><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak?ref=mandos.io">DeepSeek AI Services Expose Sensitive Data Through Unsecured ClickHouse Database</a></h3>
<ul>
<li>
<p>Wiz Research discovered an unauthenticated <strong>ClickHouse</strong> database belonging to DeepSeek AI, containing over 1 million log entries including chat histories, API secrets, and backend details accessible through ports 8123 and 9000.</p>
</li>
<li>
<p>The exposed database allowed full control over operations with no authentication required, potentially enabling attackers to execute <strong>arbitrary SQL queries</strong> and access sensitive information through the database's web interface.</p>
</li>
<li>
<p>The breach impacted DeepSeek's <strong>oauth2callback</strong> and <strong>dev</strong> subdomains, exposing log streams dating from January 6, 2025, before being promptly secured after responsible disclosure by Wiz Research.</p>
</li>
</ul>
<h3 id="google-releases-risk-assessment-framework-for-ai-prompt-injection-attacks"><a href="https://security.googleblog.com/2025/01/how-we-estimate-risk-from-prompt.html?ref=mandos.io">Google Releases Risk Assessment Framework for AI Prompt Injection Attacks</a></h3>
<ul>
<li>
<p>Google has developed a new methodology to evaluate <strong>prompt injection</strong> risks in AI systems, focusing on both direct attacks and more sophisticated indirect manipulation attempts.</p>
</li>
<li>
<p>The framework uses a systematic approach to assess potential <strong>attack vectors</strong>, including analyzing user input boundaries, model behavior patterns, and application-specific vulnerabilities in AI deployments.</p>
</li>
<li>
<p>Research findings emphasize the importance of implementing robust <strong>input validation</strong> controls and maintaining clear documentation of model interactions to prevent unauthorized prompt manipulation across different <strong>deployment scenarios</strong>.</p>
</li>
</ul>
<h3 id="ai-research-shows-autonomous-offensive-security-agent-successfully-exploiting-systems"><a href="https://drive.google.com/file/d/1KZnAL-OHbpDPr7vEjt_gsypMHgMPl2-T/view?ref=mandos.io">AI Research Shows Autonomous Offensive Security Agent Successfully Exploiting Systems</a></h3>
<ul>
<li>
<p><strong>Autonomous</strong> agent ReaperAI demonstrated ability to identify and exploit vulnerabilities on Hack The Box platform by leveraging GPT-4 and task-driven <strong>penetration testing</strong> frameworks.</p>
</li>
<li>
<p>Research implemented novel approaches including <strong>RAG</strong> (Retrieval Augmented Generation) for enhanced memory/context and structured task trees to guide decision-making and command generation.</p>
</li>
<li>
<p>While successful in controlled environments, key challenges remain around command parsing, error handling, and maintaining ethical constraints, highlighting areas needed for future <strong>enhancement</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="seraphic-security-raises-29m-for-enterprise-browser-security-solution"><a href="https://siliconangle.com/2025/01/30/seraphic-raises-29m-secure-browsers-enterprise/?ref=mandos.io">Seraphic Security Raises $29M for Enterprise Browser Security Solution</a></h3>
<ul>
<li>
<p>Company secured Series A funding led by GreatPoint Ventures, with participation from <strong>CrowdStrike's</strong> Falcon Fund, to expand their browser security solution that protects against <strong>zero-day</strong> exploits and HTML smuggling attacks.</p>
</li>
<li>
<p>Technology implements a unique JavaScript-based browser agent using <strong>Moving Target Defense</strong> strategy, working independently of threat intelligence feeds while maintaining user experience and preventing data exfiltration.</p>
</li>
<li>
<p>Solution addresses security gaps in <strong>SaaS</strong> environments by providing granular admin controls, dynamic data masking, and session watermarking, while supplementing existing security service edge deployments with zero-trust network access principles.</p>
</li>
</ul>
<h3 id="tenable-acquires-vulcan-cyber-for-150m-to-enhance-exposure-management-platform"><a href="https://www.securityweek.com/tenable-to-acquire-vulcan-cyber-for-150-million/?ref=mandos.io">Tenable Acquires Vulcan Cyber for $150M to Enhance Exposure Management Platform</a></h3>
<ul>
<li>
<p>Tenable will acquire Vulcan Cyber in a <strong>$147M</strong> cash and $3M stock deal, expected to close in Q1 2025, strengthening their exposure management capabilities.</p>
</li>
<li>
<p>Integration will provide customers with enhanced risk <strong>consolidation</strong> across 100+ security products, along with AI-powered prioritization and automated remediation workflows.</p>
</li>
<li>
<p>The acquisition follows Tenable's strategic growth pattern, coming after their <strong>$30M</strong> purchase of Eureka Security, as part of broader industry consolidation in the <strong>exposure management</strong> space.</p>
</li>
</ul>
<h3 id="cybersecurity-startup-exits-now-require-double-the-revenue-and-triple-the-funding-compared-to-covid-era"><a href="https://drive.google.com/file/d/1Xl6T1oH-1rLNgO_CCLdxA5VUHE5GF137/view?usp=share_link&ref=mandos.io">Cybersecurity Startup Exits Now Require Double the Revenue and Triple the Funding Compared to COVID Era</a></h3>
<ul>
<li>
<p>Modern cybersecurity startups need to reach <strong>$375M</strong> in annual recurring revenue before exit - nearly double the COVID-era benchmark of $194M, according to new research from Acrew Capital.</p>
</li>
<li>
<p><strong>Funding</strong> requirements have skyrocketed, with current private cybersecurity startups averaging $717M in capital raised compared to $301M during COVID era and just $6M in the Dot-Com era.</p>
</li>
<li>
<p>Despite increased financial demands, the average time to <strong>exit</strong> remains stable at 11-12 years, while companies must demonstrate both strong revenue growth and <strong>innovation</strong> to attract acquisition opportunities or achieve IPO.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="inlyse"><a href="https://cybersectools.com/tools/inlyse?ref=mandos.io">Inlyse</a></h3>
<p>A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds</p>
<h3 id="mindgardai"><a href="https://cybersectools.com/tools/mindgardai?ref=mandos.io">MindgardAI</a></h3>
<p>Mindgard is a continuous automated red teaming platform that enables security teams to identify and remediate vulnerabilities in AI systems, including generative AI and large language models.</p>
<h3 id="vectra-ai"><a href="https://cybersectools.com/tools/vectra-ai?ref=mandos.io">Vectra AI</a></h3>
<p>Vectra AI offers an AI-driven Attack Signal Intelligence platform that uses advanced machine learning to detect and respond to cyber threats across hybrid cloud environments.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #88: PayPal Security Fine, Cisco&#x27;s AI-SOC, Critical Palo Alto Vulnerabilities ]]></title>
        <description><![CDATA[ Subaru&#39;s admin panel flaw enabled unauthorized vehicle control. ChatGPT crawler vulnerability enables DDoS attacks. ]]></description>
        <link>https://mandos.io/newsletter/brief-88-paypal-security-fine-ciscos-ai-soc-critical-palo-alto-vulnerabilities/</link>
        <guid isPermaLink="false">6794a60ddad444000172560e</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 26 Jan 2025 13:00:53 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/4.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Hope you're enjoying your weekend! While you were busy wrapping up another week, the cybersecurity world served up some interesting developments that I think you'll want to know about.</p><ul><li>PayPal got hit with a $2M fine after credential stuffing attacks exposed customer SSNs (yikes!)</li><li>MIT researchers just dropped a massive AI risk database with 1000+ scenarios to keep us up at night</li><li>Cisco's showing us how to build smarter SOCs with their new telemetry-first approach</li></ul><p>Plus plenty more stories.</p><p>Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="paypal-fined-2m-for-cybersecurity-failures-exposing-customer-ssns-in-2022"><a href="https://www.reuters.com/technology/paypal-fined-by-new-york-cybersecurity-failures-2025-01-23?ref=mandos.io">PayPal Fined $2M for Cybersecurity Failures Exposing Customer SSNs in 2022</a></h3>
<ul>
<li>
<p>PayPal's inadequate cybersecurity controls led to exposure of customer <strong>PII</strong> through <strong>credential stuffing</strong> attacks, allowing criminals to access federal tax forms for tens of thousands of customers over a 7-week period.</p>
</li>
<li>
<p>The breach was discovered after a security analyst found "PP EXPLOIT TO GET SSN" message online, followed by a spike in platform access attempts. The vulnerability emerged after PayPal modified data flows to expand tax form accessibility.</p>
</li>
<li>
<p>New York DFS investigation revealed PayPal lacked qualified <strong>cybersecurity</strong> staff and proper training. The company has since implemented <strong>MFA</strong>, CAPTCHA controls, and forced password resets on affected accounts to prevent unauthorized access.</p>
</li>
</ul>
<h3 id="multiple-critical-firmware-vulnerabilities-found-in-palo-alto-networks-security-appliances"><a href="https://eclypsium.com/blog/pandoras-box-vulns-in-security-appliances/?ref=mandos.io">Multiple Critical Firmware Vulnerabilities Found in Palo Alto Networks Security Appliances</a></h3>
<ul>
<li>
<p>Researchers discovered <strong>BootHole</strong> vulnerability (CVE-2020-10713) affecting multiple Palo Alto NGFW models (PA-3260, PA-415, PA-1410), allowing attackers to bypass Secure Boot protections and potentially install malicious bootloaders.</p>
</li>
<li>
<p>PA-3260 model contains 6 high-severity vulnerabilities in InsydeH2O <strong>firmware</strong>, including <strong>SMM</strong> code flaws that could enable privilege escalation and security bypass, with CVSS scores of up to 8.2.</p>
</li>
<li>
<p>Newer PA-1410 and PA-415 models affected by <strong>PixieFail</strong> vulnerabilities enabling remote code execution through DHCPv6 exploitation during network boot process, with additional TPM and flash access control weaknesses discovered.</p>
</li>
</ul>
<h3 id="subaru-starlink-admin-panel-vulnerability-allowed-unauthorized-vehicle-control"><a href="https://www.securityweek.com/subaru-starlink-vulnerability-exposed-cars-to-remote-hacking/?ref=mandos.io">Subaru Starlink Admin Panel Vulnerability Allowed Unauthorized Vehicle Control</a></h3>
<ul>
<li>
<p>Security researchers discovered a <strong>vulnerability</strong> in Subaru's Starlink admin portal that allowed password resets without verification, bypassing two-factor authentication and exposing customer accounts across US, Canada, and Japan.</p>
</li>
<li>
<p>Unauthorized access to the admin panel exposed sensitive data including vehicle VIN numbers, location history, and customer <strong>PII</strong> including billing information, phone numbers, and addresses.</p>
</li>
<li>
<p>The flaw enabled complete <strong>remote control</strong> of vehicles through unauthorized user addition, allowing attackers to start, stop, lock, and unlock cars without owner notification. Subaru patched the vulnerability within 24 hours of disclosure.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Tired of being in security tranches?</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the critical insights and strategies you need to stay ahead with Mandos Brief, a 10-minute weekly newsletter trusted by industry leaders.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisco-outlines-ai-native-soc-framework-with-telemetry-first-approach-and-taap-integration"><a href="https://blogs.cisco.com/customerexperience/expanding-the-foundation-of-ai-native-socs-mastering-holistic-data-integration?ref=mandos.io">Cisco Outlines AI-Native SOC Framework with Telemetry-First Approach and TaaP Integration</a></h3>
<ul>
<li>
<p>Cisco introduces <strong>Telemetry-First Design</strong> as a foundational principle for AI-Native SOCs, emphasizing comprehensive data collection and contextualization before implementing AI tools or automation.</p>
</li>
<li>
<p>New <strong>TaaP</strong> (Telemetry as a Platform) concept transforms security operations by unifying all data sources into a single platform, enabling real-time threat detection and automated response capabilities.</p>
</li>
<li>
<p>Cisco's recent <strong>Splunk</strong> integration creates a unified data fabric across networks and applications, establishing a foundation for multi-domain observability and enhanced <strong>threat detection</strong>.</p>
</li>
</ul>
<h3 id="non-human-identity-management-report-details-growing-security-risks-and-market-evolution"><a href="https://nhimg.org/the-ultimate-guide-to-non-human-identities?ref=mandos.io">Non-Human Identity Management Report Details Growing Security Risks and Market Evolution</a></h3>
<ul>
<li>
<p><strong>Identity sprawl</strong> poses major risks with non-human identities (NHIs) now outnumbering human identities by 25-50x, leading to 80% of identity-related breaches involving compromised service accounts, API keys and machine credentials.</p>
</li>
<li>
<p>Organizations face critical challenges including plain-text credentials in code, lack of rotation, over-privileged accounts, and inadequate monitoring, with only 15% confident in their ability to secure NHIs. The rise of <strong>GenAI</strong> and cloud services is accelerating these risks.</p>
</li>
<li>
<p>The NHI security market saw explosive growth in 2024 with ~$400M in VC funding and major acquisitions like CyberArk's $1.54B purchase of Venafi, as vendors rush to address gaps in <strong>lifecycle management</strong> and real-time threat prevention capabilities.</p>
</li>
</ul>
<h3 id="enterprise-survey-shows-cyber-recovery-differs-significantly-from-traditional-disaster-recovery"><a href="https://drive.google.com/file/d/1csLS86bipOhlEltYuy_0FYd1c2CcLOW2/view?ref=mandos.io">Enterprise Survey Shows Cyber Recovery Differs Significantly from Traditional Disaster Recovery</a></h3>
<ul>
<li>
<p>Organizations report cyber recovery (CR) requires distinct approaches from disaster recovery (DR), with 68% stating it involves different <strong>processes</strong> and <strong>technologies</strong>, while 58% note it needs different skill sets.</p>
</li>
<li>
<p>Survey reveals CR is significantly more challenging, with 4.6x more respondents rating CR technologies as more complex than DR, and 3.3x more reporting difficulty in finding staff with appropriate <strong>skills</strong>.</p>
</li>
<li>
<p>While 52% of organizations include CR within their DR programs, 91% emphasize that significant time is required for <strong>forensics</strong> to determine attack scope, and 85% stress the importance of establishing clean room environments before recovery.</p>
</li>
</ul>
<p><strong>Discover my collection of industry reports, guides and cheat sheets in </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="eus-dora-implementation-strains-financial-sectors-cybersecurity-resources"><a href="https://www.csoonline.com/article/3804548/eus-dora-could-further-strain-cybersecurity-skills-gap.html?ref=mandos.io">EU's DORA Implementation Strains Financial Sector's Cybersecurity Resources</a></h3>
<ul>
<li>
<p>New Digital Operational Resilience Act requires financial institutions to implement comprehensive ICT risk management frameworks, with implementation costs ranging from €5-15M for planning alone, and <strong>enforcement</strong> beginning January 2024.</p>
</li>
<li>
<p>Survey reveals 43% of UK financial firms won't achieve compliance for at least three months, citing insufficient organizational prioritization and <strong>skills shortage</strong> as main barriers, with potential fines up to 1% of worldwide daily turnover.</p>
</li>
<li>
<p>Smaller financial institutions face particular challenges in securing required <strong>expertise</strong>, leading to increased reliance on external service providers and managed services for compliance, though proportionality principle allows simplified implementation based on organization size.</p>
</li>
</ul>
<h3 id="security-industry-shifts-focus-experience-and-multi-skilled-appsec-engineers-in-high-demand"><a href="https://www.gyan.ca/the-future-application-security-engineer?ref=mandos.io">Security Industry Shifts Focus: Experience and Multi-Skilled AppSec Engineers in High Demand</a></h3>
<ul>
<li>
<p>Modern AppSec roles require candidates with <strong>software development</strong> backgrounds, with most employers seeking engineers who can write code and build scalable security automations rather than just perform manual security tasks.</p>
</li>
<li>
<p>Future AppSec engineers must demonstrate expertise across four key areas: traditional security skills, <strong>development capabilities</strong>, program management, and <strong>influence skills</strong> - including the ability to communicate effectively with different stakeholders.</p>
</li>
<li>
<p>Entry-level security positions are becoming rare, as organizations prioritize candidates who can be immediately productive and bring practical engineering experience, particularly in building and managing large-scale security tooling and <strong>bug bounty</strong> programs.</p>
</li>
</ul>
<h3 id="targets-csirt-position-switches-from-remote-to-onsite-after-7-round-interview-process"><a href="https://www.reddit.com/r/cybersecurity/comments/1i7l2xn/7_fucking_interviews_only_to_be_rug_pulled_at_the/?ref=mandos.io">Target's CSIRT Position Switches from Remote to Onsite After 7-Round Interview Process</a></h3>
<ul>
<li>
<p>Candidate went through extensive <strong>7-round interview</strong> process over 2 months for Senior Cybersecurity Analyst (CSIRT) role, initially advertised as remote/hybrid, including technical assessments and multiple 1:1 interviews.</p>
</li>
<li>
<p>After reaching final selection stage as top 3 candidate, company introduced new requirements including a <strong>4 AM shift</strong> option and potential additional interviews, followed by delays attributed to new VP oversight.</p>
</li>
<li>
<p>Position ultimately transitioned to mandatory <strong>onsite requirement</strong> in Minnesota, contradicting initial remote work arrangement, leading to withdrawal of candidate who was unable to relocate.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="mit-researchers-launch-comprehensive-ai-risk-repository-with-1000-identified-risks"><a href="https://airisk.mit.edu/?ref=mandos.io">MIT Researchers Launch Comprehensive AI Risk Repository with 1000+ Identified Risks</a></h3>
<ul>
<li>
<p>Repository categorizes AI risks across seven <strong>domains</strong> and 23 subdomains, using systematic search strategy to analyze 56 different AI risk classifications and frameworks</p>
</li>
<li>
<p>Database employs dual classification system: a Causal Taxonomy explaining how/when/why risks occur, and a Domain Taxonomy organizing risks by impact areas like <strong>misinformation</strong> and <strong>privacy</strong></p>
</li>
<li>
<p>Research team developed searchable database with source attribution, enabling professionals to explore risks through multiple lenses including pre-deployment concerns and specific <strong>threat vectors</strong></p>
</li>
</ul>
<h3 id="google-introduces-three-key-tool-types-for-ai-agent-development"><a href="https://drive.google.com/file/d/1eiYtwW_B77U-0-RXKaHP-Z_izQLSMwnR/view?ref=mandos.io">Google Introduces Three Key Tool Types for AI Agent Development</a></h3>
<ul>
<li>
<p><strong>Extensions</strong>, <strong>Functions</strong>, and <strong>Data Stores</strong> are introduced as primary tool types that enable Google AI models to interact with external systems and real-world data.</p>
</li>
<li>
<p>The tools are designed to bridge the gap between foundational models and external systems through an orchestration layer that uses reasoning frameworks like <strong>ReAct</strong> and Chain-of-Thought.</p>
</li>
<li>
<p>Agent architectures combine a language model core with these tools through a cyclical process of information gathering, reasoning, and action-taking to achieve specific goals autonomously.</p>
</li>
</ul>
<h3 id="openais-chatgpt-crawler-vulnerability-enables-ddos-attacks-through-api-endpoint"><a href="https://github.com/bf/security-advisories/blob/main/2025-01-ChatGPT-Crawler-Reflective-DDOS-Vulnerability.md?ref=mandos.io">OpenAI's ChatGPT Crawler Vulnerability Enables DDoS Attacks Through API Endpoint</a></h3>
<ul>
<li>
<p>High severity (<strong>CVSS 8.6</strong>) vulnerability in ChatGPT's crawler allows attackers to trigger <strong>DDoS</strong> attacks on target websites by exploiting an attribution API endpoint that lacks rate limiting and duplicate request checks.</p>
</li>
<li>
<p>The vulnerability enables significant attack amplification through OpenAI's <strong>Azure</strong> infrastructure, with a single malicious request capable of spawning thousands of simultaneous crawler connections to victim websites.</p>
</li>
<li>
<p>After failed responsible disclosure attempts through multiple channels, the vulnerability was publicly revealed, leading OpenAI to <strong>disable</strong> the vulnerable /backend-api/attributions endpoint.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="citrix-acquires-unicon-to-enhance-endpoint-security-and-management-for-hybrid-work"><a href="https://www.businesswire.com/news/home/20250122892954/en/Citrix-Announces-Acquisition-of-Unicon-Enabling-Companies-to-Repurpose-Existing-Hardware-for-More-Sustainable-Cost-Effective-and-Secure-Hybrid-Work-Solutions?ref=mandos.io">Citrix Acquires Unicon to Enhance Endpoint Security and Management for Hybrid Work</a></h3>
<ul>
<li>
<p>Citrix's acquisition of Unicon brings the <strong>eLux</strong> operating system and Scout management platform, currently deployed across 2.5 million endpoints in 65+ countries, enhancing their ability to provide secure endpoint management without additional OS licensing costs.</p>
</li>
<li>
<p>The integration enables organizations to <strong>repurpose</strong> existing hardware beyond Windows 10 end-of-support, supporting sustainability initiatives while maintaining secure access to Citrix Virtual Apps, Desktops, and Enterprise Browser.</p>
</li>
<li>
<p>This strategic move follows Citrix's recent acquisitions of deviceTRUST and Strong Network, strengthening their <strong>zero-trust</strong> security portfolio and expanding their capabilities in the <strong>finance</strong>, public sector, and healthcare industries.</p>
</li>
</ul>
<h3 id="axoflow-secures-7m-seed-funding-for-security-data-pipeline-management"><a href="https://www.securityweek.com/axoflow-raises-7-million-for-security-data-curation-platform/?ref=mandos.io">Axoflow Secures $7M Seed Funding for Security Data Pipeline Management</a></h3>
<ul>
<li>
<p>Hungarian-founded startup developed a <strong>vendor-agnostic</strong> platform that automates security data curation, promising over 50% reduction in data volume and elimination of manual data wrangling.</p>
</li>
<li>
<p>Platform features automated discovery of security data sources (syslog, OpenTelemetry, Windows), with capabilities for data classification, normalization, and enrichment in both <strong>SaaS</strong> and <strong>air-gapped</strong> environments.</p>
</li>
<li>
<p>Funding led by EBRD Venture Capital will accelerate development for general availability by August 2024, with total company funding now reaching $10M.</p>
</li>
</ul>
<h3 id="ai-security-startup-dryrun-secures-87m-for-application-security-platform"><a href="https://siliconangle.com/2025/01/22/dryrun-security-raises-8-7m-advance-ai-driven-application-security/?ref=mandos.io">AI Security Startup DryRun Secures $8.7M for Application Security Platform</a></h3>
<ul>
<li>
<p>DryRun's platform combines <strong>static analysis</strong> and AI to provide real-time vulnerability insights, integrating directly with GitHub for immediate security feedback during development.</p>
</li>
<li>
<p>Company launched new Natural Language Code Policies feature allowing teams to create security rules using conversational language, eliminating need for custom <strong>scripting</strong> in security policy enforcement.</p>
</li>
<li>
<p>Investment led by LiveOak Venture Partners and Work-Bench will support expansion of go-to-market operations for their Contextual Security Analysis (<strong>CSA</strong>) platform, which identifies code <strong>vulnerabilities</strong> before deployment.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #09090b; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">From Security Expert to Strategic Leader</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Stop drowning in operational details. Get the strategic insights, frameworks, and leadership guidance you need to confidently step into your next security leadership role - all in just 10 minutes a week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Subscribe</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="dianna-ai-cyber-companion"><a href="https://cybersectools.com/tools/dianna-ai-cyber-companion?ref=mandos.io">DIANNA AI Cyber Companion</a></h3>
<p>DIANNA is an AI-powered cybersecurity companion from Deep Instinct that analyzes and explains unknown threats, offering malware analysis and translating code intent into natural language.</p>
<h3 id="sentinelone-purple-ai"><a href="https://cybersectools.com/tools/sentinelone-purple-ai?ref=mandos.io">SentinelOne Purple AI</a></h3>
<p>SentinelOne Purple AI is an AI-powered security analyst solution that simplifies threat hunting and investigations, empowers analysts, accelerates security operations, and safeguards data.</p>
<h3 id="sense-defence"><a href="https://cybersectools.com/tools/sense-defence?ref=mandos.io">Sense Defence</a></h3>
<p>Sense Defence is a next-generation web security suite that leverages AI to provide real-time threat detection and blocking.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #87: AWS S3 Ransomware, Google&#x27;s 97% Automated Threat Detection, Microsoft AI Red Team Report ]]></title>
        <description><![CDATA[ Critical AWS S3 ransomware campaign discovered. Snyk uploads suspicious NPM packages. Microsoft UEFI vulnerability enables Secure Boot bypass. ]]></description>
        <link>https://mandos.io/newsletter/brief-87-aws-s3-ransomware-googles-97-automated-threat-detection-microsoft-ai-red-team-report/</link>
        <guid isPermaLink="false">678b83a30e66c90001926f7c</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 19 Jan 2025 13:00:37 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/3.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!<br><br>Hope you're having a relaxing weekend! While you were busy wrapping up another week, the cybersecurity world has been buzzing with some fascinating developments that I think you'll want to hear about.<br><br>- Snyk stirred up controversy with suspicious NPM packages targeting Cursor AI (drama in the DevSec world!)<br>- A clever new ransomware technique is using AWS's own encryption against S3 buckets<br>- Google shared how they automated 97% of their threat detection (and yes, it's as cool as it sounds)<br><br>Plus plenty more stories about AI security, career trends, and new tools that caught my attention this week. Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="snyk-uploads-suspicious-npm-packages-targeting-cursor-ai-code-editor"><a href="https://www.theregister.com/2025/01/14/snyk_npm_deployment_removed/?ref=mandos.io">Snyk Uploads Suspicious NPM Packages Targeting Cursor AI Code Editor</a></h3>
<ul>
<li>
<p>Security researcher discovered three <strong>malicious</strong> packages on NPM authored by Snyk employee, designed to collect system data and environmental variables including <strong>GitHub</strong> credentials and AWS keys when installed.</p>
</li>
<li>
<p>Packages named to target Cursor's bundled extensions (cursor-retrieval, cursor-always-local, cursor-shadow-workspace) were uploaded without prior coordination, though Snyk claims it was researching <strong>dependency confusion</strong> vulnerabilities.</p>
</li>
<li>
<p>Snyk's CTO confirmed the action was part of their Research Labs' testing of VS Code extensions, while Cursor's co-founder stated they had received an <strong>apology</strong> from Snyk but no detailed explanation of the intent.</p>
</li>
</ul>
<h3 id="new-ransomware-campaign-encrypts-aws-s3-buckets-using-native-sse-c-feature"><a href="https://www.halcyon.ai/blog/abusing-aws-native-services-ransomware-encrypting-s3-buckets-with-sse-c?ref=mandos.io">New Ransomware Campaign Encrypts AWS S3 Buckets Using Native SSE-C Feature</a></h3>
<ul>
<li>
<p>Threat actor "<strong>Codefinger</strong>" leverages compromised AWS credentials to encrypt S3 bucket data using AWS's Server-Side Encryption with Customer Provided Keys (<strong>SSE-C</strong>), making data unrecoverable without the attacker's decryption keys.</p>
</li>
<li>
<p>Two confirmed victims have been identified in recent weeks, with the attack requiring no AWS vulnerability exploitation - only valid AWS credentials with permissions to read and write S3 objects.</p>
</li>
<li>
<p>This novel technique represents a significant evolution in cloud-focused <strong>ransomware</strong> tactics, as data encrypted via SSE-C cannot be recovered without the original encryption keys, even with AWS support intervention.</p>
</li>
</ul>
<h3 id="microsoft-signed-uefi-application-vulnerability-enables-secure-boot-bypass-cve-2024-7344"><a href="https://www.welivesecurity.com/en/eset-research/under-cloak-uefi-secure-boot-introducing-cve-2024-7344/?ref=mandos.io">Microsoft-Signed UEFI Application Vulnerability Enables Secure Boot Bypass (CVE-2024-7344)</a></h3>
<ul>
<li>
<p>Critical vulnerability discovered in a Microsoft-signed UEFI application allows attackers to bypass <strong>Secure Boot</strong> protection by loading unsigned code through a specially crafted "cloak.dat" file, affecting multiple vendor recovery software suites.</p>
</li>
<li>
<p>The flaw stems from the application using a custom PE loader instead of standard UEFI security functions, enabling potential deployment of <strong>bootkits</strong> like BlackLotus on systems with Secure Boot enabled, requiring only local administrator privileges.</p>
</li>
<li>
<p>Microsoft has issued <strong>revocations</strong> for the vulnerable binaries in January 2025 Patch Tuesday update, affecting products from seven vendors including Howyar Technologies, Greenware Technologies, and others. No evidence of real-world <strong>exploitation</strong> has been detected.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-reveals-internal-threat-detection-framework-built-on-automation-and-engineering"><a href="https://cloud.google.com/transform/how-google-does-it-modernizing-threat-detection?ref=mandos.io">Google Reveals Internal Threat Detection Framework Built on Automation and Engineering</a></h3>
<ul>
<li>
<p>Google's threat detection system processes incidents across world's largest Linux fleet using <strong>automated</strong> hunts for 97% of events, reducing average threat dwell time from weeks to hours through cloud-based log analysis and triage.</p>
</li>
<li>
<p>Detection team employs a "you write it, you triage it" principle where engineers are responsible for both creating and responding to their alerts, while using <strong>generative AI</strong> to reduce executive summary writing time by 53%.</p>
</li>
<li>
<p>Success factors include maintaining comprehensive <strong>asset inventory</strong>, treating security as software engineering with coded detections, and ensuring close collaboration between detection teams and project stakeholders for accurate <strong>threat modeling</strong>.</p>
</li>
</ul>
<h3 id="2025-world-economic-forum-report-highlights-growing-cyber-complexity-and-inequity"><a href="https://drive.google.com/file/d/12WpQhyoGfugv_Rg-qJNuu7CQqo0Nz0jS/view?ref=mandos.io">2025 World Economic Forum Report Highlights Growing Cyber Complexity and Inequity</a></h3>
<ul>
<li>
<p><strong>Cybercrime</strong> continues rising with 72% of organizations reporting increased risks in 2024, with ransomware and AI-enhanced attacks being primary concerns.</p>
</li>
<li>
<p>Growing <strong>cyber inequity</strong> gap between large and small organizations - 35% of small organizations report inadequate cyber resilience (up 7x since 2022), while large organizations show steady improvement.</p>
</li>
<li>
<p>Only 37% of organizations have processes to assess <strong>AI security</strong> before deployment, despite 66% believing AI will significantly impact cybersecurity in 2025.</p>
</li>
</ul>
<h3 id="ciso-role-evolution-shows-growing-strategic-influence-and-career-opportunities-in-2025"><a href="https://drive.google.com/file/d/1e0qvOu17Pz2ZXVIyZtNb8xiONytY0F8P/view?ref=mandos.io">CISO Role Evolution Shows Growing Strategic Influence and Career Opportunities in 2025</a></h3>
<ul>
<li>
<p><strong>Strategic CISOs</strong> (28% of surveyed) have direct C-suite access and quarterly board engagement, earning average total compensation of $809K, with top performers reaching $1.7M.</p>
</li>
<li>
<p>CISO scope expanding beyond traditional infosec into <strong>business risk</strong>, <strong>enterprise governance</strong>, and IT oversight, with 15% of organizations now having dual CISO/CIO roles.</p>
</li>
<li>
<p>New career paths emerging for experienced CISOs including Chief Risk Officer, Chief Trust Officer, and board positions, particularly at large enterprises with revenues over $1B.</p>
</li>
</ul>
<p><strong>Discover my collection of industry reports, guides and cheat sheets in </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="current-cybersecurity-job-market-demands-higher-qualifications-and-technical-skills"><a href="https://www.reddit.com/r/SecurityCareerAdvice/comments/1hxicy1/the_hard_truth_about_breaking_into_cybersecurity/?ref=mandos.io">Current Cybersecurity Job Market Demands Higher Qualifications and Technical Skills</a></h3>
<ul>
<li>
<p>The industry has become <strong>oversaturated</strong> with entry-level certifications - Security+ and CySA+ alone are no longer sufficient differentiators. Employers increasingly require combinations of degrees, technical experience, and specialized skills.</p>
</li>
<li>
<p><strong>Application Security</strong> represents an underserved specialty with high demand and less competition, making it a strategic entry point for cybersecurity careers compared to traditional paths like GRC roles.</p>
</li>
<li>
<p>Technical expertise is becoming mandatory across all domains - even GRC positions now require technical understanding. Most roles require a foundation built through <strong>SOC analyst</strong> work or similar technical positions before specialization.</p>
</li>
</ul>
<h3 id="threat-hunting-role-varies-by-organization-size-and-security-maturity"><a href="https://www.reddit.com/r/cybersecurity/comments/1i41wsa/is_threat_hunting_a_dedicated_role/?ref=mandos.io">Threat Hunting Role Varies by Organization Size and Security Maturity</a></h3>
<ul>
<li>
<p>Large <strong>enterprises</strong> and MSSPs typically maintain dedicated threat hunting teams, while mid-sized companies often incorporate hunting into existing SOC analyst duties based on resource availability.</p>
</li>
<li>
<p>Return on investment concerns make dedicated hunters less common in smaller organizations, with many companies prioritizing basic security fundamentals over specialized hunting <strong>capabilities</strong>.</p>
</li>
<li>
<p>Threat hunting is most prevalent in organizations with specific use cases like government contracts, defense work, or those offering it as a managed <strong>service</strong>, often performed by senior SOC analysts alongside other duties.</p>
</li>
</ul>
<h3 id="osint-skills-offer-growing-career-opportunities-in-cybersecurity"><a href="https://www.careersinfosecurity.com/blogs/turning-curiosity-into-career-power-osint-p-3795?ref=mandos.io">OSINT Skills Offer Growing Career Opportunities in Cybersecurity</a></h3>
<ul>
<li>
<p>Open Source Intelligence (OSINT) involves collecting and analyzing <strong>publicly available</strong> information from websites, social media, news articles, and public records, with applications across cybersecurity, law enforcement, and business intelligence.</p>
</li>
<li>
<p>Real-world impact demonstrated through Operation TRACE by <strong>Interpol</strong>, where OSINT techniques helped identify human trafficking networks and rescue victims by analyzing classified ads, geolocation data, and metadata.</p>
</li>
<li>
<p>Career entry points include learning specialized tools like Google Dorking and Maltego, pursuing certifications like <strong>GOSI</strong> or CEH, and participating in OSINT challenges, with increasing demand driven by <strong>AI</strong> integration in analysis capabilities.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="microsoft-ai-red-team-shares-key-lessons-from-testing-100-generative-ai-products"><a href="https://drive.google.com/file/d/172N2AtpcSuXD90q_q-s3Sge8UOGoTNTV/view?usp=share_link&ref=mandos.io">Microsoft AI Red Team Shares Key Lessons from Testing 100+ Generative AI Products</a></h3>
<ul>
<li>
<p>Based on <strong>red teaming</strong> over 100 generative AI products since 2021, Microsoft developed a threat model ontology and identified that simple attack techniques often work better than complex ones for discovering vulnerabilities.</p>
</li>
<li>
<p>The team found that <strong>responsible AI</strong> harms (like bias, hate speech, and unsafe content) are pervasive but difficult to measure compared to security vulnerabilities, requiring both automated tools and human judgment to evaluate.</p>
</li>
<li>
<p>As AI systems become more sophisticated, they both amplify existing <strong>security risks</strong> and introduce new ones, with the team emphasizing that security work will never be "complete" but rather requires ongoing assessment and mitigation.</p>
</li>
</ul>
<h3 id="databricks-develops-ai-system-for-automated-vulnerability-detection-and-prioritization"><a href="https://www.databricks.com/blog/vulnwatch-ai-enhanced-prioritization-vulnerabilities?ref=mandos.io">Databricks Develops AI System for Automated Vulnerability Detection and Prioritization</a></h3>
<ul>
<li>
<p>New <strong>AI-powered</strong> system achieves 85% accuracy in identifying business-critical vulnerabilities by analyzing CVE data from multiple sources and automatically matching affected libraries to Databricks infrastructure.</p>
</li>
<li>
<p>System reduces security team's manual workload by <strong>95%</strong>, allowing them to focus only on the most critical vulnerabilities rather than reviewing hundreds of daily alerts.</p>
</li>
<li>
<p>Utilizes ensemble scoring methodology combining severity, component, and topic scores, along with <strong>LLM</strong> technology for library matching and automated instruction optimization for improved accuracy.</p>
</li>
</ul>
<h3 id="deep-instinct-launches-ai-powered-malware-analysis-tool-using-amazon-bedrock"><a href="https://aws.amazon.com/blogs/machine-learning/build-ai-powered-malware-analysis-using-amazon-bedrock-with-deep-instinct/?ref=mandos.io">Deep Instinct Launches AI-Powered Malware Analysis Tool Using Amazon Bedrock</a></h3>
<ul>
<li>
<p>Deep Instinct introduces DIANNA, a <strong>generative AI</strong> tool that provides real-time malware analysis by translating binary code into natural language and leveraging collective cybersecurity expertise through <strong>LLMs</strong> to identify both known and zero-day threats.</p>
</li>
<li>
<p>The solution addresses key SecOps challenges including alert fatigue and complex malware analysis by providing rapid threat assessment in under 20 milliseconds - 750 times faster than typical <strong>ransomware</strong> encryption speeds.</p>
</li>
<li>
<p>Integration with Amazon Bedrock enables enterprise-grade security features, seamless scaling, and fine-tuning capabilities while maintaining compliance with regulations like <strong>GDPR</strong>, allowing organizations to strengthen their security posture and reduce mean time to triage.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisco-launches-ai-defense-tool-to-secure-enterprise-ai-systems"><a href="https://siliconangle.com/2025/01/16/unpacking-cisco-ai-defense-implications-customers-company/?ref=mandos.io">Cisco Launches AI Defense Tool to Secure Enterprise AI Systems</a></h3>
<ul>
<li>
<p>Cisco unveiled <strong>AI Defense</strong>, a new security tool that provides visibility into authorized and unauthorized AI applications across organizations, addressing a critical gap where only 29% of organizations feel equipped to prevent unauthorized AI system access.</p>
</li>
<li>
<p>The solution offers continuous <strong>validation</strong> capabilities powered by Cisco Talos threat intelligence, automatically adapting security guardrails as AI models change and integrating with existing security tools like Splunk for enhanced monitoring.</p>
</li>
<li>
<p>Set to launch in <strong>March</strong>, the platform works in conjunction with Cisco's security portfolio (Secure Access, Hypershield, Multi-Cloud Defense) to provide comprehensive protection throughout the AI application <strong>lifecycle</strong>, from development to deployment.</p>
</li>
</ul>
<h3 id="orca-security-launches-agentless-ebpf-based-sensor-for-cloud-native-security"><a href="https://finance.yahoo.com/news/orca-security-unveils-orca-sensor-140000136.html?ref=mandos.io">Orca Security Launches Agentless eBPF-Based Sensor for Cloud-Native Security</a></h3>
<ul>
<li>
<p>Introduces <strong>eBPF</strong>-based Orca Sensor that provides real-time runtime visibility and protection for cloud environments, integrating with their existing Cloud Security Platform without requiring traditional agents.</p>
</li>
<li>
<p>The solution extends Orca's SideScanning™ technology to enhance Cloud Detection and Response (<strong>CDR</strong>) capabilities across multiple cloud providers including AWS, Azure, Google Cloud, and supports <strong>Kubernetes</strong> environments.</p>
</li>
<li>
<p>New sensor offers automated deployment with minimal maintenance overhead, providing comprehensive <strong>runtime</strong> detections covering DNS, files, networks, and processes while enabling customizable security policies.</p>
</li>
</ul>
<h3 id="czech-startup-wultra-raises-%E2%82%AC3m-to-develop-post-quantum-authentication-for-banks"><a href="https://www.globenewswire.com/news-release/2025/01/15/3009819/0/en/Wultra-Secures-3M-to-Protect-Financial-Institutions-from-Quantum-Threats.html?ref=mandos.io">Czech Startup Wultra Raises €3M to Develop Post-Quantum Authentication for Banks</a></h3>
<ul>
<li>
<p>Wultra secured funding to protect financial institutions against future <strong>quantum</strong> threats, with their CEO predicting "Q-day" - when current authentication systems become vulnerable - within the next 5 years.</p>
</li>
<li>
<p>The company's solutions include mobile authentication software and <strong>Talisman</strong> hardware authenticators, currently serving major European banks like Raiffeisen Bank International and Erste Digital, with all production maintained within the EU for security.</p>
</li>
<li>
<p>Funding will support expansion into Western Europe and Southeast Asia, with plans to open a Singapore office in 2025 to meet growing demand for <strong>PSD3</strong>-compliant authentication methods and <strong>post-quantum</strong> security infrastructure.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="futurefeed"><a href="https://cybersectools.com/tools/futurefeed?ref=mandos.io">FutureFeed</a></h3>
<p>A tool for achieving and proving compliance with NIST 800-171 and CMMC cybersecurity requirements.</p>
<h3 id="darktrace"><a href="https://cybersectools.com/tools/darktrace?ref=mandos.io">Darktrace</a></h3>
<p>Darktrace is a cyber security solution that uses AI to detect and prevent cyber attacks in real-time.</p>
<h3 id="infinityai"><a href="https://cybersectools.com/tools/infinityai?ref=mandos.io">InfinityAI</a></h3>
<p>Infinity Platform / Infinity AI is an AI-powered threat intelligence and generative AI service that combines AI-powered threat intelligence with generative AI capabilities for comprehensive threat prevention, automated threat response, and efficient security administration.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #86: BeyondTrust API Exploit, Microsoft vs AI Hackers, OWASP Non-Human Identity Risks ]]></title>
        <description><![CDATA[ Critical government systems compromised via API theft. New macOS malware emerges. DHS shares concrete guidance for AI implementation ]]></description>
        <link>https://mandos.io/newsletter/brief-86-beyondtrust-api-exploit-microsoft-vs-ai-hackers-owasp-non-human-identity-risks/</link>
        <guid isPermaLink="false">6782941c8e247300015d0209</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 12 Jan 2025 13:00:00 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/2.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>Hope you're enjoying your weekend! While you were busy wrapping up another week, the cybersecurity world has been pretty active (as always!). I've picked some interesting stories that I think you'll want to know about.</p><ul><li>Chinese hackers managed to break into the U.S. Treasury using a stolen API key</li><li>Microsoft is taking hackers to court for abusing their AI services</li><li>A whopping 70% of CISOs are feeling the heat from personal liability risks</li></ul><p>And there's plenty more where that came from. Grab your favorite Sunday beverage and dive in!&nbsp;</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="chinese-state-actors-access-us-treasury-systems-using-stolen-beyondtrust-api-key"><a href="https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html?ref=mandos.io">Chinese State Actors Access U.S. Treasury Systems Using Stolen BeyondTrust API Key</a></h3>
<ul>
<li>
<p>Threat actors gained unauthorized access to Treasury Department systems through a compromised <strong>API key</strong> from BeyondTrust's Remote Support service, enabling them to reset passwords and access unclassified workstations and documents.</p>
</li>
<li>
<p>The incident, discovered on December 8th, has been attributed to a Chinese state-sponsored <strong>APT</strong> group based on evidence gathered during investigations by CISA and FBI.</p>
</li>
<li>
<p>BeyondTrust identified two vulnerabilities in their products, with CVE-2024-12356 receiving a critical <strong>CVSS</strong> score of 9.8 and being actively exploited in the wild, leading to its addition to CISA's Known Exploited Vulnerabilities catalog.</p>
</li>
</ul>
<h3 id="azure-airflow-kubernetes-misconfiguration-enables-cluster-wide-admin-access"><a href="https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html?m=1&ref=mandos.io">Azure Airflow Kubernetes Misconfiguration Enables Cluster-Wide Admin Access</a></h3>
<ul>
<li>
<p>Discovery of three security flaws in Azure Data Factory Apache Airflow integration allows attackers to gain unauthorized access through <strong>DAG</strong> files, potentially leading to complete cluster compromise.</p>
</li>
<li>
<p>Initial access requires write permissions to storage accounts via compromised credentials, but exploiting a misconfigured service account with <strong>cluster-admin</strong> privileges enables full control of the Kubernetes environment.</p>
</li>
<li>
<p>Attackers could leverage root access to deploy malicious pods, modify cluster nodes, and manipulate <strong>Geneva</strong> service logs, potentially maintaining persistent access while avoiding detection through falsified logging.</p>
</li>
</ul>
<h3 id="banshee-stealer-malware-targets-macos-users-through-github-and-phishing-campaigns"><a href="https://blog.checkpoint.com/research/cracking-the-code-how-banshee-stealer-targets-macos-users/?ref=mandos.io">Banshee Stealer Malware Targets macOS Users Through GitHub and Phishing Campaigns</a></h3>
<ul>
<li>
<p>New <strong>stealer-as-a-service</strong> malware sold for $3,000 on underground forums targets macOS users, stealing credentials, crypto wallets, and sensitive data while using Apple's XProtect encryption algorithm to evade detection.</p>
</li>
<li>
<p>Malware distributed through <strong>phishing</strong> sites and malicious GitHub repositories masquerading as legitimate software (Chrome, Telegram, TradingView), with simultaneous campaigns targeting Windows users with <strong>Lumma Stealer</strong>.</p>
</li>
<li>
<p>Source code leaked in November 2024 leading to shutdown of public operations, but active campaigns continue with removal of Russian language check suggesting <strong>geographical</strong> expansion of targets.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="owasp-releases-first-top-10-non-human-identities-security-risks-list"><a href="https://owasp.org/www-project-non-human-identities-top-10/2025/top-10-2025/?ref=mandos.io">OWASP Releases First Top 10 Non-Human Identities Security Risks List</a></h3>
<ul>
<li>
<p>The inaugural list focuses on securing <strong>service accounts</strong>, API keys, and automated system identities, with improper offboarding, secret leakage, and vulnerable third-party integrations identified as the top three risks.</p>
</li>
<li>
<p>Common security challenges include excessive permissions, poor credential management, and inadequate monitoring of non-human identities (<strong>NHIs</strong>) which can lead to widespread damage if <strong>compromised</strong>.</p>
</li>
<li>
<p>The rankings were developed using recent breach data, CVE scores, and industry surveys including Datadog's State of Cloud Security and the <strong>DBIR</strong> 2024 report.</p>
</li>
</ul>
<h3 id="kpmg-and-mit-study-reveals-ais-potential-role-in-strengthening-cybersecurity-culture"><a href="https://drive.google.com/file/d/1hSu5JzftS4SHvsX0CingczwzUNM7vsrR/view?usp=share_link&ref=mandos.io">KPMG and MIT Study Reveals AI's Potential Role in Strengthening Cybersecurity Culture</a></h3>
<ul>
<li>
<p>Research involving <strong>40 cybersecurity leaders</strong> across industries reveals that 68% of cybersecurity breaches involve non-malicious human elements, highlighting the critical importance of human risk management.</p>
</li>
<li>
<p>Study identifies key cybersecurity culture challenges including change resistance, secure technology adoption, and management of interconnected systems, suggesting AI could help address these through <strong>personalized training</strong> and real-time risk detection.</p>
</li>
<li>
<p>The CAMS Cybersecurity Culture Model emphasizes a three-tiered approach (leadership, group, individual) to building security culture, with <strong>external influences</strong> and managerial mechanisms playing crucial roles in shaping organizational behavior.</p>
</li>
</ul>
<h3 id="70-of-cisos-express-concern-over-personal-liability-risks-in-leadership-role"><a href="https://www.csoonline.com/article/3631759/personal-liability-sours-70-of-cisos-on-their-role.html?ref=mandos.io">70% of CISOs Express Concern Over Personal Liability Risks in Leadership Role</a></h3>
<ul>
<li>
<p>Survey reveals <strong>70%</strong> of CISOs have negative feelings about their role due to increasing personal liability for cybersecurity incidents, with only 10% seeing increased security budgets despite heightened board attention.</p>
</li>
<li>
<p>CISOs face a critical disconnect between <strong>accountability</strong> and authority, with many security leaders being held responsible for decisions made by committee while lacking direct control over security implementations.</p>
</li>
<li>
<p>Security experts recommend CISOs negotiate protective measures including <strong>indemnification</strong>, professional liability insurance coverage, and strong exit clauses, as talent drain becomes a growing concern in the industry.</p>
</li>
</ul>
<p><strong>Discover my collection of industry reports, guides and cheat sheets in </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="soc-analysts-share-unusual-workplace-security-incidents-including-data-misuse-and-false-positives"><a href="https://www.reddit.com/r/cybersecurity/comments/1hsqzks/strange_security_incident_in_your_life/?ref=mandos.io">SOC Analysts Share Unusual Workplace Security Incidents Including Data Misuse and False Positives</a></h3>
<ul>
<li>
<p>An air-gapped network was infected with a <strong>wormable</strong> virus, requiring complete system restoration from backup tapes. The incident revealed critical backup reliability issues, with only 80% tape readability and resulted in 2 weeks of data loss.</p>
</li>
<li>
<p>A corporate-wide alert involving 3,000 machines was triggered by <strong>Dropbox</strong> software update that mimicked APT behavior being studied in a SANS class, leading to unnecessary incident response deployment.</p>
</li>
<li>
<p>Multiple cases of <strong>insider</strong> incidents were reported where work email systems were misused for personal activities, including dating sites and sharing inappropriate content, requiring SOC teams to collaborate with <strong>HR</strong> and Legal departments for investigations.</p>
</li>
</ul>
<h3 id="security-professionals-discuss-value-and-challenges-of-proactive-threat-hunting"><a href="https://www.reddit.com/r/cybersecurity/comments/1hynt3c/threat_hunting/?ref=mandos.io">Security Professionals Discuss Value and Challenges of Proactive Threat Hunting</a></h3>
<ul>
<li>
<p>Threat hunting focuses on proactively searching for signs of <strong>compromise</strong> using behavioral analysis tools and threat intelligence, rather than waiting for alerts from existing security controls.</p>
</li>
<li>
<p>Organizations struggle with justifying threat hunting programs due to <strong>intangible</strong> benefits, requiring security teams to demonstrate value through real-world examples and actionable findings from smaller initial exercises.</p>
</li>
<li>
<p>Security managers report mixed results, with some questioning the return on investment compared to traditional <strong>detection engineering</strong>, while others emphasize its importance as an early warning system despite well-configured security controls.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-report-diverse-job-responsibilities-beyond-core-security-functions"><a href="https://www.reddit.com/r/cybersecurity/comments/1hy188a/how_much_of_your_job_is_strictly_cyber_security/?ref=mandos.io">Cybersecurity Professionals Report Diverse Job Responsibilities Beyond Core Security Functions</a></h3>
<ul>
<li>
<p>Survey reveals many practitioners spend significant time on <strong>administrative</strong> tasks like software licensing, patch management, and device tracking alongside core security duties.</p>
</li>
<li>
<p>Red Team specialists report most focused security work, with 80% of time on <strong>pentesting</strong> activities and only 20% on administrative, training, and reporting tasks.</p>
</li>
<li>
<p><strong>GRC</strong> professionals and consultants indicate heaviest non-security workload, with some spending up to 95% of time on business tasks, documentation, and stakeholder management rather than technical security work.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="microsoft-takes-legal-action-against-foreign-hackers-exploiting-ai-services"><a href="https://www.forbes.com/sites/zakdoffman/2025/01/11/microsoft-warning-as-foreign-hackers-access-accounts-ai-attacks-bypass-security/?ref=mandos.io">Microsoft Takes Legal Action Against Foreign Hackers Exploiting AI Services</a></h3>
<ul>
<li>
<p>Foreign threat actors gained unauthorized access to <strong>generative AI</strong> services by using scraped credentials, then resold access to other malicious actors for creating harmful content.</p>
</li>
<li>
<p>Microsoft's Digital Crimes Unit discovered attackers were specifically targeting <strong>OpenAI's DALL-E</strong> and other AI tools to power sophisticated attacks against third-party organizations.</p>
</li>
<li>
<p>The company has implemented <strong>countermeasures</strong> including enhanced safeguards and credential revocation, while warning that AI-powered <strong>phishing</strong> campaigns are becoming increasingly personalized through social media scraping.</p>
</li>
</ul>
<h3 id="dhs-releases-genai-deployment-playbook-for-public-sector-organizations"><a href="https://drive.google.com/file/d/10CYuw756KeaR7arFp9wwGrgCyKfRfTGD/view?ref=mandos.io">DHS Releases GenAI Deployment Playbook for Public Sector Organizations</a></h3>
<ul>
<li>
<p>DHS completed three <strong>pilot programs</strong> in 2024 focused on investigative lead enhancement, hazard mitigation planning, and immigration officer training - all designed to support rather than replace human workers.</p>
</li>
<li>
<p>The playbook outlines 7 key areas for successful GenAI implementation including mission alignment, governance, infrastructure, responsible use considerations, monitoring, talent development, and user feedback.</p>
</li>
<li>
<p>Emphasizes importance of executive sponsorship and cross-functional <strong>governance</strong> through integrated project teams comprising cybersecurity, legal, privacy and civil rights experts to oversee development and deployment.</p>
</li>
</ul>
<h3 id="llm-based-proactive-defense-architecture-proposed-for-cloud-security"><a href="https://drive.google.com/file/d/145fBWiPeAUXmOyAcqvHVymB-F1YemJSj/view?ref=mandos.io">LLM-Based Proactive Defense Architecture Proposed for Cloud Security</a></h3>
<ul>
<li>
<p>Novel defense architecture called <strong>LLM-PD</strong> introduced, integrating large language models to provide intelligent, proactive protection against advanced cloud-based threats through comprehensive data analysis and sequential reasoning.</p>
</li>
<li>
<p>System features 5 core components: data collection/reconstruction, status/risk assessment, task inference/decision-making, defense deployment/execution, and effectiveness analysis/feedback, enabling <strong>self-evolution</strong> based on experience without additional training.</p>
</li>
<li>
<p>Experimental results demonstrate superior performance compared to existing methods, with notably high <strong>success rates</strong> in defending against various attack scenarios including DDoS and MITM attacks through dynamic defense mechanism creation and deployment.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="1password-acquires-trelica-to-enhance-shadow-it-detection-and-access-management"><a href="https://siliconangle.com/2025/01/07/1password-acquires-trelica-extend-cybersecurity-capabilities/?ref=mandos.io">1Password Acquires Trelica to Enhance Shadow IT Detection and Access Management</a></h3>
<ul>
<li>
<p>1Password is acquiring U.K.-based Trelica to strengthen its <strong>Extended Access Management</strong> platform, with a focus on detecting unauthorized SaaS applications and managing access controls.</p>
</li>
<li>
<p>Trelica's technology identifies shadow IT by analyzing system logs and browser activity, detecting when employees use unauthorized services or create insecure <strong>software integrations</strong> with sensitive data repositories.</p>
</li>
<li>
<p>The acquisition will enhance 1Password's enterprise offerings, combining Trelica's SaaS management capabilities with 1Password's existing <strong>single sign-on</strong> and device security features, though financial terms remain undisclosed.</p>
</li>
</ul>
<h3 id="darktrace-acquires-cado-security-to-enhance-cloud-investigation-capabilities"><a href="https://darktrace.com/news/darktrace-announces-proposed-acquisition-of-cado-security-a-cloud-investigation-and-response-specialist?ref=mandos.io">Darktrace Acquires Cado Security to Enhance Cloud Investigation Capabilities</a></h3>
<ul>
<li>
<p>Darktrace plans to acquire UK-based Cado Security, a <strong>forensics</strong> specialist offering investigation and response solutions across multi-cloud environments, with deal expected to complete in February pending regulatory approval.</p>
</li>
<li>
<p>Integration will enhance Darktrace's <strong>ActiveAI</strong> platform by combining Cado's forensic investigation technology with existing capabilities, improving data collection across cloud environments and augmenting Cyber AI Analyst functionality.</p>
</li>
<li>
<p>Acquisition follows Darktrace's recent expansion into <strong>cloud security</strong> with launches for AWS and Azure, addressing growing concerns as research shows cloud/SaaS platforms are common entry points for <strong>threat actors</strong>.</p>
</li>
</ul>
<h3 id="synology-launches-activeprotect-enterprise-backup-solution-with-all-in-one-architecture"><a href="https://www.synology.com/en-us/company/news/article/AP_Launch?ref=mandos.io">Synology Launches ActiveProtect Enterprise Backup Solution with All-in-One Architecture</a></h3>
<ul>
<li>
<p>New unified backup platform combines hardware and software into single appliance, supporting up to <strong>150,000</strong> workloads across multiple platforms including VMs, databases, and Microsoft 365, with built-in <strong>hypervisor</strong> for backup testing.</p>
</li>
<li>
<p>Solution features advanced security capabilities including <strong>immutable</strong> backups and air-gap protection, along with global source-side deduplication to optimize storage efficiency and reduce network load.</p>
</li>
<li>
<p>Introduces unique pricing model eliminating per-workload licensing fees, allowing organizations to manage up to three backup servers license-free with optional <strong>CMS</strong> licenses for larger deployments.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="kunai"><a href="https://cybersectools.com/tools/kunai?ref=mandos.io">Kunai</a></h3>
<p>Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.</p>
<h3 id="getallurls-gau"><a href="https://cybersectools.com/tools/getallurls-gau?ref=mandos.io">getallurls (gau)</a></h3>
<p>Fetches known URLs from various sources for a given domain.</p>
<h3 id="verity"><a href="https://cybersectools.com/tools/verity?ref=mandos.io">Verity</a></h3>
<p>Verity is a comprehensive compliance management tool that helps organizations manage their governance, risk, and compliance initiatives.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #85: Windows LDAP Exploit, Tenable Nessus Outage, Security Leadership Pay ]]></title>
        <description><![CDATA[ Critical vulnerabilities in Windows Domain Controllers enable remote attacks, while VW subsidiary exposes 460,000 EV locations. RAND reveals AI security gaps ]]></description>
        <link>https://mandos.io/newsletter/brief-85-windows-ldap-exploit-tenable-nessus-outage-security-leadership-pay/</link>
        <guid isPermaLink="false">677953bf296f8700010c1aca</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 05 Jan 2025 13:00:26 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2025/02/1-2.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy New Year!</p><p>Hope you're having a great start to 2025! While we were all busy with holiday celebrations and new year resolutions, the cyber world didn't take a break (does it ever? ). I've rounded up some interesting stories that caught my eye, and I thought you might want to know about them too.</p><ul><li>Volkswagen's subsidiary exposed location data of 460,000 EVs (yikes!) through cloud storage</li><li>Security leaders are finding clever ways to save up to 30% on their security budgets</li><li>AI application security blueprint outlines six-layer defense framework</li></ul><p>Plus plenty more insights on AI security, market moves, and practical tools to make your security work easier. Let's dive in!</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="volkswagen-subsidiary-cariad-exposes-location-data-of-460000-ev-vehicles"><a href="https://www.engadget.com/transportation/evs/huge-volkswagen-data-leak-exposed-the-locations-of-460000-ev-drivers-194000006.html?ref=mandos.io">Volkswagen Subsidiary Cariad Exposes Location Data of 460,000 EV Vehicles</a></h3>
<ul>
<li>
<p><strong>Data leak</strong> through Amazon cloud storage exposed movement data and contact information of 800,000 EV owners, affecting vehicles from VW, Seat, and Audi, remaining accessible for months before discovery.</p>
</li>
<li>
<p>Leak was discovered by <strong>Chaos Computer Club</strong> on November 26, with Volkswagen claiming no malicious actors accessed the exposed data during the vulnerability period. The breach did not compromise passwords or payment information.</p>
</li>
<li>
<p>The vulnerability required complex, multi-stage process to access <strong>pseudonymized</strong> data, with Volkswagen stating that connecting data to specific customers would require significant technical expertise and time investment.</p>
</li>
</ul>
<h3 id="tenable-nessus-agent-outage-caused-by-faulty-plugin-updates"><a href="https://www.bleepingcomputer.com/news/security/bad-tenable-plugin-updates-take-down-nessus-agents-worldwide/?ref=mandos.io">Tenable Nessus Agent Outage Caused by Faulty Plugin Updates</a></h3>
<ul>
<li>
<p><strong>Offline</strong> agents affected Nessus users worldwide after buggy differential plugin updates on December 31st, impacting systems running versions 10.8.0 and 10.8.1 across multiple continents.</p>
</li>
<li>
<p>Tenable has released version 10.8.2 as a fix and disabled plugin feed updates for affected versions. <strong>Manual</strong> upgrades required - customers must either upgrade to 10.8.2 or downgrade to 10.7.3 to restore functionality.</p>
</li>
<li>
<p>Recovery process requires installing new package and performing plugin <strong>reset</strong> using provided script or nessuscli command. Tenable plans to resume plugin feed by end of day to restore normal operations.</p>
</li>
</ul>
<h3 id="critical-windows-ldap-vulnerabilities-enable-dos-and-rce-on-domain-controllers"><a href="https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html?ref=mandos.io">Critical Windows LDAP Vulnerabilities Enable DoS and RCE on Domain Controllers</a></h3>
<ul>
<li>
<p>Newly released <strong>LDAPNightmare</strong> PoC exploit targets CVE-2024-49113 (CVSS 7.5), causing LSASS crashes and forced reboots on unpatched Windows Domain Controllers through malicious CLDAP referral responses.</p>
</li>
<li>
<p>The same attack chain can be modified to achieve <strong>remote code execution</strong> via CVE-2024-49112 (CVSS 9.8), requiring only that the victim DC's DNS server has Internet connectivity, with no authentication needed.</p>
</li>
<li>
<p>Organizations should immediately apply December 2024 patches or implement detection mechanisms for suspicious <strong>DCE/RPC</strong> requests and CLDAP referral responses targeting the <strong>LDAP</strong> service.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cost-saving-strategies-for-enterprise-cybersecurity-budgets-revealed"><a href="https://www.csoonline.com/article/3627485/blown-the-cybersecurity-budget-here-are-7-ways-cyber-pros-can-save-money.html?ref=mandos.io">Cost-Saving Strategies for Enterprise Cybersecurity Budgets Revealed</a></h3>
<ul>
<li>
<p>Implementing strong <strong>governance</strong> frameworks helps determine true security costs and accountability, leading to better budget allocation and reduced inefficiencies across teams.</p>
</li>
<li>
<p>Organizations can achieve up to 30% savings through vendor management tactics, including avoiding auto-renewals, consolidating tools, and leveraging included <strong>SLA</strong> resources instead of external consultants.</p>
</li>
<li>
<p>Deploying <strong>automation</strong> and AI capabilities in security operations can deliver equivalent work of 1-2 analysts, while creating security champions programs helps reduce incident response costs through improved organizational security culture.</p>
</li>
</ul>
<h3 id="aws-oidc-integration-security-critical-conditions-required-to-prevent-unauthorized-access"><a href="https://www.wiz.io/blog/avoiding-mistakes-with-aws-oidc-integration-conditions?ref=mandos.io">AWS OIDC Integration Security: Critical Conditions Required to Prevent Unauthorized Access</a></h3>
<ul>
<li>
<p>Missing required <strong>conditions</strong> in AWS IAM trust policies for OIDC integrations can allow unauthorized third-party access, with researchers identifying vulnerabilities in GitHub Actions, Terraform Cloud, Microsoft Defender, and GitLab implementations.</p>
</li>
<li>
<p>Each vendor integration requires specific trust policy conditions - while "sub" and "aud" conditions are common, some providers like Microsoft Defender use unique conditions like <strong>sts:RoleSessionName</strong> or custom tags for authentication.</p>
</li>
<li>
<p>AWS has implemented safeguards including Access Analyzer policy checks and built-in identity providers with mandatory <strong>validation</strong> requirements, though legacy configurations may still be vulnerable if missing proper conditional elements.</p>
</li>
</ul>
<h3 id="mastercard-report-shows-small-businesses-score-low-on-cybersecurity-readiness"><a href="https://drive.google.com/file/d/1vqSbD47imCK0blztEpwCuHH-uLizjphi/view?ref=mandos.io">Mastercard Report Shows Small Businesses Score Low on Cybersecurity Readiness</a></h3>
<ul>
<li>
<p>Average cybersecurity assessment score of <strong>38%</strong> reveals significant vulnerabilities among small businesses, with nearly <strong>50%</strong> of all cyberattacks targeting SMBs, potentially leading to business closure.</p>
</li>
<li>
<p>Key impact areas identified include business interruption, sensitive data loss, and financial damages, with <strong>87%</strong> of consumers willing to abandon businesses they don't trust with data handling.</p>
</li>
<li>
<p>Report emphasizes critical need for basic security measures including access management, antivirus protection, and <strong>phishing</strong> awareness training to strengthen small business cyber defenses.</p>
</li>
</ul>
<p><strong>Discover my collection of industry reports, guides and cheat sheets in </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-leadership-compensation-and-organization-trends-for-2024"><a href="https://drive.google.com/file/d/1A6wffFXjeA5HN2nDr09h5bSDhwshn0al/view?ref=mandos.io">Cybersecurity Leadership Compensation and Organization Trends for 2024</a></h3>
<ul>
<li>
<p>Average total compensation for key cybersecurity leadership roles is <strong>$280,000</strong>, with financial services, tech, and consumer goods sectors leading in pay scales. <strong>Deputy CISOs</strong> and product security heads command highest salaries.</p>
</li>
<li>
<p>Organization size significantly impacts compensation - security leaders at companies with <strong>$10B+</strong> revenue earn 44% more than those at smaller firms, with top-quartile packages reaching <strong>$421,000</strong> at large enterprises.</p>
</li>
<li>
<p>Security team structures evolve with company size: Fortune-size organizations ($6B+ revenue) typically employ 50+ security staff, while midsize companies ($50M-$400M) maintain smaller teams of under 15 personnel, with budgets ranging from <strong>$1.4M</strong> to $40M.</p>
</li>
</ul>
<h3 id="security-professional-returns-to-soc-role-due-to-executive-level-burnout"><a href="https://www.reddit.com/r/cybersecurity/comments/1hspr2j/f_it_im_34m_going_back_to_the_soc/?ref=mandos.io">Security Professional Returns to SOC Role Due to Executive-Level Burnout</a></h3>
<ul>
<li>
<p>Experienced Information Security Officer cites overwhelming <strong>stakeholder</strong> management and compliance waiver requests as primary factors for leaving leadership position, with work regularly spilling into evenings and weekends</p>
</li>
<li>
<p>Professional describes constant battle with <strong>executive</strong> resistance to security measures and lack of understanding from C-suite, leading to ineffective communication and implementation of security initiatives</p>
</li>
<li>
<p>Decision to return to hands-on <strong>incident response</strong> work (L1-L3) prioritizes technical expertise over career advancement, highlighting growing trend of security professionals choosing operational roles over management positions due to <strong>burnout</strong></p>
</li>
</ul>
<h3 id="entry-level-cybersecurity-certifications-guide-top-12-options-for-career-launch"><a href="https://www.csoonline.com/article/3626956/12-best-entry-level-cybersecurity-certifications.html?ref=mandos.io">Entry-Level Cybersecurity Certifications Guide: Top 12 Options for Career Launch</a></h3>
<ul>
<li>
<p>The most valuable certifications combine low barriers to entry with high market recognition, including CompTIA Security+ and AWS Certified Security, with cloud security being the most <strong>in-demand</strong> skill according to ISC2.</p>
</li>
<li>
<p>Many certifications advertised as entry-level have flexible prerequisites, such as the Certified Cloud Security Professional (CCSP), which allows candidates to bypass the 5-year experience requirement through education or earn Associate status while gaining experience.</p>
</li>
<li>
<p>Certifications focusing on practical skills like <strong>ethical hacking</strong> (CEH) and <strong>penetration testing</strong> (OSCP) command higher pay premiums, with some advanced certifications offering up to 15% salary <strong>premiums</strong> over non-certified professionals.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="rand-report-outlines-framework-for-securing-ai-model-weights-against-theft"><a href="https://drive.google.com/file/d/1EYRK_AWYe_414GxeB8czptEgovWrMT_8/view?ref=mandos.io">RAND Report Outlines Framework for Securing AI Model Weights Against Theft</a></h3>
<ul>
<li>
<p>Report identifies <strong>38 attack vectors</strong> that could compromise AI model weights, with varying feasibility levels from opportunistic criminals to nation-state actors.</p>
</li>
<li>
<p>Proposes <strong>five security levels</strong> with benchmark systems to protect against increasingly capable threat actors, emphasizing that current defenses may be insufficient against sophisticated state-level attacks.</p>
</li>
<li>
<p>Recommends urgent priorities including centralizing weight copies, implementing <strong>insider threat</strong> programs, and investing in <strong>confidential computing</strong> - noting these measures should start immediately as advanced security could take 5+ years to develop.</p>
</li>
</ul>
<h3 id="ai-factory-security-requires-api-protection-as-foundation"><a href="https://www.f5.com/company/blog/api-security-for-ai-factories?ref=mandos.io">AI Factory Security Requires API Protection as Foundation</a></h3>
<ul>
<li>
<p>AI applications are fundamentally dependent on <strong>APIs</strong> for model training, inference, and deployment, making these interfaces critical attack vectors that require robust security controls and visibility from the design phase.</p>
</li>
<li>
<p>Modern AI factories, which transform raw data into intelligence, face heightened security challenges due to their distributed nature and <strong>RAG</strong> (Retrieval Augmented Generation) systems, extending beyond traditional application security concerns.</p>
</li>
<li>
<p>Organizations must implement comprehensive API security measures including <strong>rate limiting</strong> and data sanitization early in development to protect against model theft, jailbreaking attempts, and data exfiltration through AI interfaces.</p>
</li>
</ul>
<h3 id="ai-application-security-blueprint-outlines-six-layer-defense-framework"><a href="https://drive.google.com/file/d/1p48qC0pPCreKja8kxOUtvViRXNaWuBAC/view?ref=mandos.io">AI Application Security Blueprint Outlines Six-Layer Defense Framework</a></h3>
<ul>
<li>
<p><strong>LLM</strong> applications require comprehensive security across multiple components, including application services, integration layers, and model interactions, with special focus on protecting both general knowledge and domain-specific capabilities.</p>
</li>
<li>
<p>Organizations must implement security controls at six distinct layers to protect against emerging <strong>attack vectors</strong> targeting AI systems, particularly focusing on prompt template security and data handling in Retrieval-Augmented Generation (RAG).</p>
</li>
<li>
<p>The framework emphasizes securing the entire AI stack, from user interface to model layer, with specific attention to <strong>authentication</strong> mechanisms and <strong>vector database</strong> protection to maintain application integrity and prevent unauthorized access.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="major-cybersecurity-ma-deals-in-2024-topped-by-28b-cisco-splunk-transaction"><a href="https://www.infosecurity-magazine.com/news-features/top-cybersecurity-mergers/?ref=mandos.io">Major Cybersecurity M&amp;A Deals in 2024 Topped by $28B Cisco-Splunk Transaction</a></h3>
<ul>
<li>
<p>Cisco completed its largest-ever acquisition by purchasing <strong>Splunk</strong> for $28 billion, while private equity firm Thoma Bravo acquired UK-based Darktrace for $5.3 billion, showing continued strong investment in cybersecurity despite economic headwinds.</p>
</li>
<li>
<p>Market consolidation was driven by demand for comprehensive security solutions, with focus on <strong>MDR</strong> services and SOC capabilities. Notable deals included CyberArk's $1.54B Venafi acquisition and Mastercard's $2.65B purchase of Recorded Future.</p>
</li>
<li>
<p>Industry analysts expect increased M&amp;A activity in 2025, particularly targeting companies with <strong>AI</strong> capabilities and automation technologies that can help address the cyber skills gap and improve operational efficiency.</p>
</li>
</ul>
<h3 id="digital-id-startup-verid-raises-%E2%82%AC2m-to-support-eu-eidas-20-compliance"><a href="https://siliconangle.com/2025/01/02/digital-identity-verification-startup-ver-id-raises-e2m-help-euro-firms-adhere-eidas-2-0/?ref=mandos.io">Digital ID Startup Ver.ID Raises €2M to Support EU eIDAS 2.0 Compliance</a></h3>
<ul>
<li>
<p>Amsterdam-based Ver.ID secured funding to help European companies implement <strong>cross-border</strong> digital identity verification solutions compliant with eIDAS 2.0 framework, focusing on digital wallet integration and authentication services.</p>
</li>
<li>
<p>The company's platform supports multiple payment methods and aims to reduce <strong>fraud</strong> risks while simplifying user experience, currently piloting with Netherlands' Chamber of Commerce for executive authorization verification.</p>
</li>
<li>
<p>Platform development targets growing digital identity market, estimated to reach <strong>$72 billion</strong> by 2028, with focus on serving businesses requiring enhanced <strong>compliance</strong> with EU's new digital identification standards.</p>
</li>
</ul>
<h3 id="rubrik-gains-fedramp-approval-and-expands-cloud-security-services"><a href="https://www.entrepreneur.com/finance/rubrik-inc-under-the-radar-cyber-security-stock-gains/485036?ref=mandos.io">Rubrik Gains FedRAMP Approval and Expands Cloud Security Services</a></h3>
<ul>
<li>
<p>Received <strong>FedRAMP</strong> certification through National Nuclear Security Administration endorsement, positioning the company to tap into $27.5B government cybersecurity market by 2025.</p>
</li>
<li>
<p>Company's <strong>revenue</strong> growth accelerated from 9.6% to 15% in Q3, with major clients including PepsiCo, Allstate, Home Depot, and AMD adopting their data security solutions.</p>
</li>
<li>
<p>Launching new <strong>API</strong> tools enabling secure data connections to Microsoft Azure and AWS cloud infrastructure, with focus on facilitating <strong>AI</strong> development security.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="syft"><a href="https://cybersectools.com/tools/syft?ref=mandos.io">Syft</a></h3>
<p>A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.</p>
<h3 id="grype"><a href="https://cybersectools.com/tools/grype?ref=mandos.io">Grype</a></h3>
<p>Grype is a vulnerability scanner for container images and filesystems that scans for known vulnerabilities and supports various image formats.</p>
<h3 id="anchore-enterprise"><a href="https://cybersectools.com/tools/anchore-enterprise?ref=mandos.io">Anchore Enterprise</a></h3>
<p>Anchore Enterprise is a platform that protects and secures software supply chains end-to-end.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #84: Chrome Extension Attacks, Amazon Redshift Vulns, PAN-OS DoS ]]></title>
        <description><![CDATA[ Alarming burnout statistics show 25% of security leaders want to quit. 1.29TB of sensitive data exposed by Builder.ai. LLMs enable new malware evasion techniques. ]]></description>
        <link>https://mandos.io/newsletter/brief-84-chrome-extension-attacks-amazon-redshift-vulns-pan-os-dos/</link>
        <guid isPermaLink="false">676fe26e296f8700010c1686</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 29 Dec 2024 13:00:58 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/12/52.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday and Happy Holidays!<br><br>Before diving into today's Brief, I want to express thank you all for your incredible support and engagement throughout 2024. </p><p>This year has been remarkable – Mandos community has grown more than 450%, thanks to your active participation and valuable feedback, which has helped me shape the format and enhance the value I want to deliver to you.<br><br>Your continued input remains invaluable, and I'm truly honored to serve our  community of cybersecurity leaders, professionals and enthusiasts.</p><p>Thank you!<br><br>Now, let's get into this week's Brief. I hope you're energized and ready for the challenges and opportunities in the new year!</p><p>In this edition, I am covering:</p><ul><li>A widespread Chrome extension compromise affecting 140,000+ users through supply chain attacks</li><li>New research on emerging threats for 2025, including AI-driven attacks and evolving ransomware tactics</li><li>Concerning findings about security team burnout, with 25% of leaders considering leaving the field</li></ul><p>And much more.</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->

<!--kg-card-begin: html-->
<div style="width:90%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 1rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsored
        </span>
        <div style="display: flex; align-items: center; justify-content: center; gap: 1rem;">
            <img src="https://kcjlih8bwjd7vpzd.public.blob.vercel-storage.com/infosechired-U6U90c3Q6Cba3cSOZeZKsqvzJIuopf.webp" 
                 style="height: 2.5rem; width: auto;" />
            <h3 style="margin: 0; font-size: 2.5rem; font-weight: 800; color: white; line-height: 1.2;">
                InfoSecHired
            </h3>
        </div>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1.25rem; line-height: 1.6; color: #e5e7eb;">
            Cybersecurity job market is hyper-competitive and standing out is harder than ever.
        </p>

              <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1.25rem; line-height: 1.6; color: #e5e7eb;">
            InfoSecHired's AI-powered platform helps you break through the noise with perfectly tailored resumes and applications in just 60 seconds. Built by cybersecurity hiring managers, InfoSecHired delivers 4x higher interview success rates by optimizing every application for ATS systems while highlighting your most relevant skills and experience.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://infosechired.com/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.75rem 1.5rem; font-weight: 600; font-size: 1.125rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out; border: 2px solid #00A383;">
                Tailor My Resume →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="chrome-extension-supply-chain-attack-impacts-multiple-security-tools"><a href="https://www.bleepingcomputer.com/news/security/cybersecurity-firms-chrome-extension-hijacked-to-steal-users-data/?ref=mandos.io">Chrome Extension Supply Chain Attack Impacts Multiple Security Tools</a></h3>
<ul>
<li>
<p><strong>Cyberhaven's</strong> Chrome extension was compromised through a phishing attack on an admin account, allowing attackers to publish a malicious version that steals session data and cookies through cyberhavenext[.]pro domain.</p>
</li>
<li>
<p>Investigation revealed four additional compromised extensions (Internxt VPN, VPNCity, Uvoice, ParrotTalks) affecting over 140,000 users combined, all containing similar <strong>malicious code</strong> for data exfiltration.</p>
</li>
<li>
<p>Affected users should upgrade to versions released after December 26, reset passwords, clear browser data, and consider complete <strong>extension removal</strong> if uncertain about security status.</p>
</li>
</ul>
<h3 id="amazon-redshift-drivers-hit-by-three-high-severity-sql-injection-vulnerabilities"><a href="https://www.forbes.com/sites/daveywinder/2024/12/26/amazon-security-warning-as-3-high-rated-vulnerabilities-hit-cloud/?ref=mandos.io">Amazon Redshift Drivers Hit by Three High-Severity SQL Injection Vulnerabilities</a></h3>
<ul>
<li>
<p>Three <strong>high-severity</strong> vulnerabilities (CVE-2024-12744/45/46) discovered in Amazon Redshift drivers, each with a CVSS score of 8.0, potentially allowing <strong>privilege escalation</strong> through SQL injection attacks.</p>
</li>
<li>
<p>Affected components include the Java Database Connectivity Driver (2.1.0.31), Python Connector (2.1.4), and Open Database Connectivity Driver (v2.1.5.0). Amazon released <strong>patches</strong> on December 23rd with new versions available for all affected drivers.</p>
</li>
<li>
<p>The vulnerabilities impact Amazon Redshift's data warehousing platform, which processes up to 16 petabytes of data per cluster. Users are advised to either upgrade to the latest versions or revert to specific previous <strong>stable</strong> versions as detailed in Amazon's security bulletin.</p>
</li>
</ul>
<h3 id="palo-alto-networks-firewalls-targeted-through-active-dos-vulnerability-exploitation"><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls/?ref=mandos.io">Palo Alto Networks Firewalls Targeted Through Active DoS Vulnerability Exploitation</a></h3>
<ul>
<li>
<p>Critical <strong>CVE-2024-3393</strong> vulnerability allows unauthenticated attackers to trigger firewall reboots by sending malicious DNS packets, with repeated attacks forcing devices into maintenance mode requiring manual recovery.</p>
</li>
<li>
<p>Vulnerability affects multiple PAN-OS versions and requires 'DNS Security' logging to be enabled. Palo Alto has released patches in versions 10.1.14-h8, 10.2.10-h12, 11.1.5, and 11.2.3, though version 11.0 remains unpatched due to EOL status.</p>
</li>
<li>
<p>Company provides temporary <strong>mitigation</strong> options including disabling DNS Security logging across affected devices, with separate procedures for unmanaged NGFWs, Panorama-managed systems, and <strong>Prisma</strong> Access deployments.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="top-10-emerging-cybersecurity-threats-expected-for-2025"><a href="https://www.darkreading.com/vulnerabilities-threats/emerging-threats-vulnerabilities-prepare-2025?ref=mandos.io">Top 10 Emerging Cybersecurity Threats Expected for 2025</a></h3>
<ul>
<li>
<p>Zero-day exploits and supply chain attacks remain critical concerns, with <strong>AI-driven</strong> tools expected to accelerate both attack and defense capabilities. Notable examples include Log4Shell and SolarWinds incidents, highlighting the cascading impact of these threats.</p>
</li>
<li>
<p>Remote work infrastructure continues to be vulnerable, with threat actors targeting VPNs and RDPs. The rise of <strong>cloud misconfigurations</strong> poses significant risks, particularly in AWS and Microsoft environments, leading to data breaches and unauthorized access.</p>
</li>
<li>
<p>Emerging threats include exploitation of AI systems, IoT vulnerabilities, and <strong>5G network</strong> weaknesses. <strong>Ransomware</strong> continues to evolve, with some threat actors moving beyond encryption to data deletion, potentially rendering traditional backup strategies insufficient.</p>
</li>
</ul>
<h3 id="eu-cybersecurity-state-report-highlights-key-policy-and-threat-developments"><a href="https://drive.google.com/file/d/1TNSw4-jdfXjGge4TtBxF5M6lSC6mNRr4/view?ref=mandos.io">EU Cybersecurity State Report Highlights Key Policy and Threat Developments</a></h3>
<ul>
<li>
<p>The report marks a significant policy milestone with <strong>NIS2</strong> implementation, alongside other initiatives like CRA, CSOA, and EUDIF, establishing comprehensive frameworks for EU-wide cybersecurity improvements.</p>
</li>
<li>
<p>Current threat landscape shows increasing incidents across EU, with <strong>ransomware</strong> and <strong>DDoS</strong> attacks being the predominant attack vectors amid volatile geopolitical conditions.</p>
</li>
<li>
<p>Report recommends strengthening technical and financial support through existing structures like NIS Cooperation Group, while emphasizing the need for enhanced <strong>supply chain</strong> security and cybersecurity skills development.</p>
</li>
</ul>
<h3 id="group-ib-north-america-intelligence-reportamerican-healthcare-sector-hit-by-multiple-ransomware-groups-in-december"><a href="https://drive.google.com/file/d/1vI4PvBRUe9FuanIIRo2--A2JyzLZ6Jcf/view?ref=mandos.io">Group-IB North America Intelligence Report - American Healthcare Sector Hit by Multiple Ransomware Groups in December</a></h3>
<ul>
<li>
<p>At least 9 <strong>healthcare</strong> facilities across US and Canada were targeted by ransomware attacks, with threat actors including <strong>RansomHub</strong>, <strong>Rhysida</strong>, and <strong>Lynx</strong> groups actively compromising medical institutions.</p>
</li>
<li>
<p>Novel phishing techniques emerged using <strong>Blob URIs</strong> and IPFS (InterPlanetary File System), making attack detection and takedown more challenging as threat actors bypass traditional URL filtering and utilize decentralized hosting.</p>
</li>
<li>
<p>Significant APT activity observed with <strong>Lazarus</strong> group deploying new macOS malware "RustyAttr" using extended attributes for evasion, while MuddyWater APT targeted law enforcement near Iranian borders.</p>
</li>
</ul>
<p><strong>Discover my collection of industry reports, guides and cheat sheets in </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="working-in-cyber-threat-intelligence-cti"><a href="https://infosecwriteups.com/working-in-cyber-threat-intelligence-cti-295f299a2453?source=rss----7b722bfd1b8d---4">Working in Cyber Threat Intelligence (CTI)</a></h3>
<ul>
<li>
<p>Cyber Threat Intelligence (CTI) primarily involves analyzing <strong>adversary behavior</strong> and providing context about intrusion activities to help security teams prioritize defense efforts - it's "intrusion analysis on steroids"</p>
</li>
<li>
<p>CTI analysts support multiple stakeholders by collecting and analyzing intrusion data to identify <strong>trends</strong> and correlations, helping teams like SOC, Threat Hunting, and Detection Engineering focus on the most relevant threats</p>
</li>
<li>
<p>The role requires understanding of <strong>pentesting</strong> and <strong>malware analysis</strong> skills to better inform defensive strategies, but differs from pure security testing by focusing on threat actor capabilities, intent, and opportunities to cause harm</p>
</li>
</ul>
<h3 id="career-paths-in-hands-on-cybersecurity-from-access-management-to-technical-operations"><a href="https://www.reddit.com/r/cybersecurity/comments/1hnmfmo/handson_cybersecurity_jobs/?ref=mandos.io">Career Paths in Hands-On Cybersecurity: From Access Management to Technical Operations</a></h3>
<ul>
<li>
<p>Entry-level <strong>Information Assurance</strong> roles can serve as stepping stones to more technical positions, with file access management providing foundational experience in implementing least privilege principles and security controls.</p>
</li>
<li>
<p>Technical career paths include <strong>SOC</strong> analyst roles, penetration testing, and DFIR work, with training resources like Hack The Box and OffSec providing practical certification paths for skill development.</p>
</li>
<li>
<p>Alternative paths include <strong>Security Administrator</strong> positions managing multiple security tools (EDR, firewalls, IAM) and specialized roles in <strong>infrastructure</strong> security, such as secure communications systems and public safety networks.</p>
</li>
</ul>
<h3 id="cybersecurity-staff-burnout-study-reveals-alarming-statistics-and-recovery-challenges"><a href="https://www.darkreading.com/vulnerabilities-threats/defining-defying-cybersecurity-staff-burnout?ref=mandos.io">Cybersecurity Staff Burnout Study Reveals Alarming Statistics and Recovery Challenges</a></h3>
<ul>
<li>
<p>Study shows 25% of security leaders want to quit, with 45% using <strong>substances</strong> to cope with work pressure and 69% experiencing social withdrawal, indicating severe workplace stress impacts.</p>
</li>
<li>
<p>WHO defines burnout through three dimensions: energy depletion, job negativity, and reduced effectiveness, with recovery taking significantly longer than standard stress - over 1 year compared to 6-12 weeks for regular stress.</p>
</li>
<li>
<p>Security leaders recommend implementing regular <strong>one-on-ones</strong>, workload auditing, and professional <strong>psychotherapy</strong> as preventive measures, while emphasizing the importance of work-life balance and proper time off for <strong>recovery</strong>.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="builderai-exposes-129tb-database-including-pii-and-business-data-through-cloud-misconfiguration"><a href="https://siliconangle.com/2024/12/19/database-belonging-builder-ai-found-exposing-1-29tb-3m-records/?ref=mandos.io">Builder.ai Exposes 1.29TB Database Including PII and Business Data Through Cloud Misconfiguration</a></h3>
<ul>
<li>
<p>Exposed database contained over 3M records including <strong>PII</strong> of clients (names, emails, addresses) and sensitive project details, discovered on an unsecured cloud storage system belonging to the AI-powered development platform.</p>
</li>
<li>
<p>Despite being notified on October 28, the company took nearly a month to address the <strong>misconfiguration</strong>, citing "complexities with dependent systems" - raising concerns about incident response capabilities and potential <strong>GDPR</strong> compliance issues.</p>
</li>
<li>
<p>Exposed data included internal communications, project plans, and <strong>financial</strong> records such as invoices and payment details, potentially compromising both client and company operations of the VC-backed startup.</p>
</li>
</ul>
<h3 id="llms-used-to-evade-javascript-malware-detection-through-code-obfuscation"><a href="https://unit42.paloaltonetworks.com/using-llms-obfuscate-malicious-javascript/?ref=mandos.io">LLMs Used to Evade JavaScript Malware Detection Through Code Obfuscation</a></h3>
<ul>
<li>
<p>Researchers developed an <strong>adversarial algorithm</strong> that uses LLMs to rewrite malicious JavaScript code, successfully evading detection 88% of the time while maintaining original malicious functionality.</p>
</li>
<li>
<p>The technique applies iterative transformations like variable renaming and dead code insertion, producing more <strong>natural-looking obfuscation</strong> compared to traditional tools, making detection significantly harder for security vendors.</p>
</li>
<li>
<p>Researchers defended against this by using <strong>data augmentation</strong> - retraining detection models on 10,000 LLM-rewritten samples improved real-world malware detection rates by 10% and is now deployed in production.</p>
</li>
</ul>
<h3 id="side-channel-attack-extracts-ai-model-details-from-google-edge-tpu"><a href="https://www.theregister.com/2024/12/18/ai_model_reveal_itself/?ref=mandos.io">Side-Channel Attack Extracts AI Model Details from Google Edge TPU</a></h3>
<ul>
<li>
<p>Researchers at North Carolina State University developed a novel <strong>electromagnetic</strong> side-channel attack that can extract hyperparameters from AI models running on Google Edge TPUs with 99.91% accuracy, requiring physical device access and specialized measurement hardware.</p>
</li>
<li>
<p>The attack method, dubbed "TPUXtract," sequentially extracts neural network layer information, taking approximately 3 hours per layer to process. Successfully tested on popular models like <strong>MobileNet</strong> V3, Inception V3, and ResNet-50.</p>
</li>
<li>
<p>The vulnerability primarily affects devices without memory <strong>encryption</strong>, like the Coral Dev Board, allowing attackers to potentially recreate proprietary AI models at significantly reduced costs compared to original training expenses.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="opswat-acquires-fend-to-strengthen-critical-infrastructure-protection-with-data-diode-technology"><a href="https://siliconangle.com/2024/12/18/opswat-acquires-fend-enhance-industrial-cybersecurity-data-diode-technology/?ref=mandos.io">OPSWAT Acquires Fend to Strengthen Critical Infrastructure Protection with Data Diode Technology</a></h3>
<ul>
<li>
<p>OPSWAT has acquired Fend Inc., enhancing its portfolio with <strong>hardware-based</strong> security solutions that enforce one-way data flow through optical isolation, specifically designed to protect industrial control systems from cyber threats.</p>
</li>
<li>
<p>Fend's technology serves major <strong>critical infrastructure</strong> sectors including U.S. government agencies, utilities, and oil &amp; gas companies, with notable clients such as the U.S. Army Corps of Engineers, ExxonMobil, and Naval Facilities Engineering Systems Command.</p>
</li>
<li>
<p>The acquisition expands OPSWAT's capabilities to include <strong>unidirectional</strong> security solutions that support both legacy systems and emerging technologies like 5G, while maintaining <strong>air-gapped</strong> environments essential for critical infrastructure defense.</p>
</li>
</ul>
<h3 id="cybersecurity-certification-market-to-reach-803b-by-2030-driven-by-skills-gap"><a href="https://finance.yahoo.com/news/comprehensive-analysis-cybersecurity-certification-market-124600902.html?ref=mandos.io">Cybersecurity Certification Market to Reach $8.03B by 2030, Driven by Skills Gap</a></h3>
<ul>
<li>
<p>Global cybersecurity certification market projected to grow from $3.98B to $8.03B at <strong>12.4%</strong> CAGR, fueled by critical shortage of over <strong>3.5 million</strong> cybersecurity professionals worldwide.</p>
</li>
<li>
<p>Market growth driven by increasing regulatory requirements including <strong>GDPR</strong>, EU Cybersecurity Act, and CMMC, alongside rising demand for specialized certifications in cloud security, AI, and blockchain.</p>
</li>
<li>
<p>Leading certification providers include SGS, Bureau Veritas, and TUV SUD, with Information Security certifications segment capturing largest market share due to compliance requirements and emerging <strong>threat landscape</strong>.</p>
</li>
</ul>
<h3 id="cybersecurity-market-growth-drives-focus-on-revenue-operations-excellence"><a href="https://www.inc.com/andybyrne/how-top-cybersecurity-firms-are-scaling-faster-and-smarter-to-win-in-2025/91068470?ref=mandos.io">Cybersecurity Market Growth Drives Focus on Revenue Operations Excellence</a></h3>
<ul>
<li>
<p>Global cybersecurity spending projected to reach <strong>$212 billion</strong> by 2025, representing a 15% increase from 2024, creating intense competition among vendors to capture market share.</p>
</li>
<li>
<p>Leading cybersecurity companies like <strong>Fortinet</strong> are achieving remarkable forecasting accuracy (97%) by centralizing revenue operations data and implementing unified data systems for better decision-making.</p>
</li>
<li>
<p><strong>Okta</strong>'s pre-IPO transformation demonstrates how structured forecasting frameworks and cross-functional alignment in <strong>RevOps</strong> can transform chaotic sales processes into predictable revenue growth.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="verisys-file-integirty-monitoring"><a href="https://cybersectools.com/tools/verisys-file-integrity-monitoring?ref=mandos.io">Verisys File Integirty Monitoring</a></h3>
<p>A next-generation file integrity monitoring and change detection system.</p>
<h3 id="scout-insight"><a href="https://cybersectools.com/tools/scout-insight?ref=mandos.io">Scout Insight</a></h3>
<p>Provides advanced external threat intelligence to help organizations proactively identify and mitigate potential security threats.</p>
<h3 id="bloodhound"><a href="https://cybersectools.com/tools/bloodhound?ref=mandos.io">BloodHound</a></h3>
<p>A tool that uses graph theory to reveal hidden relationships and attack paths in an Active Directory environment.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #83: TP-Link Ban, LastPass Breach Impact, SOC Analyst Crisis ]]></title>
        <description><![CDATA[ New vishing attacks target Teams users. APIs get compromised in under 2 minutes. Arctic Wolf makes major endpoint security move. ]]></description>
        <link>https://mandos.io/newsletter/brief-83-tp-link-ban-lastpass-breach-impact-soc-analyst-crisis/</link>
        <guid isPermaLink="false">6766b0e35211980001c3e93b</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 22 Dec 2024 13:00:11 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/12/51.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday! </p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>TP-Link routers under U.S. federal investigation with potential 2025 sales ban</li><li>New findings reveal 67% of open source vulnerabilities are silently patched</li><li>CISA's new cloud security standards that will reshape federal IT</li></ul><p>Plus updates on major acquisitions, career insights, and practical security tools to strengthen your defense strategy.</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->

<!--kg-card-begin: html-->
<div style="width:90%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 1rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsored
        </span>
        <div style="display: flex; align-items: center; justify-content: center; gap: 1rem;">
            <img src="https://kcjlih8bwjd7vpzd.public.blob.vercel-storage.com/infosechired-U6U90c3Q6Cba3cSOZeZKsqvzJIuopf.webp" 
                 style="height: 2.5rem; width: auto;" />
            <h3 style="margin: 0; font-size: 2.5rem; font-weight: 800; color: white; line-height: 1.2;">
                InfoSecHired
            </h3>
        </div>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1.25rem; line-height: 1.6; color: #e5e7eb;">
            AI-powered platform that helps cybersecurity professionals land their dream jobs with 4x higher interview success rates. InfoSecHired's smart AI agents analyze job descriptions and your resume to create tailored applications in minutes, saving you 3+ hours per application while optimizing for ATS systems.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://infosechired.com/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.75rem 1.5rem; font-weight: 600; font-size: 1.125rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out; border: 2px solid #00A383;">
                Learn More →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="us-government-investigates-tp-link-routers-over-national-security-concerns"><a href="https://arstechnica.com/tech-policy/2024/12/report-us-considers-banning-tp-link-routers-over-security-flaws-ties-to-china/?ref=mandos.io">US Government Investigates TP-Link Routers Over National Security Concerns</a></h3>
<ul>
<li>
<p>TP-Link routers, commanding a significant market share in US homes and federal agencies including the <strong>Defense Department</strong>, are under investigation for potential national security risks, with possible sales ban in 2025.</p>
</li>
<li>
<p>Chinese state-sponsored hackers have been using a <strong>botnet</strong> of compromised TP-Link routers to launch attacks against Microsoft Azure cloud services, though no evidence suggests TP-Link's direct involvement.</p>
</li>
<li>
<p>The company faces multiple federal investigations, including concerns over security <strong>vulnerabilities</strong> and pricing practices, while maintaining presence in sensitive locations like US military bases through Army, Air Force, and Navy exchanges.</p>
</li>
</ul>
<h3 id="lastpass-data-breach-leads-to-53m-cryptocurrency-theft-in-december-2024"><a href="https://www.forbes.com/sites/daveywinder/2024/12/18/lastpass-hackers-allegedly-stole-5-million-this-week-report/?ref=mandos.io">LastPass Data Breach Leads to $5.3M Cryptocurrency Theft in December 2024</a></h3>
<ul>
<li>
<p>Blockchain investigator ZachXBT reports that <strong>threat actors</strong> exploited data from LastPass's 2022 breach to steal $5.36 million in cryptocurrency from over 40 victims across December 16-17, 2024. Stolen funds were converted to ETH and transferred through various exchanges.</p>
</li>
<li>
<p>LastPass's Chief Secure Technology Officer states no conclusive evidence links the <strong>cryptocurrency</strong> thefts to the 2022 incident, though they continue investigating claims through their Threat Intelligence team.</p>
</li>
<li>
<p>The 2022 breach exposed customer vault data backups stored in <strong>cloud-based</strong> storage, with LastPass warning users with weak master passwords to change stored site credentials due to potential <strong>decryption</strong> risks.</p>
</li>
</ul>
<h3 id="microsoft-teams-vishing-attack-delivers-darkgate-rat-through-remote-access-tools"><a href="https://www.darkreading.com/cyberattacks-data-breaches/vishing-via-microsoft-teams-spreads-darkgate-rat?ref=mandos.io">Microsoft Teams Vishing Attack Delivers DarkGate RAT Through Remote Access Tools</a></h3>
<ul>
<li>
<p>Threat actors conducted a <strong>vishing</strong> attack via Microsoft Teams, following a phishing email campaign, attempting to install remote support tools to ultimately deliver the DarkGate RAT to the victim's device.</p>
</li>
<li>
<p>The attackers used social engineering to convince the target to install <strong>AnyDesk</strong>, establishing a C2 connection to deploy DarkGate through an <strong>AutoIt</strong> script, enabling remote control, command execution, and system information gathering.</p>
</li>
<li>
<p>The malware's capabilities include <strong>cryptocurrency</strong> mining, keylogging, privilege escalation, browser data theft, and the ability to deploy additional RATs like Remcos, demonstrating the expanding delivery methods of DarkGate beyond traditional phishing and malvertising.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="api-honeypot-study-reveals-rapid-discovery-and-targeting-of-new-apis"><a href="https://drive.google.com/file/d/1q9sRDyUrvspXTB98LPAY6f8dca1UGd3y/view?usp=share_link&ref=mandos.io">API Honeypot Study Reveals Rapid Discovery and Targeting of New APIs</a></h3>
<ul>
<li>
<p>First-ever API honeypot deployment across 14 global locations shows new APIs are discovered and targeted in under <strong>2 minutes</strong>, with port 80 (19%) being most probed, followed by unexpected port <strong>26657</strong> for blockchain services.</p>
</li>
<li>
<p>Study reveals 54.4% of total attacks specifically target APIs over web applications, with common endpoints like "/status" and "/info" being rapidly discovered. Top attack types include <strong>authentication</strong> checks (26%) and service discovery attempts (34%).</p>
</li>
<li>
<p>Analysis of 337 unique API requests shows attackers frequently probe for known services like <strong>Docker</strong>, Grafana, and Prometheus, with 40% of top-50 common API requests attempting to exploit specific CVEs.</p>
</li>
</ul>
<h3 id="cisa-issues-bod-25-01-mandating-secure-cloud-configuration-standards"><a href="https://www.cisa.gov/resources-tools/services/bod-25-01-implementing-secure-practices-cloud-services-required-configurations?ref=mandos.io">CISA Issues BOD 25-01 Mandating Secure Cloud Configuration Standards</a></h3>
<ul>
<li>
<p>CISA released <strong>BOD 25-01</strong> requiring Federal Civilian Executive Branch agencies to implement specific Secure Cloud Business Applications (SCuBA) configurations by June 20, 2025, focusing on Microsoft 365 services including Azure AD, Defender, Exchange Online, and Teams.</p>
</li>
<li>
<p>The directive mandates strict security controls including blocking legacy authentication, enforcing <strong>phishing-resistant MFA</strong>, implementing strict external sharing policies, and enabling comprehensive audit logging across cloud services.</p>
</li>
<li>
<p>While mandatory only for federal agencies, CISA strongly recommends all organizations adopt these <strong>SCuBA</strong> baseline configurations and utilize the provided assessment tools to enhance their cloud security posture and reduce organizational risk.</p>
</li>
</ul>
<h3 id="my-linkedin-post-about-ciso-role-challenges-sparked-discussion-on-leadership-sustainability"><a href="https://www.linkedin.com/posts/nikolozk_the-ciso-role-is-fundamentally-broken-having-activity-7274783714579025920-Ncn2/?ref=mandos.io">My LinkedIn Post About CISO Role Challenges Sparked Discussion on Leadership Sustainability</a></h3>
<ul>
<li>
<p>Current CISO responsibilities deemed <strong>unsustainable</strong> with average tenure under 2 years, facing expectations to be universal security experts while managing limited resources and authority to implement change across organizations.</p>
</li>
<li>
<p>Key survival strategies include ruthless risk prioritization, delegation through strong team building, and shifting focus from complete risk elimination to effective <strong>risk management</strong> frameworks.</p>
</li>
<li>
<p>Organizations need structural changes including proper <strong>budget</strong> allocation, strategic involvement of CISOs in planning, and reformed accountability models to prevent CISOs from becoming <strong>scapegoats</strong> during security incidents.</p>
</li>
</ul>
<p><strong>Discover my collection of industry reports, guides and cheat sheets in </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="real-world-cybersecurity-career-challenges-documentation-meetings-and-incident-response"><a href="https://www.reddit.com/r/cybersecurity/comments/1hivsju/what_are_the_less_glamorous_parts_of_being_in/?ref=mandos.io">Real-World Cybersecurity Career Challenges: Documentation, Meetings, and Incident Response</a></h3>
<ul>
<li>
<p>Most security incidents (approximately <strong>90%</strong>) stem from internal mishaps rather than sophisticated attacks - including email disclosures, misconfigurations, lost devices, and users falling for phishing attempts.</p>
</li>
<li>
<p>The role involves significant administrative overhead, with professionals spending considerable time on <strong>documentation</strong>, attending meetings, and managing routine tasks like incident reports, security assessments, and control reviews.</p>
</li>
<li>
<p>Career success requires constant learning, dealing with limited <strong>budgets</strong>, and managing stress from repetitive tasks, while many incident response recommendations and root cause analyses may not lead to meaningful organizational changes.</p>
</li>
</ul>
<h3 id="cio-jerry-cochran-emphasizes-empathy-in-cybersecurity-leadership"><a href="https://www.careersinfosecurity.com/cyberedboard-profiles-in-leadership-jerry-cochran-a-27063?ref=mandos.io">CIO Jerry Cochran Emphasizes Empathy in Cybersecurity Leadership</a></h3>
<ul>
<li>
<p>Deputy CIO Jerry Cochran of Pacific Northwest National Laboratory advocates for <strong>empathy</strong> as a crucial leadership principle, emphasizing its importance in both communication with teams and understanding adversarial perspectives.</p>
</li>
<li>
<p>With over 25 years in <strong>cybersecurity</strong> experience across military, public, and private sectors, Cochran emphasizes that effective defense requires thinking like an attacker to better anticipate and prevent potential threats.</p>
</li>
<li>
<p>In his role overseeing the <strong>CISO</strong> office and enterprise IT operations at the DOE-managed laboratory, Cochran promotes a balanced approach combining empathetic leadership with <strong>data-driven</strong> decision-making strategies.</p>
</li>
</ul>
<h3 id="soc-analyst-role-faces-retention-crisis-due-to-burnout-and-limited-growth"><a href="https://www.darkreading.com/cybersecurity-operations/soc-roles-evolve-attract-new-generation?ref=mandos.io">SOC Analyst Role Faces Retention Crisis Due to Burnout and Limited Growth</a></h3>
<ul>
<li>
<p>High volume of daily <strong>alerts</strong> and false positives creates unsustainable pressure on SOC analysts, leading to widespread <strong>burnout</strong> and high turnover rates, with constant fear of missing critical security events.</p>
</li>
<li>
<p>Integration of <strong>AI</strong> solutions proposed to transform role by automating repetitive tasks, including threat intelligence enrichment, alert triage, and 24/7 monitoring, allowing analysts to focus on proactive threat hunting.</p>
</li>
<li>
<p>Organizations must implement structured career development through <strong>mentorship</strong>, specialized training, and strategic involvement in decision-making to retain talent and create sustainable career paths for SOC analysts.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-assisted-pattern-analysis-reveals-document-id-vulnerability-in-file-upload-system"><a href="https://shlomie.uk/posts/Cracking-Hashes-With-AI?ref=mandos.io">AI-Assisted Pattern Analysis Reveals Document ID Vulnerability in File Upload System</a></h3>
<ul>
<li>
<p>Initial investigation found suspicious <strong>49-character</strong> document IDs that didn't match standard hash lengths, with first characters showing patterns and last digits appearing sequential for identical file uploads.</p>
</li>
<li>
<p>Using <strong>Claude 3.5</strong> to analyze 100 generated IDs revealed that first 8 characters contained hex timestamps, enabling prediction of document IDs through timestamp manipulation in a <strong>sandwich attack</strong>.</p>
</li>
<li>
<p>The vulnerability allowed unauthorized access to other users' documents due to improper <strong>authorization</strong> mapping between user cookies and document IDs, demonstrating how AI can accelerate pattern recognition in security research.</p>
</li>
</ul>
<h3 id="security-startups-embrace-agentic-workflows-for-soc-automation-and-code-analysis"><a href="https://applied-gai-in-security.ghost.io/agentic-security-marketmap/?ref=mandos.io">Security Startups Embrace Agentic Workflows for SOC Automation and Code Analysis</a></h3>
<ul>
<li>
<p>The security startup landscape has seen significant growth in <strong>agentic solutions</strong>, particularly in three key areas: incident triage automation, code vulnerability analysis, and security copilots. Companies like Dropzone.AI and CommandZero are focusing on SOC automation to reduce manual analysis workload.</p>
</li>
<li>
<p><strong>Code security</strong> solutions are emerging to address the increasing volume of machine-generated code, with companies like Pixee AI acting as automated security engineers to identify vulnerabilities and propose fixes. These solutions are expanding to include configuration and deployment script analysis.</p>
</li>
<li>
<p>Major platforms like Microsoft Security Copilot and SentinelOne's Purple AI are leading the <strong>natural language</strong> security interface movement, while startups like Simbian AI are developing specialized agents for specific security tasks, focusing on ecosystem integration and workflow automation.</p>
</li>
</ul>
<h3 id="ai-powered-tool-discovers-67-of-open-source-vulnerabilities-go-unreported"><a href="https://www.aikido.dev/blog/meet-intel-aikidos-open-source-threat-feed-powered-by-llms?ref=mandos.io">AI-Powered Tool Discovers 67% of Open Source Vulnerabilities Go Unreported</a></h3>
<ul>
<li>
<p>Aikido Intel, powered by <strong>LLMs</strong>, has identified 511 undisclosed vulnerabilities in open-source packages since January, revealing that 67% of security patches are implemented without public disclosure, including <strong>critical</strong> severity issues.</p>
</li>
<li>
<p>Most common unreported vulnerabilities include <strong>cross-site scripting</strong> (14.8%) and sensitive information exposure (12.3%), with major projects like Axios (56M weekly downloads) and Apache ECharts silently patching security issues.</p>
</li>
<li>
<p>The tool analyzes package <strong>changelogs</strong> using dual LLM models with human security engineer verification, finding that disclosed vulnerabilities take an average of 27 days from patch release to CVE assignment, with some taking up to 9 months.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cisco-acquires-snapattack-to-enhance-splunk-security-capabilities"><a href="https://www.networkworld.com/article/3626637/cisco-grabs-snapattack-for-threat-detection.html?ref=mandos.io">Cisco Acquires SnapAttack to Enhance Splunk Security Capabilities</a>)</h3>
<ul>
<li>
<p>SnapAttack's <strong>threat detection</strong> platform will be integrated into Cisco's Splunk security portfolio, combining threat intelligence, attack emulation, and behavioral analytics to identify network vulnerabilities proactively.</p>
</li>
<li>
<p>The platform will enhance Splunk's <strong>SIEM</strong> capabilities by providing curated detection content discovery prioritized by threat activity and continuous validation of deployed security content.</p>
</li>
<li>
<p>This marks Cisco's fourth acquisition in 2024, following their $28 billion <strong>Splunk</strong> acquisition in 2023, demonstrating continued focus on security and AI technology investments.</p>
</li>
</ul>
<h3 id="bureau-raises-30m-to-expand-no-code-risk-intelligence-platform"><a href="https://siliconangle.com/2024/12/18/bureau-secures-30m-expand-risk-intelligence-platform-global-reach/?ref=mandos.io">Bureau Raises $30M to Expand No-Code Risk Intelligence Platform</a></h3>
<ul>
<li>
<p>Bureau's platform unifies <strong>compliance</strong>, <strong>fraud prevention</strong>, and credit risk management into a single solution, leveraging device intelligence and behavioral AI to surpass traditional rule-based systems.</p>
</li>
<li>
<p>The Series B funding round was led by Sorenson Capital Partners, with participation from <strong>PayPal</strong> Ventures and other investors, bringing total funding to $50.7M across four rounds.</p>
</li>
<li>
<p>Platform capabilities include <strong>money mule</strong> detection, account takeover prevention, and fraud ring detection, serving banking, fintech, gaming, and <strong>e-commerce</strong> sectors through a unified API approach.</p>
</li>
</ul>
<h3 id="arctic-wolf-acquires-blackberrys-cylance-endpoint-security-for-160m-deal"><a href="https://ciosea.economictimes.indiatimes.com/amp/news/security/arctic-wolf-and-blackberry-announce-acquisition-agreement-for-cylance-for160-mn-plus-stock/116383854?ref=mandos.io">Arctic Wolf Acquires BlackBerry's Cylance Endpoint Security for $160M Deal</a></h3>
<ul>
<li>
<p>Arctic Wolf will integrate Cylance's <strong>AI-powered</strong> endpoint protection into their Aurora platform, aiming to reduce alert fatigue and enhance their open-XDR capabilities, with the deal including $80M cash at closing and $40M after one year, plus 5.5M Arctic Wolf shares.</p>
</li>
<li>
<p>The acquisition strengthens Arctic Wolf's position in the <strong>security operations</strong> market by adding native endpoint security to their portfolio, making them the only provider supporting over 15 endpoint solutions through their open platform architecture.</p>
</li>
<li>
<p>BlackBerry retains its <strong>Secure Communications</strong> portfolio (including UEM, AtHoc, and SecuSUITE) while gaining benefits as both a reseller for government customers and a <strong>stakeholder</strong> in Arctic Wolf's future growth.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ploy"><a href="https://cybersectools.com/tools/ploy?ref=mandos.io">Ploy</a></h3>
<p>A platform that helps companies automate the management of their SaaS identities and applications, providing visibility, security, and compliance across the organization's SaaS ecosystem.</p>
<h3 id="attackiq"><a href="https://cybersectools.com/tools/attackiq?ref=mandos.io">AttackIQ</a></h3>
<p>Provides breach and attack simulation products for security control validation, offering three different products to meet the needs of organizations of various sizes and maturity levels.</p>
<h3 id="serpapi"><a href="https://cybersectools.com/tools/serpapi?ref=mandos.io">SerpAPI</a></h3>
<p>SerpApi is a Google Search API that allows you to scrape Google and other search engines with ease.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #82: Apple iCloud Vulnerability, Cloud Security Skills Gap, SolarWinds ARM Flaw ]]></title>
        <description><![CDATA[ Ultralytics AI library compromised through GitHub Actions. OWASP releases landmark LLM security framework. Citrix expands zero-trust capabilities through key acquisitions ]]></description>
        <link>https://mandos.io/newsletter/brief-82-apple-icloud-vulnerability-cloud-security-skills-gap-solarwinds-arm-flaw/</link>
        <guid isPermaLink="false">675d7238e8fb980001632758</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 15 Dec 2024 13:00:28 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/12/50.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>Massive exposure of 336,000+ Prometheus servers through debugging endpoints</li><li>OWASP's new framework for LLM application security risks</li><li>Supply chain attack targeting popular AI library Ultralytics</li></ul><p>Plus insights on cloud security careers, zero-trust developments, and new security tools to strengthen your defense strategy.</p><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->

<!--kg-card-begin: html-->
<div style="width:90%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 1rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsored
        </span>
        <div style="display: flex; align-items: center; justify-content: center; gap: 1rem;">
            <img src="https://kcjlih8bwjd7vpzd.public.blob.vercel-storage.com/infosechired-U6U90c3Q6Cba3cSOZeZKsqvzJIuopf.webp" 
                 style="height: 2.5rem; width: auto;" />
            <h3 style="margin: 0; font-size: 2.5rem; font-weight: 800; color: white; line-height: 1.2;">
                InfoSecHired
            </h3>
        </div>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1.25rem; line-height: 1.6; color: #e5e7eb;">
            AI-powered platform that helps cybersecurity professionals land their dream jobs with 4x higher interview success rates. InfoSecHired's smart AI agents analyze job descriptions and your resume to create tailored applications in minutes, saving you 3+ hours per application while optimizing for ATS systems.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://infosechired.com/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.75rem 1.5rem; font-weight: 600; font-size: 1.125rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out; border: 2px solid #00A383;">
                Learn More →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="prometheus-servers-exposed-to-dos-attacks-through-debugging-endpoints"><a href="https://www.aquasec.com/blog/300000-prometheus-servers-and-exporters-exposed-to-dos-attacks/?ref=mandos.io">Prometheus Servers Exposed to DoS Attacks Through Debugging Endpoints</a></h3>
<ul>
<li>
<p>Over <strong>336,000</strong> internet-exposed Prometheus servers and exporters discovered, with many lacking proper authentication, allowing attackers to gather sensitive information including credentials and API keys.</p>
</li>
<li>
<p>Exposed <strong>/debug/pprof</strong> endpoints enable potential <strong>DoS</strong> attacks by overwhelming system resources through intensive profiling operations, leading to service outages and pod crashes in Kubernetes environments.</p>
</li>
<li>
<p>Researchers identified <strong>RepoJacking</strong> vulnerabilities in several Prometheus exporters, where attackers could potentially execute malicious code by taking over abandoned GitHub repository names referenced in official documentation.</p>
</li>
</ul>
<h3 id="solarwinds-arm-vulnerability-enables-domain-wide-privilege-escalation"><a href="https://www.thezdi.com/blog/2024/12/11/solarwinds-access-rights-manager-one-vulnerability-to-lpe-them-all?ref=mandos.io">SolarWinds ARM Vulnerability Enables Domain-Wide Privilege Escalation</a></h3>
<ul>
<li>
<p>Pre-authentication <strong>file deletion</strong> vulnerability in SolarWinds Access Rights Manager (ARM) allows attackers to delete files with domain account privileges, affecting systems across entire Active Directory domains.</p>
</li>
<li>
<p>When ARM runs with <strong>Domain Admin</strong> credentials (a common configuration), attackers can exploit this vulnerability to achieve local privilege escalation on any domain-joined Windows machine, even without ARM installed.</p>
</li>
<li>
<p>The vulnerability (CVE-2024-23474) was patched in ARM version <strong>2024.3</strong> and involved unauthorized access through port <strong>55555/TCP</strong>, allowing attackers to invoke dangerous file deletion methods through .NET Remoting services.</p>
</li>
</ul>
<h3 id="ios-tcc-bypass-vulnerability-enables-unauthorized-icloud-data-access-cve-2024-44131"><a href="https://www.jamf.com/blog/tcc-bypass-steals-data-from-icloud/?ref=mandos.io">iOS TCC Bypass Vulnerability Enables Unauthorized iCloud Data Access (CVE-2024-44131)</a></h3>
<ul>
<li>
<p>A critical <strong>FileProvider</strong> vulnerability allows malicious apps to bypass iOS Transparency, Consent and Control (TCC) system, enabling unauthorized access to sensitive iCloud data including photos, contacts, and location without user notification. Apple patched this in iOS 18 and macOS 15.</p>
</li>
<li>
<p>The exploit leverages a <strong>symlink</strong> manipulation technique during file operations, abusing elevated privileges of the fileproviderd process to redirect files to attacker-controlled locations. Most concerning is access to /var/mobile/Library/Mobile Documents, which contains predictable paths to <strong>iCloud</strong> data.</p>
</li>
<li>
<p>The vulnerability impacts both mobile and desktop platforms, with particular risk to <strong>WhatsApp</strong> backups and other apps using iCloud storage, as their directory structures remain constant across devices making them easily targetable.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="owasp-releases-2025-top-10-llm-application-security-risks"><a href="https://drive.google.com/drive/folders/1xY_RxCn5EEnMhbeIw7jM13-x2q_fwuJl?ref=mandos.io">OWASP Releases 2025 Top 10 LLM Application Security Risks</a></h3>
<ul>
<li>
<p>First comprehensive update introduces new categories including <strong>Vector Embeddings</strong> and <strong>System Prompt Leakage</strong> to address emerging threats in LLM applications.</p>
</li>
<li>
<p>Expanded focus on <strong>Excessive Agency</strong> risks as LLMs gain more autonomous capabilities through plugins and agent architectures.</p>
</li>
<li>
<p>Document provides detailed mitigation strategies across 10 risk categories, with emphasis on <strong>multimodal</strong> AI security and real-world attack scenarios.</p>
</li>
</ul>
<h3 id="isc2-survey-highlights-leadership-skills-gap-in-cybersecurity-industry"><a href="https://www.infosecurity-magazine.com/news/isc2-gaps-cybersecurity-leadership/?ref=mandos.io">ISC2 Survey Highlights Leadership Skills Gap in Cybersecurity Industry</a></h3>
<ul>
<li>
<p>Survey reveals severe lack of <strong>communication</strong> and strategic skills among cybersecurity leaders, with 85% of respondents citing communication as the most crucial leadership quality, yet finding it notably deficient in current leaders.</p>
</li>
<li>
<p>Only 63% of cybersecurity professionals received formal <strong>leadership training</strong>, with 81% learning primarily through observation of others, highlighting a significant gap in structured development programs.</p>
</li>
<li>
<p>Industry's rapid evolution from technical roots has created an imbalance where <strong>promotion</strong> historically focused on technical expertise rather than management capabilities, leading to a deficit in business acumen among leaders.</p>
</li>
</ul>
<h3 id="risk-management-frameworks-need-modernization-due-to-evolving-threats"><a href="https://www.technewsworld.com/story/outdated-risk-management-frameworks-face-growing-criticism-179469.html?ref=mandos.io">Risk Management Frameworks Need Modernization Due to Evolving Threats</a></h3>
<ul>
<li>
<p>Traditional Three Lines of Defense (3LOD) framework is criticized for being too <strong>rigid</strong> and compliance-focused, failing to address modern enterprise risk challenges and velocity of emerging threats.</p>
</li>
<li>
<p>Organizations are overly focused on <strong>compliance</strong> requirements rather than actual business risks, leading to a disconnect between risk management and security operations.</p>
</li>
<li>
<p>Forrester analysts recommend a modern approach based on three pillars: dynamic risk assessment across multiple dimensions, <strong>continuous</strong> monitoring instead of point-in-time checks, and recognition that cyber risk directly impacts business risk.</p>
</li>
</ul>
<p><strong>Discover more industry reports, guides and cheat sheets in my&nbsp;free </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="incident-response-career-insights-from-ibm-x-force-strategic-analyst"><a href="https://securityintelligence.com/articles/how-i-got-started-incident-responder/?ref=mandos.io">Incident Response Career Insights from IBM X-Force Strategic Analyst</a></h3>
<ul>
<li>
<p>Dave Bales, co-lead of IBM X-Force Incident Command, emphasizes that <strong>communication</strong> skills and formal cybersecurity education were crucial to his career progression from Air Force IT specialist to threat analyst.</p>
</li>
<li>
<p>Daily threat intelligence collaboration and information sharing are vital components of the role, with regular meetings focusing on emerging <strong>threats</strong>, breaches, and vulnerabilities across teams.</p>
</li>
<li>
<p>The field requires continuous learning and adaptation, as cyber threats evolve constantly - Bales notes that while past <strong>incidents</strong> provide context, no two security events are identical, making adaptability essential.</p>
</li>
</ul>
<h3 id="top-cybersecurity-skills-survey-reveals-cloud-security-as-most-in-demand-capability"><a href="https://www.csoonline.com/article/3615797/the-most-in-demand-cybersecurity-skills-today.html?ref=mandos.io">Top Cybersecurity Skills Survey Reveals Cloud Security as Most In-Demand Capability</a></h3>
<ul>
<li>
<p>Cloud security ranks highest in demand with <strong>36%</strong> of hiring managers and <strong>48%</strong> of non-hiring managers prioritizing these skills, driven by increasing cloud-based attacks targeting storage, SaaS, and infrastructure.</p>
</li>
<li>
<p>Security engineering emerges as second most sought-after skill, with organizations willing to pay average salaries of $127K due to the immediate <strong>ROI</strong> in preventing breaches and maintaining defenses.</p>
</li>
<li>
<p>Despite AI/ML dominating headlines, it ranks lowest among desired skills as hiring managers focus on immediate needs, though Gartner predicts <strong>17%</strong> of cyberattacks will involve generative AI by 2027.</p>
</li>
</ul>
<h3 id="cybersecurity-hiring-looking-beyond-traditional-resume-evaluation"><a href="https://www.linkedin.com/posts/nikolozk_resumes-in-cybersecurity-are-overrated-activity-7272250250516475907-rFDk/?ref=mandos.io">Cybersecurity Hiring: Looking Beyond Traditional Resume Evaluation</a></h3>
<ul>
<li>
<p>Traditional <strong>resumes</strong> can be misleading in cybersecurity hiring, as they often fail to demonstrate crucial qualities like problem-solving abilities, adaptability, and technical competence. Many strong candidates may have modest CVs while weaker ones can craft impressive-looking documents.</p>
</li>
<li>
<p>Effective evaluation should focus on tangible demonstrations of <strong>skills</strong> through work samples, technical discussions, and problem-solving scenarios. Reference checks and detailed conversations about past experiences, including failures, provide more valuable insights than paper credentials.</p>
</li>
<li>
<p>The most critical attributes for cybersecurity professionals - including <strong>intellectual curiosity</strong>, ethical judgment, and continuous learning mindset - are best assessed through interactive evaluation methods rather than traditional resume screening.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="supply-chain-attack-on-ultralytics-ai-library-exploits-github-actions-for-cryptomining"><a href="https://www.wiz.io/blog/ultralytics-ai-library-hacked-via-github-for-cryptomining?ref=mandos.io">Supply Chain Attack on Ultralytics AI Library Exploits GitHub Actions for Cryptomining</a></h3>
<ul>
<li>
<p>Malicious actor compromised Ultralytics versions 8.3.41 and 8.3.42 through <strong>GitHub Actions</strong> by exploiting branch names in pull requests, injecting unauthorized <strong>XMRig</strong> cryptomining code into PyPI packages.</p>
</li>
<li>
<p>Attack leveraged vulnerable "Publish Docs" workflow in the CI/CD pipeline, allowing execution of malicious code through crafted branch names. The compromise affected multiple AI packages including <strong>ComfyUI</strong> Impact Pack due to dependencies.</p>
</li>
<li>
<p>Impact reaches approximately 10% of cloud environments using Ultralytics. Users of affected versions should immediately <strong>uninstall</strong> packages, restore systems to clean state, and monitor for cryptomining activity.</p>
</li>
</ul>
<h3 id="llm-testing-framework-for-security-code-analysis-detailed-by-dryrun-security"><a href="https://www.dryrun.security/blog/how-we-harnessed-llms-for-security-and-why-testing-is-our-secret-weapon?ref=mandos.io">LLM Testing Framework for Security Code Analysis Detailed by DryRun Security</a></h3>
<ul>
<li>
<p>DryRun Security developed a comprehensive <strong>testing framework</strong> to ensure their LLM-based code analyzers produce consistent and accurate security evaluations, overcoming the inherent probabilistic nature of LLMs through structured validation processes.</p>
</li>
<li>
<p>The system uses a "Code Inquiry" approach where analyzers ask specific boolean questions about code changes, with test cases organized in a structured repository containing <strong>anonymized</strong> code hunks sorted into true/false validation buckets.</p>
</li>
<li>
<p>The framework implements rigorous <strong>integration testing</strong> using PyTest to validate LLM responses against known outcomes, ensuring reliability across different programming languages and maintaining accuracy when system prompts or context parameters are modified.</p>
</li>
</ul>
<h3 id="owasp-releases-top-10-security-risks-framework-for-ai-agents"><a href="https://github.com/kenhuangus/OWASP-Top-10-for-AI-Agents/tree/main?ref=mandos.io">OWASP Releases Top 10 Security Risks Framework for AI Agents</a></h3>
<ul>
<li>
<p>OWASP has published a comprehensive framework identifying the top 10 <strong>vulnerabilities</strong> specific to autonomous AI systems, including critical issues like authorization hijacking, goal manipulation, and knowledge base poisoning.</p>
</li>
<li>
<p>The framework provides detailed <strong>mitigation</strong> strategies for each risk category, helping organizations implement secure AI agent architectures and protect against emerging threats in AI deployments.</p>
</li>
<li>
<p>Project contributors include security experts from major organizations like Cisco, Google, and Palo Alto Networks, with the framework now being maintained under <strong>OWASP</strong> standards and moved to a new repository at github.com/precize/OWASP-Agentic-AI.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="citrix-enhances-zero-trust-security-through-strategic-acquisitions-of-devicetrust-and-strong-network"><a href="https://www.businesswire.com/news/home/20241210990884/en/Citrix-Strengthens-Commitment-to-Zero-Trust-Security-with-Key-Acquisitions-Delivering-Hybrid-Security-for-Hybrid-Workers-Through-the-Citrix-Platform?ref=mandos.io">Citrix Enhances Zero-Trust Security Through Strategic Acquisitions of deviceTRUST and Strong Network</a></h3>
<ul>
<li>
<p>Citrix expands its security capabilities by acquiring deviceTRUST, enabling real-time <strong>contextual</strong> security controls for VDI and DaaS environments with continuous device attestation and dynamic access management.</p>
</li>
<li>
<p>The Strong Network acquisition brings secure cloud development environments with built-in <strong>DLP</strong> features and patented data infiltration detection to protect against phishing, malware, and credential theft.</p>
</li>
<li>
<p>Citrix Secure Private Access extends <strong>hybrid</strong> deployment support, providing unified zero-trust controls across on-premises and cloud environments for web, SaaS, virtual desktop, and traditional client/server <strong>applications</strong>.</p>
</li>
</ul>
<h3 id="cyberproof-enhances-ctem-capabilities-through-interpres-security-acquisition"><a href="https://www.cyberproof.com/blog/cyberproof-acquires-interpres-security-to-revolutionize-continuous-threat-exposure-management?ref=mandos.io">CyberProof Enhances CTEM Capabilities Through Interpres Security Acquisition</a></h3>
<ul>
<li>
<p>CyberProof has acquired Interpres Security to provide <strong>Continuous Threat Exposure Management</strong> (CTEM) capabilities, moving beyond traditional periodic security assessments to enable real-time threat monitoring and response.</p>
</li>
<li>
<p>The integration combines Interpres' <strong>automated</strong> security control assessment technology with CyberProof's managed security services, allowing organizations to continuously evaluate their security posture against emerging threats.</p>
</li>
<li>
<p>The acquisition strengthens CyberProof's service portfolio by adding Interpres' expertise in <strong>Department of Defense</strong> security practices and their Gartner-recognized capabilities in <strong>ASCA</strong> (Automated Security Control Assessment).</p>
</li>
</ul>
<h3 id="astrix-security-secures-45m-series-b-for-non-human-identity-protection-platform"><a href="https://astrix.security/learn/news/astrix-raises-45m-series-b-to-redefine-identity-security-for-the-ai-era/?ref=mandos.io">Astrix Security Secures $45M Series B for Non-Human Identity Protection Platform</a></h3>
<ul>
<li>
<p>Company raises <strong>Series B</strong> funding to address critical security challenges around non-human identities (NHIs), including API keys, service accounts, and secrets, particularly relevant as <strong>agentic AI</strong> adoption increases in enterprises.</p>
</li>
<li>
<p>Platform provides agentless discovery and remediation of over-privileged or malicious access, with research showing that 1 in 5 organizations have experienced <strong>NHI security incidents</strong>, yet only 15% feel confident in their ability to secure them.</p>
</li>
<li>
<p>Company has experienced 5x growth since Series A, serving <strong>Fortune 500</strong> customers including Figma, NetApp, and Workday, with funding to be used for expanding their infrastructure to cover both human and non-human identity security.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="spyshelter"><a href="https://cybersectools.com/tools/spyshelter?ref=mandos.io">SpyShelter</a></h3>
<p>A software tool that enhances visibility and control over application activities on a user's computer, helping to identify and prevent potential security threats.</p>
<h3 id="masterparser"><a href="https://cybersectools.com/tools/masterparser?ref=mandos.io">MasterParser</a></h3>
<p>A comprehensive Linux log analysis tool that streamlines the investigation of security incidents by extracting and organizing critical details from supported log files.</p>
<h3 id="codacy"><a href="https://cybersectools.com/tools/codacy?ref=mandos.io">Codacy</a></h3>
<p>A developer-first, API-driven platform that provides development teams with a suite of tools to improve code quality, security, and engineering performance, seamlessly integrated into their existing development workflows.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #81: OpenAI Container Risks, Cloudflare Tunnel Attacks, AWS IR Service Launch ]]></title>
        <description><![CDATA[ Data breach costs hit new high of $4.88M. Wiz introduces cloud-native security platform while agentic AI reshapes security operations. ]]></description>
        <link>https://mandos.io/newsletter/brief-81-openai-container-risks-cloudflare-tunnel-attacks-aws-ir-service-launch/</link>
        <guid isPermaLink="false">6754d7dd4d9a2400010cd847</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 08 Dec 2024 12:23:53 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/12/49.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>Dark web prices for cloud credentials are dropping - what this means for security</li><li>A major supply chain attack on the popular YOLO AI model</li><li>Record-breaking data breach costs reaching $4.88M in 2024</li></ul><p>And much more.</p>
<!--kg-card-begin: html-->
<div style="width:90%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 1rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsor
        </span>
        <div style="display: flex; align-items: center; justify-content: center; gap: 1rem;">
            <img src="https://kcjlih8bwjd7vpzd.public.blob.vercel-storage.com/infosechired-U6U90c3Q6Cba3cSOZeZKsqvzJIuopf.webp" 
                 style="height: 2.5rem; width: auto;" />
            <h3 style="margin: 0; font-size: 2.5rem; font-weight: 800; color: white; line-height: 1.2;">
                InfoSecHired
            </h3>
        </div>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1.25rem; line-height: 1.6; color: #e5e7eb;">
            AI-powered platform that helps cybersecurity professionals land their dream jobs with 4x higher interview success rates. InfoSecHired's smart AI agents analyze job descriptions and your resume to create tailored applications in minutes, saving you 3+ hours per application while optimizing for ATS systems.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://infosechired.com/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.75rem 1.5rem; font-weight: 600; font-size: 1.125rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out; border: 2px solid #00A383;">
                Learn More →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="dark-web-shows-declining-prices-for-stolen-cloud-credentials-indicating-market-shift"><a href="https://securityintelligence.com/articles/cloud-threat-report-possible-trend-cloud-credential-oversaturation/?ref=mandos.io">Dark Web Shows Declining Prices for Stolen Cloud Credentials, Indicating Market Shift</a></h3>
<ul>
<li>
<p>IBM X-Force report reveals stolen cloud credential prices dropped 12.8% from 2022-2024, with average prices falling from $11.74 to $10.23, suggesting market <strong>normalization</strong> rather than oversaturation.</p>
</li>
<li>
<p>While basic stolen credentials remain cheap, validated cloud <strong>access</strong> credentials command premium prices reaching thousands of dollars, indicating criminals are prioritizing direct system penetration.</p>
</li>
<li>
<p>Report highlights increasing focus on exploiting cloud vulnerabilities, with <strong>XSS</strong> attacks emerging as the top discovered CVE, enabling session token theft and privilege escalation in cloud environments.</p>
</li>
</ul>
<h3 id="russian-apt-bluealpha-exploits-cloudflare-tunnels-for-malware-distribution"><a href="https://www.recordedfuture.com/research/bluealpha-abuses-cloudflare-tunneling-service?ref=mandos.io">Russian APT BlueAlpha Exploits Cloudflare Tunnels for Malware Distribution</a></h3>
<ul>
<li>
<p>BlueAlpha, a <strong>FSB-linked</strong> threat actor, is leveraging free Cloudflare Tunnels to hide their GammaDrop malware staging infrastructure, making traditional detection methods less effective.</p>
</li>
<li>
<p>The group employs <strong>HTML smuggling</strong> techniques through embedded JavaScript in email attachments, using modified deobfuscation methods and the onerror HTML event to bypass security controls.</p>
</li>
<li>
<p>Their malware suite consists of two main components: GammaDrop (dropper) and <strong>GammaLoad</strong> (loader), which enable data exfiltration, credential theft, and persistent network access through <strong>fast-flux</strong> DNS techniques.</p>
</li>
</ul>
<h3 id="corrupted-file-technique-bypasses-email-security-through-recovery-mechanisms"><a href="https://thehackernews.com/2024/12/hackers-use-corrupted-zips-and-office.html?ref=mandos.io">Corrupted File Technique Bypasses Email Security Through Recovery Mechanisms</a></h3>
<ul>
<li>
<p>Threat actors are using intentionally <strong>corrupted</strong> ZIP and Office documents that evade detection by preventing security tools from scanning the files, while still remaining openable through built-in recovery features.</p>
</li>
<li>
<p>The <strong>phishing</strong> campaign, active since August 2024, delivers malicious attachments disguised as employee benefits documents, which contain QR codes leading to credential theft pages or malware downloads.</p>
</li>
<li>
<p>The technique exploits recovery mechanisms in <strong>WinRAR</strong>, Word, and Outlook to ensure corrupted files can still be opened by targets, while remaining undetectable by most <strong>antivirus</strong> solutions and email security filters.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="data-breach-costs-hit-record-high-with-10-increase-to-488m-in-2024"><a href="https://drive.google.com/file/d/1hybPIR8LmGRgxGpaA5EihL3Jx00W5qAQ/view?ref=mandos.io">Data Breach Costs Hit Record High with 10% Increase to $4.88M in 2024</a></h3>
<ul>
<li>
<p>Global average breach costs jumped to <strong>$4.88 million</strong>, driven by increased business disruption and post-breach response costs totaling $2.8 million - the highest combined amount in 6 years.</p>
</li>
<li>
<p>Organizations with extensive <strong>AI automation</strong> in security prevention workflows saved an average of $2.2 million in breach costs compared to those without AI tools. Two-thirds of organizations now deploy security AI.</p>
</li>
<li>
<p><strong>Staffing shortages</strong> in security teams increased 26.2% from previous year, corresponding to $1.76 million in additional breach costs. Breaches involving <strong>shadow data</strong> (35% of cases) led to 16% higher costs.</p>
</li>
</ul>
<h3 id="supply-chain-security-risks-in-digital-product-procurement"><a href="https://drive.google.com/file/d/11U1lVQQ2KBn05ifi7A4w4GnnLIMrM-qN/view?usp=share_link&ref=mandos.io">Supply Chain Security Risks in Digital Product Procurement</a></h3>
<ul>
<li>
<p>Organizations face multiple attack vectors across the supply chain, including <strong>OSS repositories</strong>, third-party components, and internal development processes, requiring comprehensive security controls at each stage.</p>
</li>
<li>
<p>Technology manufacturers must implement specific mitigations including secure development practices, content scanning, digital signatures, and <strong>insider threat</strong> controls to protect against supply chain compromises.</p>
</li>
<li>
<p>Pre-purchase evaluation should assess both product security and manufacturer credibility through <strong>attestations</strong>, vulnerability reporting practices, and threat modeling capabilities to ensure alignment with organizational risk tolerance.</p>
</li>
</ul>
<h3 id="agentic-ai-evolution-shows-shift-towards-advanced-autonomous-decision-making-systems"><a href="https://drive.google.com/file/d/1txdAK25nKZp1wwhz7ZquOHnODsRk8S6Y/view?usp=share_link&ref=mandos.io">Agentic AI Evolution Shows Shift Towards Advanced Autonomous Decision-Making Systems</a></h3>
<ul>
<li>
<p>Agentic AI systems are developing into sophisticated <strong>multimodal</strong> frameworks capable of autonomous decision-making, with projected global GDP contributions of $2.6-4.4 trillion annually by 2030.</p>
</li>
<li>
<p>The technology has evolved through three key phases: ML integration (2000s), multimodality introduction (2010s), and advanced autonomy (2020s), with current systems featuring both "fast thinking" and "slow reasoning" <strong>orchestration</strong> capabilities.</p>
</li>
<li>
<p>Middle East adoption is accelerating, with 73% of regional CEOs believing <strong>GenAI</strong> will significantly transform their business value creation within three years, particularly in the <strong>energy</strong> sector where investments are expected to triple to $140 billion by decade's end.</p>
</li>
</ul>
<p><strong>Discover more industry reports, guides and cheat sheets in my&nbsp;free </strong><a href="https://mandos.io/cyber-strategy-os/"><strong>Cyber Strategy OS</strong></a><strong>.</strong></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="siem-rule-development-time-and-productivity-metrics"><a href="https://www.reddit.com/r/cybersecurity/comments/1h9194i/detection_engineers_how_many_siem_rules_do_you/?ref=mandos.io">SIEM Rule Development Time and Productivity Metrics</a></h3>
<ul>
<li>
<p>Average development time ranges from 5 minutes to 6 hours per rule, with complex <strong>anomaly</strong> detections potentially taking up to a week for proper implementation and testing.</p>
</li>
<li>
<p>Rule complexity varies significantly based on detection type - simple <strong>atomic</strong> rules can be created quickly, while new <strong>techniques</strong> requiring research and cross-SIEM implementation demand more time.</p>
</li>
<li>
<p>Key factors affecting development speed include data <strong>normalization</strong>, existing logging infrastructure, QA processes, and whether rules are being created for new vs existing clients.</p>
</li>
</ul>
<h3 id="experienced-windows-admin-seeking-soc-career-transitioncommunity-recommendations"><a href="https://www.reddit.com/r/cybersecurity/comments/1h8u447/moving_into_cyber_security_soc/?ref=mandos.io">Experienced Windows Admin Seeking SOC Career Transition - Community Recommendations</a></h3>
<ul>
<li>
<p>Strong foundation in <strong>Windows</strong> infrastructure should focus on practical experience over certifications - community suggests hands-on labs with Azure Sentinel and Splunk's free training resources as primary learning paths.</p>
</li>
<li>
<p>Security+ certification recommended as baseline qualification, with Microsoft's <strong>SC-200</strong> being particularly valuable for environments with heavy Microsoft stack integration.</p>
</li>
<li>
<p>Practical skill development should include <strong>MITRE ATT&amp;CK</strong> framework familiarity and hands-on experience with <strong>SIEM</strong> tools like Splunk, with TryHackMe's SOC path suggested for structured learning.</p>
</li>
</ul>
<h3 id="certifications-alone-dont-guarantee-cybersecurity-expertise"><a href="https://www.reddit.com/r/cybersecurity/comments/1gutncw/are_professionals_with_tons_of_certifications/?ref=mandos.io">Certifications Alone Don't Guarantee Cybersecurity Expertise</a></h3>
<ul>
<li>
<p>Reddit users discuss whether cybersecurity professionals with many <strong>certifications</strong> are actually less skilled in practice. Some view certifications as providing a structured <strong>learning path</strong> and a way to measure progress, while others pursued them for <strong>Master's degree</strong> credit.</p>
</li>
<li>
<p>One analogy compares certifications to <strong>martial arts belts</strong> - a black belt who confidently discusses their real-world experience is more trusted than one who just boasts about their rank. Certifications and degrees demonstrate training, but <strong>experience</strong> on a resume is where practical skills shine through.</p>
</li>
<li>
<p>Even those with impressive credentials like a Master's in Cybersecurity, CEH, CISM, CISSP, and HCISPP admit that certifications alone don't make them good at their jobs. Rather, they pursued them to learn <strong>standards</strong> and expectations for companies. Ultimately, real-world experience and performance matter most.</p>
</li>
</ul>
<blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ultralytics-ai-model-supply-chain-attack-deploys-cryptominer-through-pypi"><a href="https://www.bleepingcomputer.com/news/security/ultralytics-ai-model-hijacked-to-infect-thousands-with-cryptominer/?ref=mandos.io">Ultralytics AI Model Supply Chain Attack Deploys Cryptominer Through PyPI</a></h3>
<ul>
<li>
<p>Popular <strong>YOLO11</strong> AI model versions 8.3.41 and 8.3.42 were compromised through malicious code injection, affecting thousands of users through the Python Package Index (PyPI) repository.</p>
</li>
<li>
<p>The malware deploys an <strong>XMRig</strong> cryptominer at '/tmp/ultralytics_runner', connecting to a mining pool and causing Google Colab users to be banned for abusive activity.</p>
</li>
<li>
<p>Attack originated from two malicious Pull Requests submitted by a Hong Kong-based user, with new <strong>trojanized</strong> versions (8.345 and 8.346) continuing to appear on PyPI despite initial remediation efforts.</p>
</li>
</ul>
<h3 id="openai-chatgpt-container-environment-reveals-file-system-access-and-gpt-instruction-extraction"><a href="https://0din.ai/blog/prompt-injecting-your-way-to-shell-openai-s-containerized-chatgpt-environment?ref=mandos.io">OpenAI ChatGPT Container Environment Reveals File System Access and GPT Instruction Extraction</a></h3>
<ul>
<li>
<p>Researcher discovered ChatGPT's containerized <strong>Debian</strong> environment allows file system navigation and Python script execution within a controlled sandbox at <code>/home/sandbox/</code> and <code>/mnt/data/</code> directories.</p>
</li>
<li>
<p>Users can upload, execute, and move files within the container, with the ability to share access to uploaded files across different ChatGPT sessions through specific <strong>prompts</strong>.</p>
</li>
<li>
<p>OpenAI intentionally allows extraction of custom GPT <strong>configurations</strong> and knowledge bases as a transparency feature, though this raises concerns about potential exposure of sensitive data embedded in custom GPTs.</p>
</li>
</ul>
<h3 id="agentic-ai-set-to-transform-cybersecurity-operations-in-2025"><a href="https://www.resilientcyber.io/p/agentic-ais-intersection-with-cybersecurity?ref=mandos.io">Agentic AI Set to Transform Cybersecurity Operations in 2025</a></h3>
<ul>
<li>
<p>Agentic AI represents a shift from human-prompted AI to <strong>autonomous</strong> systems that can perform complex tasks with minimal human intervention, with Gartner predicting 1/3 of GenAI interactions will use autonomous agents by 2028.</p>
</li>
<li>
<p>Major impact expected in three key areas: AppSec (addressing the 37,000+ annual CVEs), GRC (automating compliance processes), and <strong>SecOps</strong> (handling alert triage, threat hunting, and incident response through multi-agent systems).</p>
</li>
<li>
<p>Security concerns include credential management for AI agents, with organizations already struggling with non-human identities outnumbering human users by 10-50x, and potential <strong>exploitation</strong> risks from malicious actors using similar autonomous capabilities.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="major-cybersecurity-vendors-report-growth-in-siem-and-zero-trust-markets"><a href="https://www.bankinfosecurity.com/blogs/heres-where-top-cybersecurity-vendors-stand-as-2025-nears-p-3775?ref=mandos.io">Major Cybersecurity Vendors Report Growth in SIEM and Zero Trust Markets</a></h3>
<ul>
<li>
<p>Palo Alto Networks leverages IBM QRadar acquisition to expand <strong>SIEM</strong> market presence, onboarding 550+ customers and building $1B+ pipeline, positioning for significant market share capture through their XSIAM platform.</p>
</li>
<li>
<p>CrowdStrike maintains 97% customer retention despite July outage impact, though experiencing <strong>delayed</strong> sales cycles and $25M reduction in new ARR, with customer commitment packages helping mitigate impact.</p>
</li>
<li>
<p>Zscaler positions zero trust platform as <strong>firewall</strong> replacement solution, gaining traction with 14 U.S. cabinet-level agencies and focusing on displacing traditional perimeter-based security architecture for large enterprises.</p>
</li>
</ul>
<h3 id="wiz-launches-cloud-native-security-operations-platform-with-context-driven-detection"><a href="https://www.wiz.io/blog/wiz-defend-delivers-cloud-native-security-operations?ref=mandos.io">Wiz Launches Cloud-Native Security Operations Platform with Context-Driven Detection</a></h3>
<ul>
<li>
<p>New <strong>Wiz Defend</strong> platform combines cloud security context with runtime data and CSP audit logs to provide comprehensive threat detection across identity, data, network, compute, and control plane layers.</p>
</li>
<li>
<p>Platform demonstrated effectiveness during recent <strong>PAN-OS</strong> exploitation campaign, where 24% of enterprise environments contained vulnerable devices and 7% were exposed to unauthenticated RCE through CVE-2024-0012 and CVE-2024-9474.</p>
</li>
<li>
<p>Solution offers agentless scanning capabilities, automated threat correlation, and <strong>MITRE ATT&amp;CK</strong> mapping, enabling SecOps teams to detect and respond to cloud-native threats without traditional endpoint agent limitations.</p>
</li>
</ul>
<h3 id="aws-launches-cloud-incident-response-service-starting-at-7000-monthly"><a href="https://www.theregister.com/2024/12/03/amazon_cloud_security_incident_response?ref=mandos.io">AWS Launches Cloud Incident Response Service Starting at $7,000 Monthly</a></h3>
<ul>
<li>
<p>AWS's new Security Incident Response service combines <strong>automated</strong> threat detection with 24/7 human expertise from their Customer Incident Response Team (CIRT), integrating with GuardDuty and Security Hub for comprehensive monitoring.</p>
</li>
<li>
<p>The service provides a centralized console for managing security notifications and coordinating <strong>remediation</strong> efforts across teams, with pricing tiers based on customers' total AWS spending across enrolled accounts.</p>
</li>
<li>
<p>Currently available in 12 global AWS regions, the platform leverages <strong>AI</strong> analysis for threat detection and offers both guided and self-service <strong>investigation</strong> options, allowing customers to work with third-party security vendors if desired.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="dshield-raspberry-pi-sensor"><a href="https://cybersectools.com/tools/dshield-raspberry-pi-sensor?ref=mandos.io">DShield Raspberry Pi Sensor</a></h3>
<p>The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.</p>
<h3 id="securden-unified-pam"><a href="https://cybersectools.com/tools/securden-unified-pam?ref=mandos.io">Securden Unified PAM</a></h3>
<p>A powerful tool that enables organizations to discover, manage, and secure privileged access, helping to reduce the risks associated with privileged accounts and activities.</p>
<h3 id="awvs"><a href="https://cybersectools.com/tools/awvs?ref=mandos.io">AWVS</a></h3>
<p>A hosted web application security testing tool that enables security researchers to register, activate their accounts, and scan web applications for vulnerabilities.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #80: Cloudflare Data Loss, Godot Malware, Claude AI Vulnerability ]]></title>
        <description><![CDATA[ AI systems show critical vulnerabilities. Supply chain attacks target npm. AWS naming conventions create security risks. ]]></description>
        <link>https://mandos.io/newsletter/brief-80-cloudflare-data-loss-godot-malware-claude-ai-vulnerability/</link>
        <guid isPermaLink="false">674b4c8d648f2800019fc826</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 01 Dec 2024 12:20:20 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/11/48.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>Cloudflare's major logging incident resulting in 55% data loss</li><li>A concerning vulnerability in Claude's Computer Use feature enabling malware execution</li><li>Practical insights on macOS lateral movement techniques</li></ul><p>And much more.</p><hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cloudflare-logs-service-disruption-results-in-55-data-loss-during-35-hour-incident"><a href="https://blog.cloudflare.com/cloudflare-incident-on-november-14-2024-resulting-in-lost-logs/?ref=mandos.io">Cloudflare Logs Service Disruption Results in 55% Data Loss During 3.5-Hour Incident</a></h3>
<ul>
<li>
<p>A <strong>misconfiguration</strong> in Logfwdr service caused a cascade failure, resulting in approximately 55% of customer logs being lost during a 3.5-hour disruption on November 14, 2024, affecting the majority of Cloudflare Logs customers.</p>
</li>
<li>
<p>The incident began when a blank configuration triggered a "fail open" <strong>failsafe</strong> mechanism, causing a 40x increase in buffer creation (from 1 million to 40 million buffers) that overwhelmed the Buftee storage system.</p>
</li>
<li>
<p>Root cause analysis revealed that while protective mechanisms existed in the <strong>Buftee</strong> system to prevent such cascading failures, they were not properly configured, leading Cloudflare to implement new alerts and regular "<strong>overload</strong> tests" to prevent future incidents.</p>
</li>
</ul>
<h3 id="gaming-engine-godot-exploited-as-undetected-malware-loader-platform"><a href="https://research.checkpoint.com/2024/gaming-engines-an-undetected-playground-for-malware-loaders/?ref=mandos.io">Gaming Engine Godot Exploited as Undetected Malware Loader Platform</a></h3>
<ul>
<li>
<p>New malware loader "<strong>GodLoader</strong>" leverages Godot gaming engine to execute malicious GDScript code, remaining undetected by most antivirus solutions while infecting over <strong>17,000</strong> machines since June 2024.</p>
</li>
<li>
<p>Distributed through the Stargazers Ghost Network via GitHub, the malware uses sophisticated <strong>anti-sandbox</strong> techniques and targets multiple platforms including Windows, Linux, and macOS by exploiting Godot's cross-platform capabilities.</p>
</li>
<li>
<p>The technique poses potential risks to over <strong>1.2 million</strong> users of Godot-developed games through possible infection scenarios involving legitimate game modifications or downloadable content.</p>
</li>
</ul>
<h3 id="malicious-ssh-backdoor-campaign-targets-popular-npm-libraries-through-typosquatting"><a href="https://socket.dev/blog/malicious-npm-packages-inject-ssh-backdoors-via-typosquatted-libraries?ref=mandos.io">Malicious SSH Backdoor Campaign Targets Popular npm Libraries Through Typosquatting</a></h3>
<ul>
<li>
<p>Threat actor "sanchezjosephine180" published six <strong>typosquatted</strong> packages mimicking popular npm libraries (babel-cli, chokidar, streamsearch, ssh2, npm-run-all, node-pty), accumulating over 700 downloads before detection.</p>
</li>
<li>
<p>The packages execute malicious code via postinstall scripts to create <strong>SSH backdoors</strong> on Linux systems, adding attacker's public key to authorized_keys while exfiltrating victim's username and IP address through webhook-test[.]com.</p>
</li>
<li>
<p>Campaign includes a seventh dormant package targeting Python's <strong>paramiko</strong> library, suggesting potential for future malicious updates, highlighting risks of supply chain attacks through package manager confusion and version control exploitation.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="macos-lateral-movement-techniques-and-real-world-attack-examples"><a href="https://unit42.paloaltonetworks.com/unique-popular-techniques-lateral-movement-macos/?ref=mandos.io">macOS Lateral Movement Techniques and Real-World Attack Examples</a></h3>
<ul>
<li>
<p>Attackers exploit <strong>SSH keys</strong> through theft and unauthorized access, demonstrated by malware like ZuRu and PyTorch dependency attacks that target .ssh directories for credential exfiltration and network traversal.</p>
</li>
<li>
<p><strong>Apple Remote Desktop</strong> (ARD) enables attackers to gain powerful centralized control over connected machines, offering advantages like user impersonation and GUI access through port 3283, with the ardagent process indicating successful connections.</p>
</li>
<li>
<p><strong>Remote Apple Events</strong> (RAE) can be leveraged through AppleScript to execute commands remotely over port 3031, allowing attackers to perform file operations, deploy payloads, and establish persistence through LaunchAgents on compromised systems.</p>
</li>
</ul>
<h3 id="aws-s3-bucket-namesquatting-risk-in-region-based-naming-conventions"><a href="https://www.securityrunners.io/post/stop-using-predictable-bucket-names-a-failed-attempt-at-hacking-satellites?ref=mandos.io">AWS S3 Bucket Namesquatting Risk in Region-Based Naming Conventions</a></h3>
<ul>
<li>
<p>Research reveals widespread use of <strong>predictable</strong> naming patterns in AWS service buckets, particularly those containing region identifiers, making them susceptible to namesquatting attacks in future AWS regions.</p>
</li>
<li>
<p>Investigation of AWS Ground Station service found potential vulnerability in <strong>us-west-3</strong> region bucket naming, highlighting risks when new regions are launched without pre-reserved bucket names.</p>
</li>
<li>
<p>AWS has begun implementing <strong>random suffixes</strong> in newer service bucket names as a mitigation strategy, though this affects Infrastructure as Code (IaC) implementation by requiring explicit region mapping.</p>
</li>
</ul>
<h3 id="my-linkedin-post-about-cybersecurity-metrics-need-financial-translation-for-business-impact"><a href="https://www.linkedin.com/posts/nikolozk_no-one-cares-about-your-cybersecurity-stats-activity-7267176961347575808-AMyu?ref=mandos.io">My LinkedIn Post About Cybersecurity Metrics Need Financial Translation for Business Impact</a></h3>
<ul>
<li>
<p>Conventional security metrics like <strong>firewall</strong> blocks and IDS alerts fail to resonate with business leaders - CFOs care about financial impact, not technical statistics.</p>
</li>
<li>
<p>Security leaders should partner with Finance to quantify incident costs, including <strong>downtime</strong> and response expenses - for example, if each incident costs $50K and EDR prevents 10 monthly, that's $6M annual savings.</p>
</li>
<li>
<p>Focus reporting on <strong>ROI</strong> metrics that demonstrate prevented financial losses rather than threats blocked, and translate security investments into business value to gain executive <strong>buy-in</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-career-entry-experience-and-practical-skills-outweigh-certifications"><a href="https://www.reddit.com/r/cybersecurity/comments/1h0jdj0/cybersecurity_jobs_are_certifications_a_must_or/?ref=mandos.io">Cybersecurity Career Entry: Experience and Practical Skills Outweigh Certifications</a></h3>
<ul>
<li>
<p>Real-world <strong>experience</strong> is consistently valued over certifications, with many professionals and hiring managers emphasizing that hands-on technical work, even in help desk or adjacent IT roles, provides the most valuable foundation for cybersecurity careers.</p>
</li>
<li>
<p>Certifications serve primarily as HR checkpoints and compliance requirements (like <strong>DoD</strong> positions), but practical demonstrations of skills through personal projects, problem-solving abilities, and unique technical initiatives carry more weight in technical interviews.</p>
</li>
<li>
<p>Hiring managers prioritize candidates who show initiative through <strong>self-directed</strong> projects (like home labs, VPS setups) and demonstrate genuine interest in cybersecurity through practical application, rather than those who solely possess <strong>certifications</strong> without hands-on experience.</p>
</li>
</ul>
<h3 id="cloud-security-certification-recommendations-industry-insights-and-comparisons"><a href="https://www.reddit.com/r/cybersecurity/comments/1h0e0jy/what_cloud_security_certifications_can_you/?ref=mandos.io">Cloud Security Certification Recommendations: Industry Insights and Comparisons</a></h3>
<ul>
<li>
<p><strong>CCSP</strong> emerges as the leading vendor-neutral certification, offering comprehensive cloud security knowledge though less technical than SANS courses. Many professionals recommend completing CISSP first due to content overlap.</p>
</li>
<li>
<p>Cloud-specific certifications from major providers are highly valued - AWS Solutions Architect Associate leading to Security Specialty, and Azure's path from AZ-104 to <strong>AZ-500</strong> are recommended technical paths.</p>
</li>
<li>
<p>The Cloud Security Alliance's <strong>CCSK</strong> certification provides fundamental cloud security knowledge with free training materials, making it an ideal starting point before pursuing more advanced certifications like CCSP or vendor-specific credentials.</p>
</li>
</ul>
<h3 id="cisa-launches-new-learning-management-system-to-replace-fedvte"><a href="https://niccs.cisa.gov/education-training/cisa-learning?ref=mandos.io">CISA Launches New Learning Management System to Replace FedVTE</a></h3>
<ul>
<li>
<p>CISA Learning, now available at learning.cisa.gov, offers <strong>850 hours</strong> of cybersecurity training content mapped to the <strong>NICE Framework</strong>, replacing the Federal Virtual Training Environment (FedVTE).</p>
</li>
<li>
<p>The platform is accessible to federal employees, contractors, SLTT government staff, military personnel, veterans, and the general public through <strong>Login.gov</strong> authentication, though internal CISA users must wait for system preparation.</p>
</li>
<li>
<p>Training includes <strong>certification</strong> preparation courses for CISSP, CISM, and Ethical Hacking, with content ranging from beginner to advanced levels covering topics like cloud security, malware analysis, and risk management.</p>
</li>
</ul>
<blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-in-cybersecurity-warning-against-over-reliance-on-automation"><a href="https://www.csoonline.com/article/3613339/cybersecuritys-oversimplification-problem-seeing-ai-as-a-replacement-for-human-agency.html?ref=mandos.io">AI in Cybersecurity: Warning Against Over-Reliance on Automation</a></h3>
<ul>
<li>
<p>Recent <strong>research</strong> shows cybersecurity professionals are developing a "Great Machine" mindset, incorrectly viewing AI as a complete replacement for human expertise rather than an augmentation tool.</p>
</li>
<li>
<p>This oversimplification threatens organizational security by neutralizing the traditional advantages of experienced staff and <strong>training</strong> programs, particularly when dealing with novel cyber threats.</p>
</li>
<li>
<p>To address this issue, CISOs should implement diverse AI education programs, encourage role rotation, and develop <strong>penetration testing</strong> requirements that engage cross-sections of workforce skill levels to demonstrate AI's variable outcomes and limitations.</p>
</li>
</ul>
<h3 id="claude-computer-use-vulnerability-enables-c2-control-through-prompt-injection"><a href="https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/?ref=mandos.io">Claude Computer Use Vulnerability Enables C2 Control Through Prompt Injection</a></h3>
<ul>
<li>
<p>Researcher demonstrated how Claude's new Computer Use feature can be <strong>compromised</strong> through prompt injection, allowing unauthorized download and execution of C2 malware by simply asking Claude to download and run a "support tool"</p>
</li>
<li>
<p>The attack leveraged Claude's ability to use Firefox for downloads, bypassing security restrictions on direct <strong>wget</strong> commands, successfully connecting the host to a <strong>Sliver</strong> C2 server infrastructure</p>
</li>
<li>
<p>The vulnerability highlights fundamental security risks in AI systems with computer control capabilities, particularly when processing untrusted input, with potential for more sophisticated attacks including having Claude write and compile <strong>malware</strong> directly</p>
</li>
</ul>
<h3 id="enterprise-shadow-ai-usage-poses-data-security-risks-35-of-companies-report-monitoring-challenges"><a href="https://www.infosecurity-magazine.com/news/over-third-firms-struggling-shadow/?ref=mandos.io">Enterprise Shadow AI Usage Poses Data Security Risks, 35% of Companies Report Monitoring Challenges</a></h3>
<ul>
<li>
<p>Strategy Insights survey reveals over one-third of organizations struggle to monitor <strong>unsanctioned</strong> AI tools, particularly when integrated with legacy systems, based on responses from 3,320 directors across multiple regions.</p>
</li>
<li>
<p>Recent incidents highlight data exposure risks, with <strong>Samsung</strong> implementing an internal GenAI ban after employees inadvertently shared sensitive code and meeting notes through ChatGPT. A separate study found 20% of UK firms experienced potential data exposure through GenAI use.</p>
</li>
<li>
<p>Organizations are implementing protective measures including <strong>honey tokens</strong> for data leak tracking, with 67% emphasizing governance frameworks and 48% prioritizing employee training, especially in <strong>regulated</strong> industries like healthcare and finance.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="swiss-ai-governance-startup-calvin-risk-raises-4m-seed-funding-for-enterprise-risk-management"><a href="https://www.globenewswire.com/news-release/2024/11/19/2983508/0/en/Calvin-Risk-secures-4M-as-its-mission-to-make-enterprise-AI-trustworthy-takes-off.html?ref=mandos.io">Swiss AI Governance Startup Calvin Risk Raises $4M Seed Funding for Enterprise Risk Management</a></h3>
<ul>
<li>
<p>ETH Zurich spin-off Calvin Risk secured funding to expand their <strong>AI governance</strong> platform, which helps enterprises assess and monitor artificial intelligence risks through automated testing and quantitative assessment, particularly crucial as the EU AI Act approaches.</p>
</li>
<li>
<p>The platform provides real-time monitoring of companies' AI portfolios with <strong>pre-deployment</strong> testing capabilities, already gaining traction with major financial institutions including Aviva and Lloyds Banking Group, while earning recognition as Risk.net's Model Risk Management Product of the Year 2024.</p>
</li>
<li>
<p>Company achieved significant milestone through partnership with Lufthansa Industry Solutions, resulting in the first <strong>GenAI model</strong> to receive TÜV Süd's "Assessment Seal Certification", demonstrating their ability to meet stringent technical and ethical standards for <strong>compliance</strong>.</p>
</li>
</ul>
<h3 id="n-able-expands-security-portfolio-with-266m-adlumin-xdr-acquisition"><a href="https://siliconangle.com/2024/11/25/n-able-acquires-cybersecurity-provider-adlumin-266m-deal/?ref=mandos.io">N-able Expands Security Portfolio with $266M Adlumin XDR Acquisition</a></h3>
<ul>
<li>
<p>N-able is acquiring cybersecurity partner Adlumin for $266M through a combination of $220M cash and stock, with potential additional <strong>earnouts</strong> of $30M based on performance milestones through 2026.</p>
</li>
<li>
<p>Adlumin's cloud-native <strong>XDR</strong> platform leverages AI to detect anomalous network behavior and includes vulnerability detection capabilities, serving over 3,500 customers through their managed detection and response services.</p>
</li>
<li>
<p>The acquisition aims to strengthen N-able's <strong>MSP</strong> offerings by integrating Adlumin's security solutions, with N-able projecting increased revenue growth between $111.5M and $113M despite slightly lower adjusted <strong>EBITDA</strong>.</p>
</li>
</ul>
<h3 id="kong-secures-175m-series-e-funding-for-api-management-platform-at-2b-valuation"><a href="https://konghq.com/blog/news/kongs-series-e-funding?ref=mandos.io">Kong Secures $175M Series E Funding for API Management Platform at $2B Valuation</a></h3>
<ul>
<li>
<p>Kong's Series E round was led by Tiger Global and Balderton, with participation from both existing and new investors, representing a <strong>45%</strong> increase in valuation from their previous round. The funding will support their vision of becoming the universal broker of API traffic.</p>
</li>
<li>
<p>The company plans to expand their product capabilities with focus on <strong>AI Gateway</strong> development, Insomnia enhancement, and open-source projects, while strengthening their global presence in new markets including Japan and India.</p>
</li>
<li>
<p>Kong emphasizes the critical role of APIs in AI development, noting that each AI token generation requires multiple API calls, positioning them to build the world's first comprehensive API <strong>inventory</strong> system for unified management, security, and <strong>observability</strong>.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="compliance-scorecard-%E2%80%93-governance-as-a-service"><a href="https://cybersectools.com/tools/compliance-scorecard-governance-as-a-service?ref=mandos.io">Compliance Scorecard – Governance as a Service</a></h3>
<p>Compliance Scorecard is a governance as a service (GaaS) platform designed specifically for Managed Service Providers (MSPs) to help them integrate compliance into their daily operations, rather than treating it as a mere response to audits or events.</p>
<h3 id="securityvulnerabilityio"><a href="https://cybersectools.com/tools/securityvulnerabilityio?ref=mandos.io">SecurityVulnerability.io</a></h3>
<p>SecurityVulnerability.io is a tool that collects, enriches, and displays vulnerability information in a format that is easily accessible and understandable for both humans and computers.</p>
<h3 id="vidoc-security"><a href="https://cybersectools.com/tools/vidoc-security?ref=mandos.io">Vidoc Security</a></h3>
<p>VIDOC is an innovative security tool designed to enhance the security of software development pipelines. It combines the speed and efficiency of artificial intelligence with the precision and expertise of human security engineers.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #79: Apple Zero-Days, North Korean Threats, OWASP LLM Risks ]]></title>
        <description><![CDATA[ McKinsey reveals $2T AI security market opportunity, while Apple patches critical zero-days and Wiz expands cloud security capabilities through strategic acquisition. ]]></description>
        <link>https://mandos.io/newsletter/brief-79-apple-zero-days-north-korean-threats-owasp-llm-risks/</link>
        <guid isPermaLink="false">6741c9990d99b200015c3fb9</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 24 Nov 2024 12:20:13 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/11/47.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>Apple's urgent patch for two zero-day vulnerabilities affecting macOS systems</li><li>OWASP's updated Top 10 LLM Security Risks, with data exposure climbing to second place</li><li>Microsoft's findings on how organizations managing multiple security solutions face increased incidents</li></ul><p>And much more.</p><hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="fake-ai-video-generator-sites-distribute-lumma-and-amos-infostealers"><a href="https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/?ref=mandos.io">Fake AI Video Generator Sites Distribute Lumma and AMOS Infostealers</a></h3>
<ul>
<li>
<p>Threat actors are promoting fake "EditProAI" video generator sites through social media and search results, targeting both Windows and macOS users with <strong>infostealers</strong> that steal credentials, crypto wallets, and browser data.</p>
</li>
<li>
<p>The Windows variant deploys <strong>Lumma Stealer</strong> using a stolen code signing certificate from Softwareok.com, while macOS systems are targeted with the <strong>AMOS</strong> malware, both sending stolen data to a command panel at proai[.]club.</p>
</li>
<li>
<p>Campaign spreads through <strong>deepfake</strong> political videos on X (formerly Twitter), leading victims to professional-looking websites at editproai[.]pro (Windows) and editproai[.]org (macOS) that distribute malicious installers.</p>
</li>
</ul>
<h3 id="north-korean-threat-actors-expand-operations-with-it-workers-and-advanced-exploitation-techniques"><a href="https://www.microsoft.com/en-us/security/blog/2024/11/22/microsoft-shares-latest-intelligence-on-north-korean-and-chinese-threat-actors-at-cyberwarcon/?ref=mandos.io">North Korean Threat Actors Expand Operations with IT Workers and Advanced Exploitation Techniques</a></h3>
<ul>
<li>
<p>North Korean threat actors have developed sophisticated <strong>cryptocurrency</strong> theft operations through social engineering, with Sapphire Sleet stealing over $10M in a six-month period by posing as venture capitalists and recruiters.</p>
</li>
<li>
<p>DPRK has deployed thousands of <strong>IT workers</strong> abroad who generate revenue through legitimate work while using stolen identities, AI-generated content, and facilitators to bypass sanctions. These workers have earned hundreds of millions of dollars operating from North Korea, Russia, and China.</p>
</li>
<li>
<p>Ruby Sleet has increased targeting of <strong>aerospace</strong> and defense organizations through sophisticated phishing and supply chain attacks, including compromising legitimate certificates and developing custom malware for specific targets' environments.</p>
</li>
</ul>
<h3 id="apple-patches-two-zero-day-vulnerabilities-under-active-exploitation-in-macos"><a href="https://www.securityweek.com/apple-confirms-zero-day-attacks-hitting-intel-based-macs/?ref=mandos.io">Apple Patches Two Zero-Day Vulnerabilities Under Active Exploitation in macOS</a></h3>
<ul>
<li>
<p><strong>Zero-day</strong> vulnerabilities in JavaScriptCore and WebKit components are being actively exploited against Intel-based Mac systems, discovered by Google's Threat Analysis Group.</p>
</li>
<li>
<p>The flaws (CVE-2024-44308 and CVE-2024-44309) could allow attackers to execute arbitrary code and perform cross-site scripting attacks through maliciously crafted web content on <strong>Intel</strong> Mac systems.</p>
</li>
<li>
<p>Apple has released urgent security updates across multiple platforms including iOS 18.1.1, macOS Sequoia 15.1.1, and iOS 17.7.2 to address these <strong>vulnerabilities</strong>, though no specific attack details or IOCs were provided.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="microsoft-data-security-index-reveals-ai-driven-security-challenges-and-opportunities"><a href="https://drive.google.com/file/d/11jcWoIS11NhMo231WYRYJhnhBeA_D7dI/view?usp=share_link&ref=mandos.io">Microsoft Data Security Index Reveals AI-Driven Security Challenges and Opportunities</a></h3>
<ul>
<li>
<p>Organizations are managing an average of 12 different data security solutions, with <strong>fragmentation</strong> leading to increased vulnerability - companies using 11+ tools experienced 202 security incidents compared to 139 incidents for those with fewer tools.</p>
</li>
<li>
<p><strong>Unauthorized</strong> AI app usage is widespread, with 65% of organizations reporting employees using unsanctioned AI applications, while 96% express concerns about employee use of generative AI. In response, 93% are developing or implementing new controls.</p>
</li>
<li>
<p>Organizations show strong optimism for AI in security, with 77% believing AI will enhance sensitive data discovery and protection. Those already using AI-powered security tools receive fewer daily alerts (47 vs 79) and report improved <strong>effectiveness</strong> in threat detection.</p>
</li>
</ul>
<h3 id="kubernetes-data-plane-security-key-attack-vectors-and-defense-strategies"><a href="https://www.wiz.io/blog/kubernetes-data-plane?ref=mandos.io">Kubernetes Data Plane Security: Key Attack Vectors and Defense Strategies</a></h3>
<ul>
<li>
<p>Applications with <strong>RCE</strong> vulnerabilities in exposed pods present a primary attack vector, allowing attackers to gain initial access and potentially move laterally through service account privileges or container escapes to host systems.</p>
</li>
<li>
<p>Container images serve as a critical access point, where malicious images can enable host-level access through vulnerabilities like <strong>Leaky Vessels</strong>, emphasizing the need for image verification, signing, and maintaining trusted registries.</p>
</li>
<li>
<p><strong>Execution-as-a-service</strong> platforms using Kubernetes face unique risks of cross-tenant access, requiring strict isolation through namespace separation, network policies, and <strong>sandboxing</strong> technologies like Kata containers or gVisor.</p>
</li>
</ul>
<h3 id="soc-implementation-guide-choosing-between-in-house-hybrid-and-outsourced-models"><a href="https://mandos.io/blog/securing-your-enterprise-in-house-soc-vs-hybrid-vs-outsourced/">SOC Implementation Guide: Choosing Between In-House, Hybrid, and Outsourced Models</a></h3>
<ul>
<li>
<p>A <strong>SOC</strong> serves as a centralized security hub providing comprehensive services including continuous monitoring, incident response, threat hunting, and compliance management across an organization's infrastructure.</p>
</li>
<li>
<p>Decision factors should include thorough evaluation of <strong>operational costs</strong> (infrastructure, staffing, training), scalability requirements, and response time capabilities for each model - with in-house requiring highest investment but offering maximum control.</p>
</li>
<li>
<p>Organizations must assess their <strong>compliance</strong> requirements and internal security maturity, considering factors like available security talent, industry regulations, and long-term business objectives before selecting between the three models.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-consulting-interview-tips-focus-on-problem-solving-and-soft-skills"><a href="https://www.reddit.com/r/cybersecurity/comments/1gszsat/what_questions_should_i_expect/?ref=mandos.io">Cybersecurity Consulting Interview Tips: Focus on Problem-Solving and Soft Skills</a></h3>
<ul>
<li>
<p>Interviewers prioritize <strong>consulting skills</strong> including report writing, client communication, and project management abilities - often comprising 60% of the job responsibilities over technical expertise for intern positions.</p>
</li>
<li>
<p>Candidates should demonstrate strong <strong>research aptitude</strong> and problem-solving methodology - being transparent about knowledge gaps while explaining how they would find solutions using resources like vendor documentation and trusted online sources.</p>
</li>
<li>
<p>Hiring managers assess <strong>personality fit</strong> through behavioral questions, looking for structured thinking, learning agility, and professional communication skills that indicate potential for client-facing consulting work.</p>
</li>
</ul>
<h3 id="career-growth-in-cybersecurity-specialist-vs-generalist-path-analysis"><a href="https://www.reddit.com/r/cybersecurity/comments/1gujcs8/as_a_midlevel_security_engineer_is_it_better_to/?ref=mandos.io">Career Growth in Cybersecurity: Specialist vs Generalist Path Analysis</a></h3>
<ul>
<li>
<p>Being a <strong>specialist</strong> provides higher immediate value and compensation potential, but carries increased risk during technology shifts or organizational changes, potentially limiting long-term career mobility.</p>
</li>
<li>
<p><strong>Generalists</strong> have greater adaptability and are well-positioned for <strong>leadership</strong> roles, but may face a lower technical career ceiling without transitioning to management positions. Success heavily depends on developing strong soft skills.</p>
</li>
<li>
<p>Career path choice should align with long-term goals - specialists excel in technical roles (Senior Engineers, Architects), while generalists are better suited for broader program management positions (Security Directors, <strong>CISO</strong>) where comprehensive security knowledge is vital.</p>
</li>
</ul>
<h3 id="software-engineer-shares-journey-and-tips-for-transitioning-to-offensive-security"><a href="https://www.offsec.com/blog/navigating-the-leap-my-journey-from-software-engineering-to-offensive-security/?ref=mandos.io">Software Engineer Shares Journey and Tips for Transitioning to Offensive Security</a></h3>
<ul>
<li>
<p>Andrzej Olchawa, a software engineer with 15 years of experience, shares his personal journey transitioning from software engineering to offensive security.</p>
</li>
<li>
<p>Olchawa emphasizes the importance of setting clear goals, managing expectations, and putting in significant effort when making a career transition, especially when moving into a different field like <strong>infosec</strong>.</p>
</li>
<li>
<p>To narrow down specific roles to focus on within offensive security, Olchawa suggests listing areas of interest and ranking them based on existing skills and the effort required to excel, considering one's strengths and weaknesses in areas like <strong>pentesting</strong>, <strong>exploit development</strong>, <strong>reverse engineering</strong>, and <strong>application security</strong>.</p>
</li>
</ul>
<blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="owasp-updates-top-10-llm-security-risks-with-data-exposure-and-supply-chain-concerns"><a href="https://www.infosecurity-magazine.com/news/owasp-data-exposure-risk-ai/?ref=mandos.io">OWASP Updates Top 10 LLM Security Risks with Data Exposure and Supply Chain Concerns</a></h3>
<ul>
<li>
<p><strong>Sensitive information disclosure</strong> rises to second place (from sixth) in OWASP's 2025 Top 10 LLM risks, highlighting increased concerns about AI systems potentially exposing PII and intellectual property during interactions.</p>
</li>
<li>
<p><strong>Supply chain</strong> vulnerabilities climb to third place as organizations face real-world incidents of poisoned foundation models and compromised datasets, moving beyond theoretical risks identified in the previous version.</p>
</li>
<li>
<p>New risks added include vector/embedding weaknesses and system prompt leakage, reflecting the growing adoption of <strong>RAG</strong> (Retrieval-Augmented Generation) architectures in enterprise AI deployments and recent security incidents exposing sensitive prompt information.</p>
</li>
</ul>
<h3 id="aws-releases-threat-modeling-guide-for-generative-ai-security-assessment"><a href="https://aws.amazon.com/blogs/security/threat-modeling-your-generative-ai-workload-to-evaluate-security-risk/?ref=mandos.io">AWS Releases Threat Modeling Guide for Generative AI Security Assessment</a></h3>
<ul>
<li>
<p>AWS introduces a four-stage threat modeling framework focused on <strong>LLM</strong> security risks, emphasizing the importance of evaluating both traditional and AI-specific vulnerabilities in generative AI workloads.</p>
</li>
<li>
<p>The framework recommends documenting system architecture through data flow diagrams, identifying threats using established frameworks like <strong>STRIDE</strong> and <strong>MITRE ATLAS</strong>, and implementing both preventative and detective controls for each identified threat.</p>
</li>
<li>
<p>Key security concerns include <strong>prompt injection</strong> risks and data exposure, with AWS providing practical examples through their open-source <strong>Threat Composer</strong> tool to help organizations document and track potential security threats.</p>
</li>
</ul>
<h3 id="chatgpt-container-environment-reveals-file-management-and-data-access-capabilities"><a href="https://0din.ai/blog/prompt-injecting-your-way-to-shell-openai-s-containerized-chatgpt-environment?ref=mandos.io">ChatGPT Container Environment Reveals File Management and Data Access Capabilities</a></h3>
<ul>
<li>
<p>Researchers discovered that ChatGPT's <strong>containerized</strong> environment allows file management operations including uploading, executing, and relocating files within the sandbox, demonstrating previously undocumented system access capabilities.</p>
</li>
<li>
<p>Investigation revealed ability to extract GPT <strong>instruction sets</strong> and knowledge data, highlighting OpenAI's intentional transparency in allowing controlled access to certain system components while maintaining security boundaries.</p>
</li>
<li>
<p>OpenAI considers these sandbox interactions as intended features rather than vulnerabilities, drawing a clear line at actual container <strong>escape</strong> attempts while permitting exploration within the controlled environment for research and learning purposes.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="mckinsey-ais-impact-on-cybersecurity-market-creates-2-trillion-opportunity"><a href="https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/the-cybersecurity-providers-next-opportunity-making-ai-safer?stcr=A4409EFBEE9B474C9DDB841F087C4DBC&cid=other-eml-alt-mip-mck&hlkid=4d62ce05b37142389dca310e60af5ee6&hctky=14871432&hdpid=1fea9f2d-1ef4-4d0d-9e12-173bbe4a8f80&ref=mandos.io">McKinsey: AI's Impact on Cybersecurity Market Creates $2 Trillion Opportunity</a></h3>
<ul>
<li>
<p>Organizations now take an average of <strong>73 days</strong> to contain security incidents, while facing an expanded attack surface and AI-enhanced threats, including a <strong>1,265%</strong> increase in phishing attacks since 2022.</p>
</li>
<li>
<p>Market growth is driven by regulatory compliance needs and talent gaps, with cyber budgets shifting toward third-party vendors (65%) over internal labor (35%), creating significant opportunities for <strong>SecOps</strong> and cloud security providers.</p>
</li>
<li>
<p>Companies are "highly willing" to invest in AI-enabled security tools, with 97% planning increased vendor spending for AI security, while the <strong>zero-trust</strong> architecture shows highest adoption potential in middle-market companies.</p>
</li>
</ul>
<h3 id="wiz-acquires-dazz-to-enhance-cloud-to-code-security-remediation"><a href="https://www.wiz.io/blog/wiz-to-acquire-dazz-transforming-risk-remediation-from-cloud-to-code?ref=mandos.io">Wiz Acquires Dazz to Enhance Cloud-to-Code Security Remediation</a></h3>
<ul>
<li>
<p>Wiz is expanding its Cloud Native Application Protection Platform (CNAPP) by integrating Dazz's <strong>remediation</strong> engine, enabling security teams to correlate data from multiple sources and manage application risks in a unified platform.</p>
</li>
<li>
<p>The acquisition strengthens Wiz's Application Security Posture Management (ASPM) capabilities, with Dazz's technology allowing teams to identify and fix vulnerabilities at the <strong>source code</strong> level while maintaining cloud context in security workflows.</p>
</li>
<li>
<p>The merger brings together complementary technologies focused on <strong>risk detection</strong> and resolution, aiming to bridge the gap between cloud and code while facilitating better collaboration between security and engineering teams through <strong>contextual</strong> analysis.</p>
</li>
</ul>
<h3 id="palo-alto-networks-reports-strong-platform-consolidation-strategy-results-in-q1-fy2025"><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-consolidation-momentum/733612/?ref=mandos.io">Palo Alto Networks Reports Strong Platform Consolidation Strategy Results in Q1 FY2025</a></h3>
<ul>
<li>
<p>Company reached 1,100 <strong>platformization</strong> deals, with 70+ new additions this quarter, maintaining trajectory toward 2,500-3,500 deals goal by FY2030. One-third of new deals came from recent <strong>IBM QRadar</strong> acquisition.</p>
</li>
<li>
<p>Financial performance shows momentum with 14% revenue growth to $2.14B and 80% increase in <strong>net income</strong> to $351M. Closed 305 transactions over $1M (up 13% YoY) and 60 deals over $5M (up 30% YoY).</p>
</li>
<li>
<p>Strategy includes offering customers deferred billing options until competitor contracts expire, despite short-term revenue impact. CEO notes industry trend as other <strong>vendors</strong> increasingly adopt similar platform-focused approaches.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="workbench"><a href="https://cybersectools.com/tools/workbench?ref=mandos.io">Workbench</a></h3>
<p>A scalable python framework for security research and development teams. Workbench focuses on simplicity, transparency, and easy on-site customization.</p>
<h3 id="soarca"><a href="https://cybersectools.com/tools/soarca?ref=mandos.io">SOARCA</a></h3>
<p>SOARCA is an open-source Security Orchestration, Automation and Response (SOAR) tool that automates threat and incident response workflows using CACAO security playbooks. It supports standardized formats and technologies, including CACAOv2 and OpenC2, and allows for extensibility and customization.</p>
<h3 id="charlotte"><a href="https://cybersectools.com/tools/charlotte?ref=mandos.io">Charlotte</a></h3>
<p>Charlotte is a C++ based fully undetected shellcode launcher, designed to bypass traditional security measures and execute shellcode discreetly.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #78: Windows Zero-Day, NVIDIA&#x27;s AI SOC Analyst, Google&#x27;s 2025 Cyber Forecast ]]></title>
        <description><![CDATA[ Critical Windows Task Scheduler vulnerability under active exploitation. NVIDIA revolutionizes SOC operations with AI. Google predicts evolving threat landscape. ]]></description>
        <link>https://mandos.io/newsletter/brief-78-windows-zero-day-nvidias-ai-soc-analyst-googles-2025-cyber-forecast/</link>
        <guid isPermaLink="false">6738a1188f0b6300012545fe</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 17 Nov 2024 12:20:37 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/11/46.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>Windows Task Scheduler Zero-Day vulnerability being actively exploited in the wild</li><li>NVIDIA's new Morpheus framework bringing AI automation to Security Operations Centers</li><li>The reality of today's cybersecurity job market, with insights from industry recruiters and leaders</li></ul><p>And much more.</p><hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="windows-task-scheduler-zero-day-vulnerability-actively-exploited"><a href="https://www.securityweek.com/microsoft-confirms-zero-day-exploitation-of-task-scheduler-flaw/?ref=mandos.io">Windows Task Scheduler Zero-Day Vulnerability Actively Exploited</a></h3>
<ul>
<li>
<p>Critical <strong>privilege escalation</strong> vulnerability (CVE-2024-49039) discovered in Windows Task Scheduler, with CVSS score of 8.8, allowing attackers to execute code from low-privilege AppContainers at higher integrity levels.</p>
</li>
<li>
<p>Google's <strong>TAG</strong> team identified the exploit, which enables attackers to execute restricted RPC functions typically limited to privileged accounts. Microsoft has not provided IOCs for detection.</p>
</li>
<li>
<p>Second zero-day (CVE-2024-43451) enables <strong>NTLMv2</strong> hash disclosure through minimal user interaction, while critical vulnerabilities in <strong>.NET</strong> (CVE-2024-43498) received patches with CVSS 9.8 severity rating.</p>
</li>
</ul>
<h3 id="ios-181-update-adds-inactivity-reboot-feature-to-enhance-iphone-security"><a href="https://www.bleepingcomputer.com/news/security/iphones-now-auto-restart-to-block-access-to-encrypted-data-after-long-idle-times/?ref=mandos.io">iOS 18.1 Update Adds Inactivity Reboot Feature to Enhance iPhone Security</a></h3>
<ul>
<li>
<p><strong>Apple</strong> has introduced a new "inactivity reboot" feature in <strong>iOS 18.1</strong> to ensure that iPhones automatically restart after long idle periods, making it harder for law enforcement or malicious actors to extract data using forensic phone unlocking tools.</p>
</li>
<li>
<p>The feature switches idle devices from an <strong>After First Unlock (AFU)</strong> state to a <strong>Before First Unlock (BFU)</strong> state, where the devices are more challenging to break into, as even the operating system can no longer access stored data using encryption keys in memory.</p>
</li>
<li>
<p>When an iPhone is rebooted, it goes into an "at rest" state, wiping the <strong>encryption keys</strong> from memory and preventing unauthorized access to the phone's data, even if the lock screen is bypassed using exploits.</p>
</li>
</ul>
<h3 id="critical-zero-click-vulnerability-affects-millions-of-synology-nas-devices"><a href="https://thehackernews.com/2024/11/synology-urges-patch-for-critical-zero.html?ref=mandos.io">Critical Zero-Click Vulnerability Affects Millions of Synology NAS Devices</a></h3>
<ul>
<li>
<p>Security researcher Rick de Jager demonstrated a critical zero-day vulnerability, dubbed <strong>RISK:STATION</strong>, affecting Synology DiskStation and BeeStation NAS devices at the <strong>Pwn2Own Ireland 2024</strong> hacking contest.</p>
</li>
<li>
<p>The <strong>unauthenticated</strong> and <strong>zero-click</strong> nature of the flaw allows attackers to gain <strong>root-level code execution</strong> on the affected devices without requiring any user interaction, potentially exposing sensitive data to theft and enabling further malware infections.</p>
</li>
<li>
<p>Synology has released patches for the impacted versions of BeePhotos for BeeStation OS and Synology Photos for DSM, while QNAP has also addressed three critical vulnerabilities (<strong>CVE-2024-50389</strong>, <strong>CVE-2024-50387</strong>, and <strong>CVE-2024-50388</strong>) in QuRouter, SMB Service, and HBS 3 Hybrid Backup Sync.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-cybersecurity-forecast-2025-highlights-ai-threats-big-four-activity-and-rising-challenges"><a href="https://drive.google.com/file/d/1XfpNXaDdeOp4vjvcgD-Xx66e7ssDE7pz/view?usp=share_link&ref=mandos.io">Google Cybersecurity Forecast 2025 Highlights AI Threats, Big Four Activity, and Rising Challenges</a></h3>
<ul>
<li>
<p>The Cybersecurity Forecast 2025 report from Google Cloud predicts malicious actors will rapidly adopt <strong>AI-based tools</strong> to enhance attacks, while defenders leverage AI for semi-autonomous security operations.</p>
</li>
<li>
<p>Activity from the "Big Four" (<strong>Russia</strong>, <strong>China</strong>, <strong>Iran</strong>, and <strong>North Korea</strong>) will continue to be driven by geopolitical conflicts and economic motivations, with a focus on cyber espionage, disruptive attacks, and information operations.</p>
</li>
<li>
<p>Organizations will face rising threats from <strong>infostealer malware</strong>, <strong>compromised identities</strong> in hybrid environments, and the democratization of cyber capabilities lowering barriers to entry for less-skilled actors.</p>
</li>
</ul>
<h3 id="aws-vulnerability-management-best-practices-for-secure-cloud-infrastructure"><a href="https://www.linkedin.com/posts/nikolozk_wiz-aws-vm-cheat-sheet-activity-7263557163489398784-qmBo?ref=mandos.io">AWS Vulnerability Management Best Practices for Secure Cloud Infrastructure</a></h3>
<ul>
<li>
<p>Wiz provides a cheat sheet for AWS vulnerability management best practices, emphasizing the importance of continuous assessment using agentless, cloud-native API deployment to maintain an up-to-date <strong>asset inventory</strong>.</p>
</li>
<li>
<p>To ensure comprehensive coverage, it's critical to set up scans for various AWS <strong>asset types</strong>, such as EC2 instance disk scanning, ECS/EKS <strong>container image</strong> analysis, Lambda function package inspection, and ECR registry scanning.</p>
</li>
<li>
<p>After discovering assets and identifying vulnerabilities, contextual <strong>risk-based prioritization</strong> helps focus resources on the most critical issues by considering factors like vulnerability severity, asset criticality, exposure, and exploitability.</p>
</li>
</ul>
<p><strong>Both industry reports are now included in my <a href="https://mandos.io/cyber-strategy-os/">Cyber Strategy OS </a>among other industry reports, guides and cheat sheets.</strong></p>
<h3 id="ciso-role-faces-mounting-pressures-amid-skills-shortage-and-increased-liability"><a href="https://www.infosecurity-magazine.com/blogs/ciso-transformational-leadership/?ref=mandos.io">CISO Role Faces Mounting Pressures Amid Skills Shortage and Increased Liability</a></h3>
<ul>
<li>
<p><strong>Burnout</strong> is severely impacting CISOs, with 94% reporting work stress and 74% leaving their positions in 2022, while Gartner predicts 50% of security leaders will change jobs by 2025.</p>
</li>
<li>
<p>Growing challenges include 4 million unfilled security positions, evolving <strong>regulatory</strong> requirements, and landmark legal cases establishing new precedents for CISO liability (Uber, SolarWinds).</p>
</li>
<li>
<p>Transformational leadership approach emphasizes cross-functional alignment, <strong>automation</strong> implementation, and strategic upskilling of teams through certification programs to combat organizational gaps.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-job-market-challenges-despite-talent-shortage"><a href="https://cybernews.com/editorial/brutal-cybersecurity-job-market/?ref=mandos.io">Cybersecurity Job Market Challenges Despite Talent Shortage</a></h3>
<ul>
<li>
<p>Ernestas Naprys, a senior journalist, reports that despite a global shortfall of 4 million <strong>cybersecurity</strong> professionals, many job seekers are struggling to land roles, describing the market as "brutal".</p>
</li>
<li>
<p>Matt Collingwood, Managing Director of VIQU IT Recruitment agency, observes that while the pandemic increased demand for cybersecurity expertise, businesses are now hesitant to spend due to recessions and elections, and have high requirements for professionals, including a certain number of years of <strong>experience</strong>.</p>
</li>
<li>
<p>Brandon Dock, Managing Director of TGC Search, sees more demand for highly specialized skills in <strong>cloud security</strong>, <strong>threat hunting</strong>, and compliance expertise, and argues that while the market may have challenges, the need for cybersecurity talent is real.</p>
</li>
</ul>
<h3 id="remote-work-key-to-attracting-and-retaining-cybersecurity-talent"><a href="https://www.reddit.com/r/cybersecurity/comments/1gpcfrg/a_simple_solution_to_decrease_high_turnover_rates/?ref=mandos.io">Remote Work Key to Attracting and Retaining Cybersecurity Talent</a></h3>
<ul>
<li>
<p>Reddit discussion highlights that offering <strong>100% remote</strong> positions is crucial for attracting and retaining <strong>cybersecurity professionals</strong>, according to a Security Engineer with 5 years of experience.</p>
</li>
<li>
<p>Companies often struggle to find security talent, yet many still require in-office or <strong>hybrid</strong> work arrangements, even when teams are <strong>distributed</strong> across multiple locations.</p>
</li>
<li>
<p>Hiring managers who clearly state that positions are remote, offer mid-market pay rates, and extend trust to employees by allowing them to work unsupervised have had success in hiring <strong>senior engineers</strong> and architects with little difficulty.</p>
</li>
</ul>
<h3 id="isc2-accused-of-misrepresenting-cybersecurity-job-market-data"><a href="https://www.linkedin.com/pulse/open-letter-isc2-board-ira-winkler-gvoge/?ref=mandos.io">ISC2 Accused of Misrepresenting Cybersecurity Job Market Data</a></h3>
<ul>
<li>
<p><strong>Ira Winkler</strong>, a cybersecurity professional, claims that <strong>ISC2</strong> acting CEO Debra Taylor misrepresented data about the demand for cybersecurity professionals in her keynote at the ISC2 Security Congress.</p>
</li>
<li>
<p>Winkler argues that ISC2 conflates the terms "<strong>demand</strong>" and "<strong>need</strong>" when discussing the cybersecurity workforce gap, misleading entry-level professionals about the true state of the job market, which has seen flat growth and even job losses in some regions.</p>
</li>
<li>
<p>He recommends that ISC2 focus on promoting the benefits of proper cybersecurity programs and hiring certified professionals, while also supporting long-term unemployed members, to maintain its credibility as a non-profit serving the professional community and avoid potential legal action.</p>
</li>
</ul>
<blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="nvidia-morpheus-enhances-soc-efficiency-with-ai-powered-alert-triage-and-llm-agents"><a href="https://developer.nvidia.com/blog/augmenting-security-operations-centers-with-accelerated-alert-triage-and-llm-agents-using-nvidia-morpheus?ref=mandos.io">NVIDIA Morpheus Enhances SOC Efficiency with AI-Powered Alert Triage and LLM Agents</a></h3>
<ul>
<li>
<p>Katherine Huang and Dhruv Nandakumar from NVIDIA demonstrate how the NVIDIA Morpheus cybersecurity AI framework can augment security operations centers (SOCs) by automating alert triage and providing an AI-powered security co-pilot to assist SOC analysts.</p>
</li>
<li>
<p>The digital fingerprinting AI workflow in Morpheus enables large-scale <strong>anomaly detection</strong> on networks by learning normal behavior profiles and generating z-scores when behavior deviates. Generative AI is then used to transform these outputs into actionable insights in the form of readable reports.</p>
</li>
<li>
<p>The security co-pilot, powered by an <strong>LLM agent</strong> and various NVIDIA NIM microservices, can engage in natural language interactions with SOC analysts, performing iterative reasoning through <strong>retrieval-augmented generation (RAG)</strong> to gather relevant evidence and streamline investigations, ultimately increasing SOC productivity and reducing response times to potential <strong>security breaches</strong>.</p>
</li>
</ul>
<h3 id="researcher-demonstrates-agentic-code-execution-in-anthropics-computer-use-demo"><a href="https://www.securityrunners.io/post/beyond-rce-autonomous-code-execution-in-agentic-ai?ref=mandos.io">Researcher Demonstrates Agentic Code Execution in Anthropic's Computer Use Demo</a></h3>
<ul>
<li>
<p>Security researcher exploits <strong>prompt injection</strong> techniques and <strong>phishing</strong> to gain control over Anthropic's Computer Use demo, coining the term "<strong>Agentic Code Execution</strong>" (ACE).</p>
</li>
<li>
<p>By providing a malicious PDF with instructions to open the calculator app, the researcher successfully manipulated the AI agent to perform unintended actions, highlighting potential <strong>security risks</strong> in agentic systems.</p>
</li>
<li>
<p>Despite clear warnings from Anthropic about the dangers of malicious web content hijacking AI behavior, the researcher emphasizes the need for adequate <strong>security guardrails</strong> as organizations adopt this early-stage technology.</p>
</li>
</ul>
<h3 id="ai-risk-management-thinking-beyond-regulatory-boundaries"><a href="https://drive.google.com/drive/u/0/folders/1xY_RxCn5EEnMhbeIw7jM13-x2q_fwuJl?ref=mandos.io">AI Risk Management: Thinking Beyond Regulatory Boundaries</a></h3>
<ul>
<li>
<p>The Cloud Security Alliance (CSA) AI Governance and Compliance Working Group provides a holistic overview and methodology for impartially <strong>assessing intelligent systems</strong> across their entire lifecycle.</p>
</li>
<li>
<p>The approach emphasizes <strong>privacy, security, and trustworthiness</strong> by proposing a risk-based assessment focused on critical thinking, curiosity, and the auditor's ability to assess systems for unintended behavior.</p>
</li>
<li>
<p>The paper outlines areas an auditor needs to be aware of and provides sample <strong>audit questions</strong> in the appendices to promote outside-the-box thinking and assessments beyond just compliance.</p>
</li>
</ul>
<p></p><p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="silicon-valley-bank-provides-50m-growth-capital-to-bugcrowd"><a href="https://www.svb.com/news/client-news/bugcrowd-secures-$50-million-growth-capital-facility-from--silicon-valley-bank/?ref=mandos.io">Silicon Valley Bank Provides $50M Growth Capital to Bugcrowd</a></h3>
<ul>
<li>
<p>Silicon Valley Bank (SVB), a division of First Citizens Bank, has provided a $50 million <strong>growth capital</strong> facility to Bugcrowd, a leading provider of <strong>crowdsourced cybersecurity</strong> solutions.</p>
</li>
<li>
<p>The new financing will further scale Bugcrowd's <strong>AI-powered platform</strong> globally, fund continued innovation into the Bugcrowd Platform, and leverage opportunities for strategic <strong>M&amp;A</strong>.</p>
</li>
<li>
<p>For over a decade, Bugcrowd's unique "skills-as-a-service" approach has uncovered more high-impact <strong>vulnerabilities</strong> than traditional methods for more than 1,200 customers.</p>
</li>
</ul>
<h3 id="bitsight-acquires-cybersixgill-for-115m-to-enhance-cyber-risk-management"><a href="https://techcrunch.com/2024/11/14/bitsight-buys-dark-web-security-specialist-cybersixgill-for-115m/?ref=mandos.io">Bitsight Acquires Cybersixgill for $115M to Enhance Cyber Risk Management</a></h3>
<ul>
<li>
<p>Bitsight, a <strong>cybersecurity</strong> startup valued at $2.4 billion, is acquiring Cybersixgill for $115 million to enhance its cyber risk management capabilities.</p>
</li>
<li>
<p>Cybersixgill analyzes <strong>dark web</strong> activity to proactively identify data leaks, potential <strong>breaches</strong>, and new techniques, complementing Bitsight's focus on assessing enterprise risk profiles.</p>
</li>
<li>
<p>The acquisition will see more investment in Cybersixgill's products, with Bitsight committed to driving innovation and bringing greater value to <strong>customers</strong>.</p>
</li>
</ul>
<h3 id="surepath-ai-raises-52m-for-secure-enterprise-generative-ai-governance"><a href="https://www.securityweek.com/surepath-ai-raises-5-2-million-for-gen-ai-governance-solution/?ref=mandos.io">SurePath AI Raises $5.2M for Secure Enterprise Generative AI Governance</a></h3>
<ul>
<li>
<p>SurePath AI, founded in 2023 and launched at AWS re:Inforce 2024, has raised $5.2 million in seed funding led by <strong>Uncork Capital</strong> and Operator Collective, bringing their total funding to $6.3 million.</p>
</li>
<li>
<p>The SurePath AI platform provides visibility and control over gen-AI usage across public and private models, with <strong>role-based access controls</strong> to manage data access and end-user permissions.</p>
</li>
<li>
<p>The platform enables organizations to capture, monitor, secure and route gen-AI traffic, centrally manage access control policies, and inject <strong>enterprise data</strong> and <strong>prompt engineering</strong> into gen-AI use.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="openedr"><a href="https://cybersectools.com/tools/openedr?ref=mandos.io">OpenEDR</a></h3>
<p>OpenEDR is an open-source endpoint detection and response platform that offers real-time analytic detection and event correlation, providing visibility into adversarial cyber threats and behaviors to enhance cybersecurity defenses for organizations of all sizes.</p>
<h3 id="amazon-detective"><a href="https://cybersectools.com/tools/amazon-detective?ref=mandos.io">Amazon Detective</a></h3>
<p>Analyze and visualize security data to investigate potential security issues. Determine potential security issues through a unified view of user and resource interactions. Save time and effort with graph models that automatically summarize security-related relationships.</p>
<h3 id="fastifycsrf-protection"><a href="https://cybersectools.com/tools/fastifycsrf-protection?ref=mandos.io">@fastify/csrf-protection</a></h3>
<p>This plugin helps developers protect their Fastify server against CSRF attacks. In order to fully protect against CSRF, developers should study Cross-Site Request Forgery Prevention Cheat Sheet in depth.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #77: PAN-OS Vulnerability, Google&#x27;s AI Finds SQLite Bug, AWS Cert Tops Pay List ]]></title>
        <description><![CDATA[ Criminals exploiting DocuSign APIs for fraud. Apple offers $1M for PCC vulnerabilities. Latest security acquisitions. ]]></description>
        <link>https://mandos.io/newsletter/brief-77-pan-os-vulnerability-googles-ai-finds-sqlite-bug-aws-cert-tops-pay-list/</link>
        <guid isPermaLink="false">673083bb6af92700017914c9</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 10 Nov 2024 12:20:15 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/11/45.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>Google's AI agent discovers a significant SQLite vulnerability, marking a milestone in AI-powered security research</li><li>AWS Security Specialty certification leads the pack with average salaries reaching $203,597</li><li>Palo Alto Networks alerts users about a potential RCE vulnerability in PAN-OS management interface</li></ul><p>And much more.</p><hr>
<!--kg-card-begin: html-->
<div style="width:90%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 1rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsored
        </span>
        
        <h3 style="margin-top: 1rem; font-size: 2.5rem; font-weight: 800; color: white; line-height: 1.2;">
            Fabric by BlackStork
        </h3>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1.25rem; line-height: 1.6; color: #e5e7eb;">
            Fabric Platform streamlines cybersecurity reporting processes, offering a comprehensive solution for teams seeking efficiency and consistency.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://blackstork.io/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.75rem 1.5rem; font-weight: 600; font-size: 1.125rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out; border: 2px solid #00A383;">
                Learn More →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="palo-alto-networks-warns-of-potential-rce-vulnerability-in-pan-os-management-interface"><a href="https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html?ref=mandos.io">Palo Alto Networks Warns of Potential RCE Vulnerability in PAN-OS Management Interface</a></h3>
<ul>
<li>
<p><strong>Palo Alto Networks</strong> has issued an informational advisory about a potential <strong>remote code execution</strong> vulnerability in the PAN-OS <strong>management interface</strong>, although specifics are currently unknown.</p>
</li>
<li>
<p>The company recommends customers properly configure the management interface per best practices, such as isolating it on a dedicated <strong>VLAN</strong>, using jump servers, limiting inbound IPs, and only allowing secure protocols like <strong>SSH</strong> and HTTPS.</p>
</li>
<li>
<p>This follows the addition of a now-patched critical <strong>authentication</strong> bypass flaw (CVE-2024-5910) in Palo Alto Networks Expedition to CISA's Known Exploited Vulnerabilities catalog, which could lead to <strong>admin account takeover</strong>.</p>
</li>
</ul>
<h3 id="cybercriminals-exploit-docusign-apis-to-send-authentic-looking-fake-invoices"><a href="https://lab.wallarm.com/attackers-abuse-docusign-api-to-send-authentic-looking-invoices-at-scale/?ref=mandos.io">Cybercriminals Exploit DocuSign APIs to Send Authentic-Looking Fake Invoices</a></h3>
<ul>
<li>
<p>Wallarm security researchers report that cybercriminals are using legitimate, paid <strong>DocuSign</strong> accounts and templates to send fake invoices that appear authentic, bypassing email and <strong>anti-spam</strong> filters.</p>
</li>
<li>
<p>The fake invoices, often impersonating well-known <strong>software</strong> companies like <strong>Norton</strong>, contain accurate pricing and additional charges, tricking users into e-signing and authorizing payments to attackers' bank accounts.</p>
</li>
<li>
<p>Attackers are automating the process using DocuSign's APIs, such as the Envelopes: create API, allowing them to send large volumes of fraudulent invoices with minimal manual intervention, abusing the platform's API-friendly environment.</p>
</li>
</ul>
<h3 id="aws-cdk-vulnerability-allowed-account-takeover-via-missing-s3-bucket"><a href="https://www.aquasec.com/blog/aws-cdk-risk-exploiting-a-missing-s3-bucket-allowed-account-takeover/?ref=mandos.io">AWS CDK Vulnerability Allowed Account Takeover via Missing S3 Bucket</a></h3>
<ul>
<li>
<p>Security researchers Ofek Itach and Yakir Kadkoda discovered a <strong>security issue</strong> in the AWS Cloud Development Kit (CDK) that could allow an attacker to gain <strong>administrative access</strong> to a target AWS account, resulting in a full <strong>account takeover</strong>.</p>
</li>
<li>
<p>The researchers found that approximately 1% of AWS CDK users were susceptible to this attack vector due to the <strong>manual deletion</strong> of their deployment artifact S3 bucket(s) created during the CDK bootstrapping process.</p>
</li>
<li>
<p>AWS addressed the issue in CDK version v2.149.0 by adding a condition to the bootstrap file-publish role, ensuring it only trusts <strong>buckets</strong> within the user's account. However, user action is required if CDK version v2.148.1 or earlier was used.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="alert-fatigue-persists-in-cybersecurity-despite-decades-of-efforts"><a href="https://medium.com/anton-on-security/antons-alert-fatigue-the-study-0ac0e6f5621c?ref=mandos.io">Alert Fatigue Persists in Cybersecurity Despite Decades of Efforts</a></h3>
<ul>
<li>
<p>Anton Chuvakin, the author, discusses how <strong>alert fatigue</strong> has been a persistent problem in cybersecurity SOCs since the 1970s, despite the industry changing rapidly.</p>
</li>
<li>
<p>Several factors contribute to the endurance of alert fatigue, including increasing <strong>data volumes</strong>, environment complexity, number of security tools, and <strong>threat activity</strong>.</p>
</li>
<li>
<p>Surveys reveal SOC teams are overwhelmed by the sheer volume of alerts, with 62% of an average 3,832 daily alerts being <strong>ignored</strong>, and over 80% being <strong>false positives</strong>.</p>
</li>
</ul>
<h3 id="nist-launches-human-centric-cybersecurity-initiative-to-improve-security-design"><a href="https://www.darkreading.com/cybersecurity-operations/how-to-make-humans-part-of-cybersecurity-design?ref=mandos.io">NIST Launches Human-Centric Cybersecurity Initiative to Improve Security Design</a></h3>
<ul>
<li>
<p>NIST established a new <strong>Community of Interest</strong> focusing on human-centered cybersecurity, aiming to make security more effective by considering user needs and behaviors rather than treating humans as the weak link.</p>
</li>
<li>
<p>Research shows the traditional approach of restricting user behavior is failing - 68% of breaches in 2023 involved human elements. Organizations are urged to implement <strong>behavioral analytics</strong> and security monitoring while reducing security burdens on users.</p>
</li>
<li>
<p>Gartner predicts 50% of large enterprises will adopt human-centric security by 2027, focusing on creating a positive security culture through <strong>threat simulations</strong>, automation, and reward systems for reporting incidents.</p>
</li>
</ul>
<h3 id="ai-assisted-investigation-tools-alone-do-not-constitute-an-ai-soc"><a href="https://www.linkedin.com/posts/andrew-green-tech_aisoc-ai-soc-activity-7259161211487830017-p678/?ref=mandos.io">AI-Assisted Investigation Tools Alone Do Not Constitute an AI SOC</a></h3>
<ul>
<li>
<p>Andrew Green questions the notion that <strong>LLM-aided investigation</strong> tools alone can be considered an "<strong>AI SOC</strong>", arguing that a fully automated SOC requires a comprehensive set of supporting functions.</p>
</li>
<li>
<p>For a SOC to become as autonomous as possible, it needs components such as <strong>ingestion and storage</strong>, <strong>detection engine</strong>, manual <strong>threat hunting</strong>, <strong>anomaly detection</strong>, and <strong>automation, orchestration, and response</strong>.</p>
</li>
<li>
<p>Vendors like Dropzone AI, Prophet Security, Radiant Security, and Culminate offer standalone assisted and automated investigation tools, but their future trajectory may involve being <strong>acquired</strong> by wider security operations platform providers or expanding their capabilities to include response.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="aws-certified-security-specialty-tops-highest-paying-it-certifications-for-2025"><a href="https://www.cio.com/article/286762/careers-staffing-12-it-certifications-that-deliver-career-advancement.html?ref=mandos.io">AWS Certified Security Specialty Tops Highest-Paying IT Certifications for 2025</a></h3>
<ul>
<li>
<p><strong>Skillsoft's</strong> annual IT Skills and Salary report reveals the top 20 highest-paying IT certifications for 2025, with <strong>AWS Certified Security - Specialty</strong> leading the pack at an average salary of $203,597.</p>
</li>
<li>
<p>Other top-paying certifications include <strong>Google Cloud - Professional Cloud Architect</strong> ($190,204), <strong>Nutanix Certified Professional - Multicloud Infrastructure</strong> ($175,409), and <strong>Certified Cloud Security Professional</strong> ($171,524).</p>
</li>
<li>
<p>The list highlights the growing importance of <strong>cybersecurity</strong> and <strong>cloud</strong> skills, with certifications from AWS, Google Cloud, Cisco, (ISC)², ISACA, and Microsoft dominating the rankings.</p>
</li>
</ul>
<h3 id="redditors-share-tips-for-making-the-most-of-a-goldman-sachs-cybersecurity-internship"><a href="https://www.reddit.com/r/cybersecurity/comments/1gjq0u7/landed_my_dream_cybersecurity_internship_at/?ref=mandos.io">Redditors Share Tips for Making the Most of a Goldman Sachs Cybersecurity Internship</a></h3>
<ul>
<li>
<p>Redditor who landed their dream cybersecurity internship at <strong>Goldman Sachs</strong> sought advice on how to make the most of the opportunity, and the community chimed in with helpful responses.</p>
</li>
<li>
<p>One Redditor, who interned at a <strong>FAANG company</strong>, emphasized the importance of <strong>networking</strong>, being friendly, and communicating with your team, sharing a story of how the most social intern was the only one to receive a return offer despite others being more technically skilled.</p>
</li>
<li>
<p>Other tips included taking initiative to set up interviews with people in higher-level IT or cyber jobs who can recommend you internally, asking questions about their career paths, building a <strong>LinkedIn</strong> profile early on, and connecting with hiring managers and talent acquisition professionals at companies you may want to work for in the future.</p>
</li>
</ul>
<h3 id="ciso-job-exodus-24-actively-seeking-new-positions-50-open-to-offers"><a href="https://www.csoonline.com/article/3595796/24-of-cisos-actively-looking-to-leave-their-jobs.html?ref=mandos.io">CISO Job Exodus: 24% Actively Seeking New Positions, 50% Open to Offers</a></h3>
<ul>
<li>
<p>Survey reveals growing <strong>burnout</strong> among security leaders, with nearly one-quarter actively job hunting and half willing to consider new opportunities, driven by emerging threats and personal liability concerns.</p>
</li>
<li>
<p>Limited career advancement opportunities within organizations force CISOs to look externally, with typical <strong>tenure</strong> averaging only 18-24 months before seeking new positions.</p>
</li>
<li>
<p>Rising concerns about job security, as 77% of CISOs fear termination following a major <strong>breach</strong>, leading some to consider alternative roles such as virtual CISO positions to reduce stress.</p>
</li>
</ul>
<blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-project-zero-discovers-exploitable-stack-buffer-underflow-in-sqlite-using-ai"><a href="https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html?ref=mandos.io">Google Project Zero Discovers Exploitable Stack Buffer Underflow in SQLite Using AI</a></h3>
<ul>
<li>
<p><strong>Google Project Zero</strong> researchers used their <strong>AI agent "Big Sleep"</strong> to discover an exploitable <strong>stack buffer underflow vulnerability</strong> in the widely-used open source <strong>database engine SQLite</strong>.</p>
</li>
<li>
<p>The vulnerability was found and reported to SQLite developers in early October, who <strong>fixed it the same day</strong> before it appeared in an official release, so SQLite users were not impacted.</p>
</li>
<li>
<p>The researchers believe this is the first public example of an <strong>AI agent finding a previously unknown exploitable memory-safety issue</strong> in widely used real-world software, demonstrating the potential for AI to help defenders find bugs that are difficult or impossible to find through traditional fuzzing techniques.</p>
</li>
</ul>
<h3 id="developing-secure-software-course-teaches-fundamentals-for-countering-attacks"><a href="https://training.linuxfoundation.org/training/developing-secure-software-lfd121/?ref=mandos.io">Developing Secure Software Course Teaches Fundamentals for Countering Attacks</a></h3>
<ul>
<li>
<p>The Linux Foundation's "Developing Secure Software" (<strong>LFD121</strong>) course, developed by the <strong>Open Source Security Foundation (OpenSSF)</strong>, focuses on teaching software developers, DevOps professionals, and engineers the basics of developing software hardened against <strong>attacks</strong>.</p>
</li>
<li>
<p>The course covers topics such as <strong>secure design principles</strong>, securely selecting and acquiring reused software (including <strong>open source</strong>), input validation, secure data processing, calling other programs securely, and verification techniques like <strong>static and dynamic analysis</strong>.</p>
</li>
<li>
<p>It also delves into more specialized topics like <strong>threat modeling</strong> and applying <strong>cryptographic</strong> capabilities, aiming to enable developers to create systems that are harder to successfully attack, reduce damage from successful attacks, and speed up vulnerability remediation.</p>
</li>
</ul>
<h3 id="apple-launches-1m-bug-bounty-program-for-private-cloud-compute-security"><a href="https://www.techopedia.com/news/apple-offers-1m-to-anyone-who-can-hack-its-private-cloud-compute?ref=mandos.io">Apple Launches $1M Bug Bounty Program for Private Cloud Compute Security</a></h3>
<ul>
<li>
<p>Apple is offering rewards up to <strong>$1 million</strong> for researchers who can identify vulnerabilities in their new Private Cloud Compute (PCC) platform, with specific bounties ranging from $50,000 to $250,000 for different types of security breaches.</p>
</li>
<li>
<p>The company has released a Virtual Research Environment (VRE) allowing security researchers to analyze PCC on <strong>Apple Silicon</strong> Macs, complete with tools for code inspection and log verification.</p>
</li>
<li>
<p>The PCC infrastructure will handle complex <strong>AI processing</strong> requests as part of Apple's Intelligence features, with initial rollout beginning in <strong>iOS 18.1</strong> and expanding through 2025.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="fortinet-launches-ai-powered-fortidlp-for-automated-data-protection"><a href="https://www.networkworld.com/article/3595585/fortinet-launches-its-first-standalone-endpoint-dlp-product.html?ref=mandos.io">Fortinet Launches AI-Powered FortiDLP for Automated Data Protection</a></h3>
<ul>
<li>
<p>Fortinet has introduced <strong>FortiDLP</strong>, a new standalone <strong>endpoint DLP</strong> solution that expands its data protection portfolio, leveraging technology from its acquisition of Next DLP.</p>
</li>
<li>
<p>FortiDLP provides <strong>automated data movement tracking</strong>, cloud application monitoring, and endpoint protection mechanisms that work both online and offline, integrating with the Fortinet Security Fabric.</p>
</li>
<li>
<p>The platform automatically classifies <strong>sensitive data</strong> at the point of access, tracks and controls data egress, and includes a customizable database of over 500 predefined data patterns and policies for simplified deployment.</p>
</li>
</ul>
<h3 id="noma-security-emerges-from-stealth-with-32m-to-secure-ai-lifecycle"><a href="https://www.securityweek.com/noma-security-raises-32-million-to-safeguard-gen-ai-applications/?ref=mandos.io">Noma Security Emerges from Stealth with $32M to Secure AI Lifecycle</a></h3>
<ul>
<li>
<p>Noma Security, based in Tel Aviv, Israel, has raised $32 million in Series A funding led by <strong>Ballistic Ventures</strong> to protect the data and lifecycle of emerging gen-AI applications.</p>
</li>
<li>
<p>The Noma platform covers the entire <strong>Data &amp; AI Lifecycle</strong>, addressing new risks like misconfigured data pipelines, vulnerable and malicious open source models, prompt injection, and jailbreaking.</p>
</li>
<li>
<p>Founded by former members of the <strong>IDF's 8200</strong> intelligence unit, Noma aims to provide a single platform for end-to-end security in the AI development process, extending to production with real-time monitoring, blocking, sensitive data masking, and alerting.</p>
</li>
</ul>
<h3 id="crowdstrike-to-acquire-adaptive-shield-for-comprehensive-saas-security"><a href="https://www.businesswire.com/news/home/20241106324741/en/CrowdStrike-to-Acquire-Adaptive-Shield-to-Deliver-the-Only-Platform-that-Unifies-Cloud-and-Identity-Security-with-Integrated-SaaS-Protection/?ref=mandos.io">CrowdStrike to Acquire Adaptive Shield for Comprehensive SaaS Security</a></h3>
<ul>
<li>
<p>CrowdStrike announces agreement to acquire Adaptive Shield, a leader in <strong>SaaS Security</strong>, to provide unified protection against <strong>identity-based attacks</strong> across the modern cloud ecosystem.</p>
</li>
<li>
<p>The acquisition will enable CrowdStrike to deliver comprehensive <strong>SaaS Security Posture Management (SSPM)</strong>, GenAI Application Security Control, and unified hybrid identity and cloud security.</p>
</li>
<li>
<p>The combination of Adaptive Shield and CrowdStrike Falcon® Identity Protection will provide customers with comprehensive identity protection across <strong>SaaS</strong>, on-premises Active Directory, and cloud-based environments.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="nuke-my-luks"><a href="https://cybersectools.com/tools/nuke-my-luks?ref=mandos.io">Nuke My LUKS</a></h3>
<p>A simple network-based panic button designed to overwrite the LUKS header with random data and shutdown the computer in case of an emergency situation. This tool can be useful for activists, human right workers and others that face an adversary, such as law enforcement, that can coerce the subject to disclose the encryption passwords for the computer's hard drives.</p>
<h3 id="dorksearch"><a href="https://cybersectools.com/tools/dorksearch?ref=mandos.io">DorkSearch</a></h3>
<p>AI-powered Google Dorking Assistant: This tool helps users create effective Dork queries for searching sensitive information on the internet.</p>
<h3 id="cloudgoat"><a href="https://cybersectools.com/tools/cloudgoat?ref=mandos.io">CloudGoat</a></h3>
<p>CloudGoat is Rhino Security Labs' 'Vulnerable by Design' AWS deployment tool that allows users to hone their cloud cybersecurity skills through 'capture-the-flag' style scenarios.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #76: 19M Records Exposed, AI Generates 25% of Code, CrowdStrike Lawsuit ]]></title>
        <description><![CDATA[ Multiple critical vulnerabilities in NetIQ iManager, cybersecurity workforce growth stalls, and AI reshapes code development at Google. ]]></description>
        <link>https://mandos.io/newsletter/brief-76-19m-records-exposed-ai-generates-25-of-code-crowdstrike-lawsuit/</link>
        <guid isPermaLink="false">672743aac171c40001b5dfa8</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 03 Nov 2024 12:00:46 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/11/44.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>French ISP 'Free' faces massive data breach affecting 19M customers</li><li>Google reveals AI now generates 25% of their new code</li><li>New survey shows concerning CISO burnout trends with 25% considering career changes</li></ul><p>And much more.</p><hr>
<!--kg-card-begin: html-->
<div style="width:100%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 1rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsored
        </span>
        
        <h3 style="margin-top: 1rem; font-size: 2.5rem; font-weight: 800; color: white; line-height: 1.2;">
            Fabric by BlackStork
        </h3>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1.25rem; line-height: 1.6; color: #e5e7eb;">
            Fabric Platform streamlines cybersecurity reporting processes, offering a comprehensive solution for teams seeking efficiency and consistency.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://blackstork.io/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.75rem 1.5rem; font-weight: 600; font-size: 1.125rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out; border: 2px solid #00A383;">
                Learn More →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="french-isp-free-hit-by-data-breach-exposing-19m-customer-records"><a href="https://www.darkreading.com/cyberattacks-data-breaches/french-isp-cyberattack-data-breach?ref=mandos.io">French ISP 'Free' Hit by Data Breach Exposing 19M Customer Records</a></h3>
<ul>
<li>
<p>Threat actor "<strong>drussellx</strong>" accessed Free's internal management tool and attempted to sell two databases on Dark Web forums containing over 19M customer accounts and 5M international <strong>bank</strong> account details</p>
</li>
<li>
<p>Free confirmed no passwords, payment cards, emails, SMS, or voicemails were compromised in the breach, though personal data was accessed. The company's services remain unaffected by the <strong>intrusion</strong></p>
</li>
<li>
<p>This incident follows a pattern of increasing <strong>APT</strong> attacks targeting ISPs, with groups like Salt Typhoon and Evasive Panda exploiting these networks to gather customer data and establish persistence for further campaigns</p>
</li>
</ul>
<h3 id="multiple-critical-vulnerabilities-found-in-netiq-imanager-enable-remote-code-execution"><a href="https://www.securityweek.com/yahoo-discloses-netiq-imanager-flaws-allowing-remote-code-execution/?ref=mandos.io">Multiple Critical Vulnerabilities Found in NetIQ iManager Enable Remote Code Execution</a></h3>
<ul>
<li>
<p>Yahoo's Paranoid team discovered 11 <strong>vulnerabilities</strong> in OpenText's NetIQ iManager, including authentication bypass (CVE-2024-3487), command injection (CVE-2024-3483), and arbitrary file upload (CVE-2024-3488) flaws.</p>
</li>
<li>
<p>When <strong>chained</strong> together, these vulnerabilities allow unauthenticated attackers to compromise iManager instances remotely by tricking users into visiting malicious websites, potentially gaining administrator credentials.</p>
</li>
<li>
<p>The flaws were patched in April 2024, but are particularly concerning as iManager holds a <strong>privileged</strong> position in managing directory services that maintain user account information and serve as a source of truth for downstream applications.</p>
</li>
</ul>
<h3 id="critical-authentication-flaws-in-mitsubishi-and-rockwell-factory-systems-enable-rce"><a href="https://www.darkreading.com/vulnerabilities-threats/critical-auth-bugs-smart-factory-cyberattack?ref=mandos.io">Critical Authentication Flaws in Mitsubishi and Rockwell Factory Systems Enable RCE</a></h3>
<ul>
<li>
<p><strong>CVE-2023-6943</strong> in Mitsubishi Electric automation software allows attackers to bypass authentication and achieve remote code execution through malicious library exploitation, carrying a critical <strong>CVSS</strong> score of 9.8</p>
</li>
<li>
<p>Rockwell Automation's <strong>ThinManager</strong> platform contains authentication bypass vulnerability (CVE-2024-10386) enabling database manipulation through crafted network messages</p>
</li>
<li>
<p>Multiple affected <strong>ICS</strong> products require immediate patching as CISA warns of increased nation-state targeting of smart factories by Russian and Chinese <strong>APTs</strong></p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ciso-burnout-crisis-25-consider-leaving-roles-due-to-stress"><a href="https://www.forbes.com/sites/tonybradley/2024/10/15/the-cybersecurity-burnout-crisis-is-reaching-the-breaking-point/?ref=mandos.io">CISO Burnout Crisis: 25% Consider Leaving Roles Due to Stress</a></h3>
<ul>
<li>
<p>Survey reveals <strong>93%</strong> of CISOs and IT Security Decision Makers cite overwhelming stress as primary reason for considering career changes, with most working an additional 9 hours beyond contracted time weekly.</p>
</li>
<li>
<p>Rising concerns about <strong>AI-enabled attacks</strong> (42%) and <strong>ransomware</strong> (37%) are key stressors, compounded by insufficient budgets and resources reported by 41% of security leaders.</p>
</li>
<li>
<p>Concerning coping mechanisms emerge with <strong>45%</strong> of respondents using substances to manage work pressure, while organizations attempt to address burnout through flexible hours (64%) and remote work options.</p>
</li>
</ul>
<h3 id="nis2-directive-consuming-80-of-it-budgets-while-effectiveness-questioned"><a href="https://www.csoonline.com/article/3596485/nis2-compliance-eats-up-it-budgets-despite-doubts.html?ref=mandos.io">NIS2 Directive Consuming 80% of IT Budgets While Effectiveness Questioned</a></h3>
<ul>
<li>
<p>Companies are reallocating funds from critical areas including <strong>risk management</strong> and crisis management to meet NIS2 compliance, with 95% of affected organizations diverting resources from other business functions.</p>
</li>
<li>
<p>Survey reveals 80% of IT budgets in EMEA region now dedicated to cybersecurity and <strong>compliance</strong>, despite 68% of companies already reducing their IT budgets over the past two years.</p>
</li>
<li>
<p>While 90% of organizations experienced security incidents that NIS2 could have prevented, only 43% believe the <strong>directive</strong> will significantly improve EU cybersecurity, highlighting a disconnect between implementation costs and perceived <strong>effectiveness</strong>.</p>
</li>
</ul>
<h3 id="crowdstrike-outage-response-key-considerations-for-enterprise-security-leaders"><a href="https://www.darkreading.com/vulnerabilities-threats/case-against-abandoning-crowdstrike-post-outage?ref=mandos.io">CrowdStrike Outage Response: Key Considerations for Enterprise Security Leaders</a></h3>
<ul>
<li>
<p>Despite July's outage impact of over $5B to Fortune 500 companies, CrowdStrike maintains strong <strong>reliability</strong> metrics with less than 3% of clients experiencing material cyber-insurance claims, suggesting hasty vendor changes may introduce unnecessary risks.</p>
</li>
<li>
<p>Organizations should carefully evaluate update processes, as delaying security patches to implement additional testing could leave systems vulnerable to emerging <strong>threats</strong>, requiring a balance between thorough testing and timely protection.</p>
</li>
<li>
<p>Companies should prioritize comprehensive <strong>resilience</strong> planning, including proper cyber hygiene, insurance coverage, and detailed incident response procedures, rather than making reactive decisions that could compromise security posture.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-training-gap-leaves-organizations-vulnerable-due-to-developer-centric-focus"><a href="https://www.darkreading.com/endpoint-security/cybersecurity-training-resources-limited-developers?ref=mandos.io">Cybersecurity Training Gap Leaves Organizations Vulnerable Due to Developer-Centric Focus</a></h3>
<ul>
<li>
<p>Nearly <strong>half</strong> of cybersecurity leaders don't consider security awareness training essential, with only 41% implementing training to address <strong>supply chain</strong> risks.</p>
</li>
<li>
<p>Organizations prioritize developer-focused training over comprehensive employee education, driven by customer satisfaction and financial metrics rather than security needs.</p>
</li>
<li>
<p>Research emphasizes the importance of role-specific <strong>customized</strong> training for all employees to improve organizational <strong>resilience</strong> against cyber threats and reduce breach incidents.</p>
</li>
</ul>
<h3 id="key-strategies-for-hiring-an-effective-ciso-in-todays-market"><a href="https://www.darkreading.com/cybersecurity-operations/how-find-right-ciso?ref=mandos.io">Key Strategies for Hiring an Effective CISO in Today's Market</a></h3>
<ul>
<li>
<p>Position the role strategically by having the CISO report directly to the CIO or CEO, ensuring proper <strong>authority</strong> and organizational structure to attract leadership-oriented candidates rather than pure technologists.</p>
</li>
<li>
<p>Focus on candidates who can balance both defensive security and offensive business growth, with strong <strong>change management</strong> capabilities to drive organization-wide security culture and behavior adoption.</p>
</li>
<li>
<p>Demonstrate board-level commitment by involving directors in the interview process and ensuring they understand cyber governance beyond just technical tools, as the best CISOs seek organizations with <strong>tech-savvy</strong> leadership that prioritizes security investments.</p>
</li>
</ul>
<h3 id="global-cybersecurity-workforce-growth-stalls-despite-90-having-unfilled-positions"><a href="https://www.darkreading.com/application-security/cybersecurity-job-market-stagnates-dissatisfaction-abounds?ref=mandos.io">Global Cybersecurity Workforce Growth Stalls Despite 90% Having Unfilled Positions</a></h3>
<ul>
<li>
<p>For the first time in six years, the cybersecurity workforce remained flat at 5.5 million people, with only 0.1% growth in 2024. <strong>Budget</strong> constraints have replaced talent shortage as the primary reason for unfilled positions, cited by 67% of organizations.</p>
</li>
<li>
<p>Job satisfaction among cybersecurity professionals has declined from 74% to 66% since 2022, while organizations with significant skills gaps are almost twice as likely to experience a material <strong>breach</strong> compared to those without gaps.</p>
</li>
<li>
<p><strong>AI adoption</strong> is viewed as a potential solution, with 45% of teams already using AI tools for cybersecurity tasks, though 58% believe current skill shortages put their organizations at significant risk. The top AI use case is augmenting common operational tasks, implemented by 56% of respondents.</p>
</li>
</ul>
<blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-reports-25-of-new-code-generated-by-ai-driving-strong-financial-growth"><a href="https://www.theverge.com/2024/10/29/24282757/google-new-code-generated-ai-q3-2024?ref=mandos.io">Google Reports 25% of New Code Generated by AI, Driving Strong Financial Growth</a></h3>
<ul>
<li>
<p>Over <strong>25%</strong> of Google's new code is now AI-generated and subsequently reviewed by engineers, marking a significant shift in their development practices while supporting various AI product initiatives.</p>
</li>
<li>
<p>Google's financial performance shows strong growth with <strong>Cloud</strong> revenue reaching $11.4 billion (up 35% YoY) and Google Services revenue hitting $76.5 billion (up 13% YoY), demonstrating successful AI integration across products.</p>
</li>
<li>
<p>Despite ongoing <strong>antitrust</strong> challenges and potential remedies phase following the August monopoly ruling, Google continues to expand AI features across Search, Cloud, and YouTube, with <strong>Gemini</strong>-powered chatbots and AI tools driving product adoption.</p>
</li>
</ul>
<h3 id="ai-tool-detects-zero-day-exploits-targeting-iot-security-cameras"><a href="https://www.securityweek.com/greynoise-credits-ai-for-spotting-exploit-attempts-on-iot-livestream-cams/?ref=mandos.io">AI Tool Detects Zero-Day Exploits Targeting IoT Security Cameras</a></h3>
<ul>
<li>
<p>GreyNoise Intelligence's <strong>honeypot</strong> system detected active exploitation attempts of two critical vulnerabilities (CVE-2024-8956 and CVE-2024-8957) in NDI-enabled PTZ cameras, with the most severe having a <strong>CVSS</strong> score of 9.1.</p>
</li>
<li>
<p>The vulnerabilities affect cameras used in <strong>healthcare</strong>, industrial, and government facilities, allowing attackers to potentially access sensitive information, manipulate video feeds, and incorporate devices into <strong>botnets</strong>.</p>
</li>
<li>
<p>Affected devices include PTZOptics, Multicam Systems SAS, and SMTAV Corporation cameras running VHD PTZ firmware versions below 6.3.40, with patches now available to address these security flaws.</p>
</li>
</ul>
<h3 id="ai-integration-in-energy-infrastructure-requires-early-stage-cybersecurity-planning"><a href="https://www.utilitydive.com/news/minimize-artificial-intelligence-cyber-risks-to-energy-infrastructure-start-with-design/731446/?ref=mandos.io">AI Integration in Energy Infrastructure Requires Early-Stage Cybersecurity Planning</a></h3>
<ul>
<li>
<p><strong>Data centers</strong> driving energy demand growth are prompting new infrastructure development, with major tech companies investing in power production including nuclear facilities to meet increasing needs.</p>
</li>
<li>
<p>AI presents dual implications: enhancing energy sector efficiency through improved monitoring and automation, while creating new <strong>vulnerabilities</strong> that malicious actors could exploit through sophisticated phishing and infrastructure mapping.</p>
</li>
<li>
<p>The Department of Energy is establishing AI <strong>testbeds</strong> to safely evaluate capabilities and threats, while industry coalitions are developing guidelines to strengthen supply chain security and establish <strong>standards</strong> for implementing AI in energy systems.</p>
</li>
</ul>
<p></p><p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-updates" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET UPDATES</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="delta-airlines-files-500m-lawsuit-against-crowdstrike-over-software-glitch"><a href="https://www.csoonline.com/article/3592941/delta-gets-serious-and-sues-crowdstrike.html?ref=mandos.io">Delta Airlines Files $500M Lawsuit Against CrowdStrike Over Software Glitch</a></h3>
<ul>
<li>
<p>A faulty update in CrowdStrike's <strong>Falcon</strong> security tool caused massive disruptions affecting 1.3 million Delta passengers across 7,000 flights on July 19, leading to the <strong>lawsuit</strong> filed in Georgia's Fulton County Superior Court.</p>
</li>
<li>
<p>The incident's impact extended beyond aviation, affecting multiple sectors including <strong>banking</strong>, healthcare, media, and hospitality, with Delta claiming the disruption caused over $500 million in damages.</p>
</li>
<li>
<p>CrowdStrike disputes the allegations, stating they stem from Delta's misunderstanding of cybersecurity and poor <strong>infrastructure</strong> modernization, setting the stage for a contentious legal battle between the companies.</p>
</li>
</ul>
<h3 id="armis-secures-200m-funding-round-at-42b-valuation-signals-ipo-plans"><a href="https://www.securityweek.com/armis-raises-200m-at-4-2b-valuation-eyes-ipo/?ref=mandos.io">Armis Secures $200M Funding Round at $4.2B Valuation, Signals IPO Plans</a></h3>
<ul>
<li>
<p>Device security company reaches $200M in <strong>Annual Recurring Revenue</strong>, doubling growth in under 18 months while preparing for potential public offering.</p>
</li>
<li>
<p>Platform provides <strong>agentless</strong> security monitoring for managed and unmanaged devices, including IoT, industrial, and medical devices, with recent acquisition of Silk Security for $150M.</p>
</li>
<li>
<p>Funding led by General Catalyst and Alkeon Capital will support organic product development and potential <strong>acquisitions</strong>, building on previous rounds that have seen valuation grow from $1.1B in 2020 to current $4.2B.</p>
</li>
</ul>
<h3 id="proofpoint-acquires-normalyze-to-enhance-data-security-posture-management"><a href="https://www.securityweek.com/proofpoint-to-acquire-data-security-posture-management-firm-normalyze/?ref=mandos.io">Proofpoint Acquires Normalyze to Enhance Data Security Posture Management</a></h3>
<ul>
<li>
<p>Proofpoint signs agreement to acquire <strong>DSPM</strong> provider Normalyze, with deal expected to close in November, integrating Normalyze's agentless scanner technology for data discovery and classification into their security platform.</p>
</li>
<li>
<p>Normalyze's technology enables organizations to identify sensitive data across <strong>cloud</strong> environments, assess risk impact, and remediate security issues through an automated approach that addresses visibility challenges in modern IT environments.</p>
</li>
<li>
<p>The acquisition follows Proofpoint's strategic expansion after their $12.3 billion privatization by <strong>Thoma Bravo</strong>, adding to their portfolio of email security, DLP, and compliance solutions, marking their third recent acquisition in the <strong>data security</strong> sector.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="hacksplaining"><a href="https://cybersectools.com/tools/hacksplaining?ref=mandos.io">Hacksplaining</a></h3>
<p>Hacksplaining is a comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.</p>
<h3 id="covenant"><a href="https://cybersectools.com/tools/covenant?ref=mandos.io">Covenant</a></h3>
<p>Covenant is a collaborative .NET command and control framework designed for red team operations, providing robust infrastructure for managing offensive security engagements.</p>
<h3 id="deception-as-detection"><a href="https://cybersectools.com/tools/deception-as-detection?ref=mandos.io">Deception-as-Detection</a></h3>
<p>Deception based detection techniques mapped to the MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK): Windows Technique Matrix Linux Technique Matrix Mac Technique Matrix.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #75: Fortinet Zero-Day, Agentic AI Risks, Growring Strategic Influence of CISOs ]]></title>
        <description><![CDATA[ Critical Fortinet zero-day affecting 50+ victims, SharePoint vulnerability added to CISA catalog, and APT29&#39;s sophisticated phishing campaign targeting military sectors. ]]></description>
        <link>https://mandos.io/newsletter/brief-75-fortinet-zero-day-agentic-ai-risks-growring-strategic-influence-of-cisos/</link>
        <guid isPermaLink="false">671397773990b70001ed3a09</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 27 Oct 2024 15:13:15 +0100</pubDate>
        <media:content url="https://mandos.io/content/images/2024/10/43.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>Fortinet's zero-day vulnerability impacting organizations worldwide through FortiManager exploitation</li><li>The evolving role of CISOs, with 20% now reporting directly to CEOs</li><li>A new AI jailbreak technique achieving 65% success rate in bypassing chatbot security controls</li></ul><p>And much more.</p><hr><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<hr><p></p>
<!--kg-card-begin: html-->
<div style="width:90%; background-color: #1f2937; text-align: center; border-radius: 0.75rem; padding: 2rem; margin: 2rem auto; box-shadow: 0 4px 6px rgba(0, 0, 0, 0.1);">
    <div style="max-width: 800px; margin: 0 auto;">
        <span style="color: #00A383; font-size: 0.8rem; font-weight: 600; text-transform: uppercase; letter-spacing: 0.1em; background-color: rgba(0, 163, 131, 0.1); padding: 0.5rem 1rem; border-radius: 1rem;">
            Sponsored
        </span>
        
        <h3 style="margin-top: 1rem; font-size: 1.5rem; font-weight: 800; color: white; line-height: 1.2;">
            Fabric by BlackStork
        </h3>
        
        <p style="margin: 1.5rem auto; max-width: 42rem; font-size: 1rem; line-height: 1.6; color: #e5e7eb;">
            Fabric Platform streamlines cybersecurity reporting processes, offering a comprehensive solution for teams seeking efficiency and consistency.
        </p>
        
        <div style="margin-top: 2rem;">
            <a href="https://blackstork.io/?utm_source=mandos.io" 
               style="display: inline-block; padding: 0.2rem 0.6rem; font-weight: 600; font-size: 1rem; color: white; background-color: #00A383; border-radius: 0.5rem; text-decoration: none; transition: all 0.2s ease-in-out;">
                Learn More →
            </a>
        </div>
    </div>
</div>
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="fortinet-zero-day-vulnerability-exploited-in-the-wild-since-june-2024"><a href="https://www.securityweek.com/new-fortinet-zero-day-exploited-for-months-before-patch-release/?ref=mandos.io">Fortinet Zero-Day Vulnerability Exploited in the Wild Since June 2024</a></h3>
<ul>
<li>
<p><strong>Mandiant</strong> reports that a recently patched <strong>zero-day vulnerability</strong> in <strong>Fortinet's FortiManager</strong> product has been actively exploited by threat actors since at least June 27, 2024, affecting over 50 potential victims across various countries and industries.</p>
</li>
<li>
<p>The vulnerability, tracked as <strong>CVE-2024-47575</strong>, allows remote, unauthenticated attackers to execute arbitrary code and exfiltrate data that could be used to further compromise the FortiManager, move laterally to managed <strong>Fortinet devices</strong>, and target the enterprise environment.</p>
</li>
<li>
<p>Researcher Kevin Beaumont believes that <strong>state-sponsored threat actors</strong> have exploited the vulnerability, dubbed "FortiJump," to conduct <strong>espionage</strong> through managed service providers (MSPs), as tens of thousands of internet-exposed FortiManager systems remain unpatched.</p>
</li>
</ul>
<h3 id="microsoft-sharepoint-flaw-added-to-cisas-known-exploited-vulnerabilities-catalog"><a href="https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-of.html?m=1&ref=mandos.io">Microsoft SharePoint Flaw Added to CISA's Known Exploited Vulnerabilities Catalog</a></h3>
<ul>
<li>
<p>The U.S. <strong>CISA</strong> has added a high-severity <strong>Microsoft SharePoint</strong> flaw (CVE-2024-38094) to its Known Exploited Vulnerabilities catalog, citing evidence of active <strong>exploitation</strong>.</p>
</li>
<li>
<p>The vulnerability, with a <strong>CVSS score</strong> of 7.2, is a <strong>deserialization</strong> flaw that could lead to <strong>remote code execution</strong> when exploited by an authenticated attacker with Site Owner permissions.</p>
</li>
<li>
<p><strong>Patches</strong> for the flaw were released in July 2024, but the risk is compounded by the availability of <strong>proof-of-concept exploits</strong> in the public domain, as reported by SOCRadar.</p>
</li>
</ul>
<h3 id="apt29-phishing-campaign-targets-militaries-governments-and-enterprises-worldwide"><a href="https://www.darkreading.com/cyberattacks-data-breaches/russias-apt29-aws-windows-credentials?ref=mandos.io">APT29 Phishing Campaign Targets Militaries, Governments, and Enterprises Worldwide</a></h3>
<ul>
<li>
<p><strong>APT29</strong>, a notorious Russian threat actor, has been conducting a widespread <strong>phishing</strong> campaign targeting militaries, public authorities, and enterprises across a wide geography, as reported by the Computer Emergency Response Team of Ukraine (CERT-UA).</p>
</li>
<li>
<p>The campaign, which dates back to August, used malicious domain names mimicking Amazon Web Services (AWS) to send emails with attachments containing malicious configuration files for <strong>Remote Desktop Protocol (RDP)</strong>, granting attackers extensive access to target computers.</p>
</li>
<li>
<p>To mitigate the risk, CERT-UA recommends monitoring network logs for connections to <strong>APT29-linked IP addresses</strong>, while Tenable's Satnam Narang suggests blocking RDP files at the email gateway to prevent this type of attack.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="considerations-for-evaluating-genai-in-cybersecurity"><a href="https://www.csoonline.com/article/3566926/3-key-considerations-when-evaluating-genai-solutions-for-cybersecurity.html?ref=mandos.io">Considerations for Evaluating GenAI in Cybersecurity</a></h3>
<ul>
<li>
<p>Yeo Siang Tiong, General Manager for Southeast Asia at Kaspersky, shares three key considerations for organizations evaluating <strong>generative AI (GenAI)</strong> solutions for cybersecurity.</p>
</li>
<li>
<p>Usage Confidence: Due to the risk of <strong>hallucinations</strong>, vendors often include caveats stating that users need to verify the output, which can introduce delays and divert resources from true positives when responding to incidents.</p>
</li>
<li>
<p>Usage Friction: Writing good prompts can be challenging, and some GenAI solutions struggle with ad-hoc and open-ended security queries, negating the desired capability of solving problems at "<strong>machine speed</strong>". Utility charging models can also discourage use.</p>
</li>
</ul>
<h3 id="cisos-gaining-strategic-influence-as-cyber-threats-evolve"><a href="https://www.deloitte.com/global/en/about/press-room/deloitte-global-future-cyber-survey.html?ref=mandos.io">CISOs Gaining Strategic Influence as Cyber Threats Evolve</a></h3>
<ul>
<li>
<p>Deloitte's "Global Future of Cyber Survey" reveals that 20% of CISOs now report directly to CEOs, signaling the increasing strategic importance of the role as <strong>AI-generated threats</strong> become more sophisticated.</p>
</li>
<li>
<p>CISOs are becoming key advisors to CEOs and boards, with 39% of respondents already extensively using <strong>AI</strong> in their cybersecurity programs and focusing on safeguarding investments in emerging technologies like <strong>cloud security</strong> (48%) and Generative AI (41%).</p>
</li>
<li>
<p>25% of respondents from <strong>cyber-mature</strong> companies experienced 11 or more cybersecurity incidents in the past year, a 7% rise from 2023, while 57% anticipate increasing their cybersecurity budgets over the next 12 to 24 months.</p>
</li>
</ul>
<h3 id="cisos-face-evolving-challenges-amidst-growing-cyber-threats-and-talent-shortages"><a href="https://www.bcg.com/publications/2024/what-cybersecurity-leaders-get-right?ref=mandos.io">CISOs Face Evolving Challenges Amidst Growing Cyber Threats and Talent Shortages</a></h3>
<ul>
<li>
<p>A recent BCG and GLG survey of over 350 global <strong>cybersecurity leaders</strong> reveals that while overall <strong>cyber maturity</strong> is growing, gaps remain in areas like app security, data protection, and software supply chain risk management.</p>
</li>
<li>
<p>CISOs are more concerned about the rising frequency of known threats like <strong>ransomware</strong>, keeping risk mitigation in pace with tech innovation, and navigating the increasingly complex <strong>cyber and privacy regulations</strong> landscape than controlling cyber spending.</p>
</li>
<li>
<p>Cyber-mature organizations distinguish themselves through greater CISO accountability, coordinating IT recovery with <strong>business continuity</strong>, and centralized decision-making, while <strong>AI-enabled threats</strong> like phishing and malware attacks are becoming more prevalent, with CISOs eager to leverage AI in defense.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="intro-to-becoming-a-soc-analyst-a-new-approach"><a href="https://blog.ecapuano.com/p/so-you-want-to-be-a-soc-analyst-intro?ref=mandos.io">Intro to Becoming a SOC Analyst: A New Approach</a></h3>
<ul>
<li>
<p>Eric Capuano, the author, outlines a new approach to quickly gaining skills needed for an entry-level <strong>SOC analyst</strong> job, leveraging modern technology.</p>
</li>
<li>
<p>The traditional approach involved setting up a complex <strong>virtual machine</strong> environment with various components like firewalls, routers, and log aggregation tools, which was time-consuming but provided valuable indirect learning.</p>
</li>
<li>
<p>The new approach focuses on getting straight to the core <strong>SOC</strong> work using a commercial offering called <strong>LimaCharlie</strong>, which saves time and is free for this level of use, while teaching universally applicable methodologies.</p>
</li>
</ul>
<h3 id="tcm-security-offers-free-ethical-hacking-courses-on-youtube"><a href="https://academy.tcm-sec.com/p/learn-penetration-testing-free?ref=mandos.io">TCM Security Offers Free Ethical Hacking Courses on YouTube</a></h3>
<ul>
<li>
<p>TCM Security, a cybersecurity training company, is offering over 27 hours of free <strong>ethical hacking</strong> material on their YouTube channel.</p>
</li>
<li>
<p>The free courses cover topics such as <strong>practical ethical hacking</strong>, <strong>OSINT fundamentals</strong>, <strong>Linux for hackers</strong>, <strong>buffer overflows</strong>, <strong>Python fundamentals</strong>, and <strong>web application hacking</strong>.</p>
</li>
<li>
<p>For those looking for more comprehensive training, TCM Security also offers an All-Access Membership that provides access to all of their courses and exclusive content.</p>
</li>
</ul>
<h3 id="ciso-job-turnover-drops-as-opportunities-dwindle"><a href="https://www.csoonline.com/article/3575323/low-turnover-leaves-job-seeking-cisos-with-nowhere-to-go.html?ref=mandos.io">CISO Job Turnover Drops as Opportunities Dwindle</a></h3>
<ul>
<li>
<p><strong>IANS Research</strong> finds that <strong>CISO turnover</strong> has decreased from 21% in 2022 to an annualized 11% in H1 2024, limiting opportunities for <strong>compensation growth</strong> through job changes.</p>
</li>
<li>
<p>Nearly a quarter of <strong>cybersecurity leaders</strong> are actively looking to leave their organization, with 93% citing <strong>stress</strong> or job demands as factors impacting their decision.</p>
</li>
<li>
<p>Advancements in <strong>cybersecurity automation</strong> have resulted in a surplus of highly skilled executives on the job market, outstripping demand and stifling <strong>salary growth</strong> for CISOs.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="google-advocates-for-simplifying-security-with-ai-and-consolidated-solutions"><a href="https://www.bankinfosecurity.com/security-needs-to-be-simple-secure-by-default-google-a-26447?ref=mandos.io">Google Advocates for Simplifying Security with AI and Consolidated Solutions</a></h3>
<ul>
<li>
<p><strong>Abhishek A Hemrajani</strong>, director of product management for cloud security at Google, says security is complex due to overlapping tools, gaps in systems, and silos between teams.</p>
</li>
<li>
<p>Conventional security approaches fall short in addressing the pace, velocity and <strong>complexity</strong> of threats, with attackers employing sophisticated techniques and leveraging <strong>zero-day vulnerabilities</strong>.</p>
</li>
<li>
<p>Google believes <strong>generative AI</strong> represents an inflection point for security that will transform workflows and give defenders an advantage, but attacks on AI are increasing, requiring <strong>secure-by-default</strong> solutions.</p>
</li>
</ul>
<h3 id="ai-jailbreak-method-bypasses-chatbot-guardrails-with-65-success-rate"><a href="https://unit42.paloaltonetworks.com/jailbreak-llms-through-camouflage-distraction/?ref=mandos.io">AI Jailbreak Method Bypasses Chatbot Guardrails with 65% Success Rate</a></h3>
<ul>
<li>
<p><strong>Palo Alto Networks researchers</strong> discovered a new AI jailbreak method called "Deceptive Delight" that mixes malicious and benign queries to trick chatbots into bypassing their guardrails, with a 65% success rate across eight different large language models <strong>(LLMs)</strong>.</p>
</li>
<li>
<p>The method exploits LLMs' limited "<strong>attention span</strong>" by presenting a mix of safe and unsafe information, causing the model to overlook critical details and progressively steering the conversation toward <strong>harmful or unethical content</strong>.</p>
</li>
<li>
<p>To mitigate these <strong>prompt-injection attacks</strong>, organizations can enforce privilege control on LLM access, add human approval for privileged operations, segregate external content from user prompts, establish trust boundaries, and manually monitor LLM input and output periodically.</p>
</li>
</ul>
<h3 id="agentic-ai-on-the-rise-harnessing-power-while-mitigating-security-risks"><a href="https://www.csoonline.com/article/3574697/beyond-chatgpt-the-rise-of-agentic-ai-and-its-implications-for-security.html?ref=mandos.io">Agentic AI on the Rise: Harnessing Power While Mitigating Security Risks</a></h3>
<ul>
<li>
<p>Stephen Kaufman, Chief Architect at Microsoft, discusses the rise of agentic AI, which involves autonomous agents that can make decisions and act without human intervention, presenting both transformative opportunities and new security risks.</p>
</li>
<li>
<p>Agentic AI brings together tools, frameworks, and patterns to automate end-to-end business workflows using AI <strong>agents</strong> that perform specific tasks and integrate into a broader workflow controlled by rules and decisions, with the ability to incorporate external agents.</p>
</li>
<li>
<p>Key risks of agentic AI include unexpected or problematic <strong>behavior</strong>, ethical concerns like <strong>bias</strong> and unintended consequences, and lack of <strong>human controls</strong>, necessitating robust security measures, governance, monitoring, and the ability to override operations when needed.</p>
</li>
</ul>
<p></p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-analysis" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET ANALYSIS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="practical-soc-analyst-skills-blog-series-uses-limacharlie-for-hands-on-learning"><a href="https://www.securityweek.com/sophos-to-acquire-secureworks-in-859-million-all-cash-deal/?ref=mandos.io">Practical SOC Analyst Skills Blog Series Uses LimaCharlie for Hands-On Learning</a></h3>
<ul>
<li>
<p>Eric Capuano's blog series "So you want to be a SOC Analyst?" offers a modern, <strong>hands-on</strong> approach to learning essential SOC analyst skills using <strong>LimaCharlie</strong>.</p>
</li>
<li>
<p>The series requires only a computer and no cost, covering VM setup, <strong>adversary emulation</strong>, <strong>detection</strong> crafting, <strong>attack blocking</strong>, false positive tuning, and <strong>YARA</strong> scan triggering.</p>
</li>
<li>
<p>Emphasizing practical knowledge over certifications, the series provides a fast-track for aspiring cybersecurity professionals to gain hands-on experience in threat detection and response.</p>
</li>
</ul>
<h3 id="socket-raises-40m-to-protect-against-open-source-supply-chain-attacks"><a href="https://www.securityweek.com/socket-raises-40-million-for-supply-chain-security-tech/?ref=mandos.io">Socket Raises $40M to Protect Against Open Source Supply Chain Attacks</a></h3>
<ul>
<li>
<p><strong>Socket</strong>, a San Francisco-based startup, announced the closing of a $40 million <strong>Series B</strong> funding round led by Abstract Ventures, bringing its total raised to $65 million.</p>
</li>
<li>
<p>The company's platform monitors open source dependencies in real-time, detecting and blocking over 70 signals of <strong>supply chain risks</strong>, including <strong>malware</strong>, misleading packages, and permission creep across six <strong>programming languages</strong>.</p>
</li>
<li>
<p>With the new funding, Socket plans to accelerate product development and expand its team to meet the increasing demand for its platform, which is already used by organizations in finance, manufacturing, media, and tech, blocking more than 100 <strong>attacks</strong> per week.</p>
</li>
</ul>
<h3 id="securonix-and-avant-partner-to-enhance-cybersecurity-offerings"><a href="https://www.sdxcentral.com/articles/stringerai-announcements/securonix-and-avant-partner-to-enhance-cybersecurity-solutions/2024/10/?ref=mandos.io">Securonix and AVANT Partner to Enhance Cybersecurity Offerings</a></h3>
<ul>
<li>
<p><strong>Securonix</strong>, a five-time <strong>Gartner Magic Quadrant Leader</strong> in <strong>SIEM</strong>, announced a partnership with AVANT, a distributor of technology services, to provide AVANT's network with Securonix's SIEM platform and advanced cybersecurity solutions.</p>
</li>
<li>
<p>The collaboration will give Trusted Advisors access to Securonix's AI-Reinforced SIEM and <strong>UEBA</strong> solutions, enabling organizations to strengthen their <strong>security posture</strong> and stay resilient against today's complex <strong>threat landscape</strong>.</p>
</li>
<li>
<p>The partnership will enhance AVANT's Securonix Elevate partner program, providing Trusted Advisors with access to AI-Reinforced CyberOps capabilities, tiered pricing, and robust enablement resources to generate new revenue streams while delivering essential cybersecurity solutions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="inquest-labs"><a href="https://cybersectools.com/tools/inquest-labs?ref=mandos.io">InQuest Labs</a></h3>
<p>An experiment that measures the security efficacy of email providers against real-world emerging malware. It also provides various tools and resources for threat intelligence, including a reputation database, IOC database, and YARA rule generators.</p>
<h3 id="httpscybersectoolscomtoolsblauhaunt"><a href="https://cybersectools.com/tools/blauhaunt?ref=mandos.io">https://cybersectools.com/tools/blauhaunt</a></h3>
<p>Blauhaunt is a tool collection for filtering and visualizing logon events, designed to help answer the 'Cotton Eye Joe' question (Where did you come from where did you go) in Security Incidents and Threat Hunts</p>
<h3 id="bubblewrap"><a href="https://cybersectools.com/tools/bubblewrap?ref=mandos.io">Bubblewrap</a></h3>
<p>Bubblewrap is a setuid implementation of a subset of user namespaces. It provides a way to run unprivileged containers without requiring root privileges. It is designed to be a more secure alternative to other container runtimes like systemd-nspawn and Docker.</p>
<p></p><hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #74: Cybersecurity Salaries Soar, Microsoft Loses Security Logs, PAM trends ]]></title>
        <description><![CDATA[ Critical Kubernetes flaw enables root access. Safari bypass grants camera access. Cloud security engineers earn around $136K. AI introduces new zero-day vulnerabilities. ]]></description>
        <link>https://mandos.io/newsletter/brief-74-cybersecurity-salaries-soar-ai-models-in-security-2/</link>
        <guid isPermaLink="false">6713754d3990b70001ed39e1</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 20 Oct 2024 10:29:42 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/10/42.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>A vulnerability in Kubernetes Image Builder and its implications</li><li>How AI is being used by both cybersecurity professionals and threat actors</li><li>The growing demand for cloud security engineers and their average salaries</li></ul><p>And much more.</p><hr><p>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>If you think others in your network would benefit from my newsletter, I'd be grateful if you'd share it with them. 🤝</p><hr><p></p>
<!--kg-card-begin: html-->
<div style="width:100%; background-color: #1f2937; text-align: center; border-radius: 0.375rem; padding: 1rem; margin: 0 auto;"> <p style="color: #d1d5db; font-size: 1.25rem;">Sponsor</p> <h3 style="margin-top: 0.5rem; margin-left: auto; margin-right: auto; max-width: 42rem; font-size: 2.25rem; font-weight: bold; color: white;">Fabric by BlackStork</h3> <p style="margin-left: auto; margin-right: auto; margin-top: 1.5rem; max-width: 36rem; font-size: 1.125rem; line-height: 1.5; color: #e5e7eb;">Fabric Platform streamlines cybersecurity reporting processes, offering a comprehensive solution for teams seeking efficiency and consistency.</p> 
<p style="margin-left: auto; margin-right: auto; margin-top: 1.5rem; max-width: 36rem; font-size: 1.125rem; line-height: 1.5; color: #e5e7eb;">The platform combines automation, collaboration features, and customizable templates to address various security use cases, including security operations, threat intelligence analysis, and penetration testing.</p>  
  <div style="margin-top: 2.5rem; display: flex; align-items: center; justify-content: center; gap: 1.5rem;"> <a href="https://blackstork.io/?utm_source=mandos.io\" style="padding: 0.5rem 1rem; font-weight: 600; color: white; background-color: #00A383; border-radius: 0.375rem;">Learn More</a> </div></div>
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="critical-flaw-in-kubernetes-image-builder-enables-root-access"><a href="https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html?m=1&ref=mandos.io">Critical Flaw in Kubernetes Image Builder Enables Root Access</a></h3>
<ul>
<li>
<p><strong>Red Hat's</strong> Joel Smith disclosed a critical security flaw (CVE-2024-9486, CVSS score: <strong>9.8</strong>) in the <strong>Kubernetes Image Builder</strong> that could allow attackers to gain <strong>root access</strong> to nodes using VM images built with the <strong>Proxmox provider</strong>.</p>
</li>
<li>
<p>The vulnerability stems from default credentials being enabled during the image build process and not disabled in the resulting VM images, potentially allowing access via these credentials.</p>
</li>
<li>
<p>Temporary mitigations include disabling the builder account on affected VMs and rebuilding images using Kubernetes Image Builder version <strong>0.1.38</strong>, which addresses the issue by using randomly-generated passwords and disabling the builder account post-build.</p>
</li>
</ul>
<h3 id="microsoft-warns-of-month-long-bug-causing-loss-of-critical-security-logs"><a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-it-lost-some-customers-security-logs-for-a-month/?ref=mandos.io">Microsoft Warns of Month-Long Bug Causing Loss of Critical Security Logs</a></h3>
<ul>
<li>
<p>Microsoft has notified enterprise customers of a <strong>bug</strong> that caused critical security logs to be lost between September 2nd and October 3rd, potentially impacting the ability to detect <strong>unauthorized activity</strong>.</p>
</li>
<li>
<p>The logging failure affected various Microsoft services, including <strong>Microsoft Entra</strong>, Azure Logic Apps, Azure Healthcare APIs, <strong>Microsoft Sentinel</strong>, Azure Monitor, Azure Trusted Signing, Azure Virtual Desktop, and Power Platform.</p>
</li>
<li>
<p>The bug was introduced while fixing another issue in Microsoft's log collection service, causing a <strong>deadlock condition</strong> that prevented the agent from uploading telemetry data, with some data being overwritten due to cache size limits.</p>
</li>
</ul>
<h3 id="macos-safari-exploit-bypasses-security-to-access-camera-mic-and-data"><a href="https://www.darkreading.com/vulnerabilities-threats/macos-safari-exploit-camera-mic-browser-data?ref=mandos.io">MacOS Safari Exploit Bypasses Security to Access Camera, Mic, and Data</a></h3>
<ul>
<li>
<p><strong>CVE-2024-44133</strong> vulnerability in Safari allows attackers to bypass macOS <strong>TCC</strong> security and access sensitive user data without permission.</p>
</li>
<li>
<p>Microsoft researchers created "<strong>HM Surf</strong>" exploit, manipulating Safari's special permissions and configuration files to grant malicious sites camera/mic access.</p>
</li>
<li>
<p>Evidence suggests <strong>adware</strong> program may have already exploited this or a similar vulnerability in the wild to harvest user data.</p>
</li>
</ul>
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="transforming-cybersecurity-for-the-cloud-era-a-guide-to-organizational-and-operational-change"><a href="https://medium.com/anton-on-security/new-office-of-the-ciso-paper-organizing-security-for-digital-transformation-fae78ce61c48?ref=mandos.io">Transforming Cybersecurity for the Cloud Era: A Guide to Organizational and Operational Change</a></h3>
<ul>
<li>
<p>Anton Chuvakin, in a new paper, addresses the challenges of transforming cybersecurity for the cloud era, emphasizing the importance of organizational and operational changes over solely focusing on <strong>technology</strong> adoption.</p>
</li>
<li>
<p>The guide proposes an OOT (Organization, Operations, Technology) approach, prioritizing organizational and operational changes before finalizing technology decisions, and stresses the critical role of a <strong>generative culture</strong> in achieving successful transformation.</p>
</li>
<li>
<p>The paper advocates for a shift away from centralized security functions towards a model where <strong>product teams</strong> assume greater ownership of security throughout the development <strong>lifecycle</strong>, while acknowledging the difficulty of letting go of legacy processes and controls.</p>
</li>
</ul>
<h3 id="cybersecurity-awareness-month-highlights-human-element-in-breaches"><a href="https://www.darkreading.com/cybersecurity-operations/normalizing-security-culture-get-ready?ref=mandos.io">Cybersecurity Awareness Month Highlights Human Element in Breaches</a></h3>
<ul>
<li>
<p>The Verizon "2024 Data Breach Investigations Report" reveals that <strong>68%</strong> of all breaches involve the <strong>human element</strong>, through error, stolen credentials, or <strong>social engineering</strong>.</p>
</li>
<li>
<p>Security is a core <strong>business function</strong> that shapes an organization's reputation and perceived trustworthiness, directly impacting customer reviews and stock prices.</p>
</li>
<li>
<p>IT team leaders should prioritize communicating the value of their security programs to leadership, using existing vendor resources and focusing on <strong>metrics</strong> that encourage proactive reporting of suspicious activity.</p>
</li>
</ul>
<h3 id="gartner-raises-need-for-privileged-access-management-to-secure-non-human-identities"><a href="https://www.gartner.com/en/documents/5741683?ref=mandos.io">Gartner Raises Need for Privileged Access Management to Secure Non-Human Identities</a></h3>
<ul>
<li>
<p>Gartner's 2024 Magic Quadrant for <strong>Privileged Access Management (PAM)</strong> emphasizes the growing need to secure both human and <strong>non-human identities</strong>, which now outnumber human users in many organizations.</p>
</li>
<li>
<p>Traditional PAM tools struggle to keep up with the dynamic and ephemeral nature of modern <strong>workloads</strong>, which require granular, context-aware controls for real-time, just-in-time authentication.</p>
</li>
<li>
<p>As organizations scale and rely on automation, containerized environments, and <strong>multi-cloud</strong> strategies, managing privileged access for workloads and other non-human identities becomes a key security challenge not fully addressed by current PAM solutions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cloud-security-engineers-in-high-demand-earning-136k-on-average"><a href="https://flatironschool.com/blog/best-paying-cybersecurity-careers-in-2024/?ref=mandos.io">Cloud Security Engineers in High Demand, Earning $136K on Average</a></h3>
<ul>
<li>
<p>Cloud security engineers focus on securing <strong>cloud-based</strong> systems, applications, and data, with projected job growth of 9% over next decade.</p>
</li>
<li>
<p>Key responsibilities include implementing security policies, conducting risk assessments, and responding to <strong>incidents</strong> in cloud environments.</p>
</li>
<li>
<p>Popular certifications like AWS Security Specialty and Azure Security Engineer can help accelerate career growth and boost <strong>compensation</strong>.</p>
</li>
</ul>
<h3 id="cybersecurity-professionals-share-frustrations-with-management-politics-and-lack-of-resources"><a href="https://www.reddit.com/r/cybersecurity/comments/1fw9e49/whats_the_worst_part_of_your_job_as_a/?ref=mandos.io">Cybersecurity Professionals Share Frustrations with Management, Politics, and Lack of Resources</a></h3>
<ul>
<li>
<p>In a recent Reddit discussion, cybersecurity professionals shared their biggest job frustrations, with many citing issues with <strong>upper management</strong> as the worst part of their roles.</p>
</li>
<li>
<p>Other common complaints included dealing with <strong>internal politics</strong>, handling <strong>auditors</strong> who lack practical knowledge, and working with people who don't understand the full scope of <strong>cybersecurity</strong>.</p>
</li>
<li>
<p>A lack of adequate <strong>funding</strong> for cybersecurity initiatives was also highlighted as a significant challenge faced by many in the industry.</p>
</li>
</ul>
<h3 id="cybersecurity-salaries-reach-up-to-420k-in-2024-demand-remains-high"><a href="https://pg-p.ctme.caltech.edu/blog/cybersecurity/cybersecurity-salary-how-much-can-you-make?ref=mandos.io">Cybersecurity Salaries Reach Up to $420K in 2024, Demand Remains High</a></h3>
<ul>
<li>
<p>Top cybersecurity positions like <strong>CISO</strong> can earn salaries up to $420,000, with factors like location, experience, and industry significantly impacting pay.</p>
</li>
<li>
<p>Highest paying states include California ($125,621 avg), New York ($121,819), and Massachusetts ($120,184). Top cities offer even higher salaries, like San Francisco at $149,801.</p>
</li>
<li>
<p>Job outlook is strong, with 3.5 million cybersecurity job openings predicted by 2025 and 33% growth for information security analysts from 2020-2030.</p>
</li>
</ul>
<p></p><!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-models-in-cybersecurity-defenders-and-attackers-leverage-ai"><a href="https://www.securityweek.com/ai-models-in-cybersecurity-from-misuse-to-abuse/?ref=mandos.io">AI Models in Cybersecurity: Defenders and Attackers Leverage AI</a></h3>
<ul>
<li>
<p>Three main AI models (Generative AI, Supervised and Unsupervised Machine Learning) are being used by defenders to enhance <strong>threat detection</strong>, generate reports, and predict attacks.</p>
</li>
<li>
<p>Cybercriminals are misusing AI for targeted <strong>phishing</strong>, creating polymorphic malware, vulnerability scanning, and generating <strong>deepfakes</strong> for social engineering attacks.</p>
</li>
<li>
<p>Threat actors are exploiting AI systems through various methods, including prompt injection, targeting responses, model manipulation, and <strong>infrastructure</strong> attacks on AI hosting platforms.</p>
</li>
</ul>
<h3 id="ai-zero-day-vulnerabilities-pose-unique-challenges-for-cybersecurity"><a href="https://www.darkreading.com/vulnerabilities-threats/4-ways-address-zero-days-ai-ml-security?ref=mandos.io">AI Zero-Day Vulnerabilities Pose Unique Challenges for Cybersecurity</a></h3>
<ul>
<li>
<p>AI/ML systems introduce new types of <strong>zero-day</strong> vulnerabilities, such as prompt injection and training data leakage, which differ from traditional software flaws.</p>
</li>
<li>
<p>The rapid adoption of AI often prioritizes innovation over security, leading to an ecosystem where AI applications lack robust <strong>security measures</strong> from the ground up.</p>
</li>
<li>
<p>To address these challenges, security teams should adopt <strong>MLSecOps</strong> practices, perform proactive security audits, and adapt their strategies to incorporate AI-specific considerations.</p>
</li>
</ul>
<h3 id="3-key-considerations-for-evaluating-genai-cybersecurity-solutions"><a href="https://www.csoonline.com/article/3566926/3-key-considerations-when-evaluating-genai-solutions-for-cybersecurity.html?ref=mandos.io">3 Key Considerations for Evaluating GenAI Cybersecurity Solutions</a></h3>
<ul>
<li>
<p><strong>Usage Confidence</strong>: Assess reliability of outputs, as vendors often include caveats about verifying results. Determine which outputs can be confidently relied upon to avoid delays from false positives/negatives.</p>
</li>
<li>
<p><strong>Usage Friction</strong>: Evaluate ease of use, including prompt writing and integration with log sources. Address factors that may discourage adoption, such as utility-based charging models that make staff hesitant to use the system.</p>
</li>
<li>
<p><strong>Usage Governance</strong>: Implement proper <strong>access controls</strong> and accounting to prevent misuse and wastage, especially for solutions with activation-based charging. Ensure maturity of governance structures.</p>
</li>
</ul>
<p></p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-analysis" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET ANALYSIS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="netskope-acquires-dasera-to-integrate-dspm-capabilities-into-netskope-one-platform"><a href="https://www.networkworld.com/article/3564737/netskope-extends-data-security-with-dasera-acquisition.html?ref=mandos.io">Netskope Acquires Dasera to Integrate DSPM Capabilities into Netskope One Platform</a></h3>
<ul>
<li>
<p>Netskope, a <strong>SASE</strong> provider, has acquired Dasera to integrate <strong>data security posture management (DSPM)</strong> capabilities into its Netskope One platform.</p>
</li>
<li>
<p>The integration will enable Netskope to deliver advanced security across various use cases, including structured, semi-structured, and unstructured <strong>data stores</strong> and <strong>data lakes</strong>.</p>
</li>
<li>
<p>Netskope aims to provide a holistic approach to modern data security by offering the broadest and deepest data protection using a single platform, with DSPM capabilities being a part of the overall solution.</p>
</li>
</ul>
<h3 id="cyera-acquires-ai-enhanced-dlp-startup-trail-security-for-162-million"><a href="https://www.securityweek.com/cyera-acquires-data-loss-prevention-firm-trail-security-for-162-million/?ref=mandos.io">Cyera Acquires AI-Enhanced DLP Startup Trail Security for $162 Million</a></h3>
<ul>
<li>
<p>Cyera, a data security company, has acquired <strong>Trail Security</strong>, an Israeli <strong>DLP</strong> startup, for $162 million in cash and stock.</p>
</li>
<li>
<p>Trail Security has developed <strong>AI-enhanced</strong> DLP technology, which Cyera is integrating into its <strong>Data Security Posture Management (DSPM)</strong> platform to create a unified data security solution.</p>
</li>
<li>
<p>With the acquisition, Cyera will onboard 40 Trail employees to establish its DLP division, and the company expects to reach over 1,000 employees within the next two years.</p>
</li>
</ul>
<h3 id="sentinelone-extends-aws-collaboration-to-deliver-generative-ai-powered-cybersecurity"><a href="https://www.businesswire.com/news/home/20241017425446/en/SentinelOne-Expands-Strategic-Collaboration-with-AWS-to-Deliver-AI-Powered-Cybersecurity/?ref=mandos.io">SentinelOne Extends AWS Collaboration to Deliver Generative AI-Powered Cybersecurity</a></h3>
<ul>
<li>
<p>SentinelOne announced an extension of its strategic collaboration agreement with <strong>AWS</strong> to deliver generative AI benefits, with SentinelOne's <strong>Purple AI</strong> cybersecurity analyst powered by <strong>Amazon Bedrock</strong>.</p>
</li>
<li>
<p>The expanded agreement will increase investments in SentinelOne's AI-powered <strong>Singularity Platform</strong> within AWS Marketplace, enabling enterprises to quickly access end-to-end protection from a unified, AI-powered platform.</p>
</li>
<li>
<p>SentinelOne will allow customers to choose specific large language models via Amazon Bedrock to power Purple AI, and will also use Amazon Bedrock Custom Model Import and customization capabilities to create tailored solutions.</p>
</li>
</ul>
<p></p><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="applocker-guidance"><a href="https://cybersectools.com/tools/applocker-guidance?ref=mandos.io">AppLocker Guidance</a></h3>
<p>Application whitelisting is one of Information Assurance top 10 mitigation strategies. This project contains scripts and configuration files for aiding administrators in implementing Microsoft AppLocker as outlined in the Application Whitelisting using Microsoft AppLocker paper.</p>
<h3 id="notifysecurity"><a href="https://cybersectools.com/tools/notifysecurity?ref=mandos.io">NotifySecurity</a></h3>
<p>NotifySecurity is an Outlook add-in designed to assist users in reporting suspicious emails to security teams. It integrates with Swordphish to update reported statistics and provides relevant information like full SMTP headers for accurate reporting.</p>
<h3 id="iam-floyd"><a href="https://cybersectools.com/tools/iam-floyd?ref=mandos.io">IAM Floyd</a></h3>
<p>IAM Floyd is a tool for generating AWS IAM policy statements with a fluent interface, supporting 393 Services, 16621 Actions, 1783 Resource Types, and 1731 Condition keys. It offers two package variants: iam-floyd for general use and cdk-iam-floyd for integration with AWS CDK.</p>
<p></p><hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>Have ideas, questions or comments? Just hit reply - I read every message!</p><p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ How to Transition from a Security Engineer or Analyst to a Strategic Leader ]]></title>
        <description><![CDATA[ Unlock your leadership potential in cybersecurity. Learn to communicate business value, build strategic networks, and embrace mentorship to bridge the gap between technical expertise and executive roles. ]]></description>
        <link>https://mandos.io/blog/how-to-transition-from-a-security-engineer-or-analyst-to-a-strategic-leader/</link>
        <guid isPermaLink="false">66fa74544e9615000183a10c</guid>
        <category><![CDATA[ Leadership ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 15 Oct 2024 12:00:35 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/09/How-to-Transition-from-Individual-Cybersecurity-Contributor-to-Strategic-Leader.webp" medium="image"/>
        <content:encoded><![CDATA[ <p>Transitioning from a purely technical role in cybersecurity to a leadership position can feel like navigating a digital minefield. We often find ourselves asking, "How do I leverage my technical expertise to lead teams and influence strategic decisions?"</p><h2 id="the-leadership-conundrum">The Leadership Conundrum</h2><p>Unfortunately, many skilled cybersecurity professionals hit a wall when aiming for management or director roles. We see others with perhaps less technical depth climb the ladder faster, leaving us feeling stuck and undervalued.</p><h2 id="why-the-disconnect">Why the Disconnect?</h2><p>The main culprit? <em>We think, speak, and breathe technology. </em>And while that's essential for our current roles, it can hinder our ability to connect with non-technical decision-makers and articulate the business value of our work. </p><p>Consequently, this disconnect is compounded by getting comfortable in our technical echo chambers, missing opportunities to build relationships and understand the needs of other departments.<br><br>This disconnect is further exacerbated when we present technical findings without translating them into tangible business outcomes like cost savings, risk mitigation, or revenue opportunities. This inability to effectively communicate the business value of our work often stems from a lack of focus on developing crucial soft skills.<br><br>Many cybersecurity professionals often neglect soft skills. We underestimate the importance of communication, negotiation, and people management skills – all crucial for effective leadership. Moreover, we don't actively seek opportunities to lead projects, mentor others, or volunteer for initiatives that showcase our leadership potential.</p><h2 id="charting-your-course-to-leadership">Charting Your Course to Leadership</h2><p>Don't worry; the path to leadership is within reach! Here's a roadmap to help you bridge the gap:</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><!--members-only--><h3 id="step-1-master-the-art-of-business-communication">Step 1: Master the Art of Business Communication</h3><p>Anywhere, anytime communication is everything. Become fluent in "business speak." Instead of drowning executives in technical jargon, learn to frame cybersecurity initiatives in terms of risk management, compliance requirements, financial impact, and brand reputation. </p><p>Use analogies heavily. If you cannot explain what you are doing and why to a 5-year-old, you will fail to become a good business communicator. Why? Because you cannot expect your business peers or even other tech departments to know the cybersecurity or technologies you are dealing with.<br><br>Effective communication is crucial for gaining buy-in for your ideas and securing budget for your projects. To achieve this, you need to speak the language of business leaders. They need to understand how your work contributes to the organization's bottom line.<br><br>To illustrate this point, consider the analogy of car insurance: Most people pay for car insurance even though they don't expect to be involved in a crash. They do so because the potential financial impact of an accident without insurance is too high. Similarly, investing in cybersecurity measures, such as employee training and advanced threat detection systems, helps protect the organization from the potentially devastating consequences of a data breach, even if the likelihood of an attack seems low.</p><h3 id="step-2-build-a-strategic-network-inside-and-out">Step 2: Build a Strategic Network (Inside and Out)</h3><p>Another important tool you should rely on when aiming to transition into a leadership role is expanding your network beyond the cybersecurity realm. Connect with colleagues in other departments, attend industry events, and engage with thought leaders online. </p><p>In my experience it's essential to avoid the common pitfall of sticking to your comfort zone and networking only with other cybersecurity professionals.<br><br>To break out of your comfort zone, make a conscious effort to attend cross-functional meetings, participate in company social events, and reach out to people in different roles for informational interviews. By engaging with professionals outside your immediate field, you can gain valuable perspectives and insights.<br><br>A diverse network provides valuable insights into different business functions, helps you identify potential security risks and opportunities, and raises your profile within the organization. Building connections across various departments and industries will not only enhance your understanding of the business as a whole but also position you as a well-rounded and strategic leader.</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='24bcf30e-807a-41d6-9cf5-b0361a780e42' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<h3 id="step-3-become-a-sought-after-mentor-and-seek-mentorship">Step 3: Become a Sought-After Mentor (and Seek Mentorship)</h3><p>I always say that strong leaders are good followers and supportive mentors. Offer your expertise to mentor junior colleagues and actively seek out mentors who can provide guidance and support.<br><br>In fact, mentorship is a powerful tool for both personal and professional growth. It helps you develop leadership skills, build strong relationships, and gain valuable insights from experienced professionals. It also keeps you grounded in what is happening in the trenches. Engaging in mentorship relationships can help you cultivate essential skills that will serve you throughout your career.<br><br>By mentoring others, you'll hone your communication and coaching abilities. By having mentors, you'll gain valuable perspectives, advice, and advocacy as you navigate your career journey. These experiences will shape you into a well-rounded professional and leader.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="remember-leadership-is-not-a-title-its-a-mindset">Remember, Leadership is Not a Title, It's a Mindset</h2><p>Throughout my career, I have seen strong leaders who were security engineers and analysts, and I have seen CISOs who were weak leaders. Leadership is not about a title; it's about inspiring others, aligning cybersecurity with business goals, and continuously learning and adapting. Adopting a leadership mindset involves embracing the journey of personal and professional growth.<br><br>As you cultivate your leadership mindset, you'll find that the journey is filled with opportunities to learn, adapt, and make a meaningful impact in the cybersecurity field. By continuously seeking knowledge, collaborating with others, and aligning your efforts with organizational objectives, you'll develop the skills and confidence needed to become an effective leader.<br><br>Leadership is not a destination but a continuous process of growth and development. Stay committed to your personal and professional growth.</p><h3 id="before-you-go">Before you go</h3><p>If you found this article useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='24bcf30e-807a-41d6-9cf5-b0361a780e42' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #73: Casio Breach, Ivanti Zero-Day,CISO Compensation ]]></title>
        <description><![CDATA[ Ivanti CSA zero-days exploited. AI detects novel email scams. CISOs crucial in M&amp;A cybersecurity. Global security workforce stalls. ]]></description>
        <link>https://mandos.io/newsletter/brief-73-casio-breach-ivanti-zero-day-ciso-compensation-2/</link>
        <guid isPermaLink="false">6707d3f476e00500019489f8</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 13 Oct 2024 11:10:41 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/10/41.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>New zero-day vulnerabilities in Ivanti's Cloud Services Application</li><li>AI-powered email analysis detecting novel scams with high accuracy</li><li>The importance of early CISO involvement in M&amp;A processes</li></ul><p>And much more.</p><p><strong>Prefer to listen?</strong></p><div class="kg-card kg-audio-card"><img src="" alt="audio-thumbnail" class="kg-audio-thumbnail kg-audio-hide"><div class="kg-audio-thumbnail placeholder"><svg width="24" height="24" fill="none"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"></path></svg></div><div class="kg-audio-player-container"><audio src="https://mandos.io/content/media/2024/10/Brief-73--Casio-Breach--Ivanti-Zero-Day-CISO-Compensation.wav" preload="metadata"></audio><div class="kg-audio-title">Brief 73 Casio Breach Ivanti Zero DayCISO Compensation</div><div class="kg-audio-player"><button class="kg-audio-play-icon" aria-label="Play audio"><svg viewBox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"></path></svg></button><button class="kg-audio-pause-icon kg-audio-hide" aria-label="Pause audio"><svg viewBox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"></rect><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"></rect></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">626.32</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate" aria-label="Adjust playback speed">1×</button><button class="kg-audio-unmute-icon" aria-label="Unmute"><svg viewBox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"></path></svg></button><button class="kg-audio-mute-icon kg-audio-hide" aria-label="Mute"><svg viewBox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"></path></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><p><em>(Led by AI characters)</em></p><p><strong>How would you prefer to consume Mandos Brief newsletter?</strong></p><p><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/1?ref=mandos.io">1️⃣ Written format only (no podcast)</a></p><p><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/2?ref=mandos.io">2️⃣ Written format + AI-generated podcast</a></p><p><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/3?ref=mandos.io">3️⃣ Written format + podcast with me speaking</a></p><hr><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="casio-investigates-potential-data-breach-following-cyberattack"><a href="https://www.securityweek.com/casio-hit-by-cyberattack/?ref=mandos.io">Casio Investigates Potential Data Breach Following Cyberattack</a></h3>
<ul>
<li>
<p>Casio detected <strong>unauthorized access</strong> to its network on October 5, resulting in system failures and service disruptions.</p>
</li>
<li>
<p>The company is investigating whether personal or sensitive information was <strong>compromised</strong> and has restricted external access to its systems.</p>
</li>
<li>
<p>This incident follows a data breach last year that exposed personal information of tens of thousands of customers across 150 countries through Casio's ClassPad.net education application.</p>
</li>
</ul>
<h3 id="adobe-patches-critical-vulnerabilities-in-commerce-and-magento-products"><a href="https://www.securityweek.com/adobe-patches-critical-bugs-in-commerce-and-magento-products/?ref=mandos.io">Adobe Patches Critical Vulnerabilities in Commerce and Magento Products</a></h3>
<ul>
<li>
<p>Adobe released patches for 25 <strong>vulnerabilities</strong> in Adobe Commerce and Magento Open Source, including two with a critical CVSS score of 9.8/10.</p>
</li>
<li>
<p>The flaws could allow attackers to execute <strong>code</strong>, escalate privileges, and bypass security features in affected versions of the software.</p>
</li>
<li>
<p>Additional critical vulnerabilities were patched in other Adobe products, including Dimension, Animate, Lightroom, InCopy, InDesign, Substance 3D Stager, and FrameMaker.</p>
</li>
</ul>
<h3 id="ivanti-discloses-new-zero-day-vulnerabilities-exploited-in-csa-attacks"><a href="https://www.securityweek.com/ivanti-warns-customers-of-more-csa-zero-days-exploited-in-attacks/?ref=mandos.io">Ivanti Discloses New Zero-Day Vulnerabilities Exploited in CSA Attacks</a></h3>
<ul>
<li>
<p>Ivanti reported multiple new <strong>zero-day</strong> vulnerabilities in its Cloud Services Application (CSA) being actively <strong>exploited</strong> in attacks.</p>
</li>
<li>
<p>Attackers are chaining these new flaws with the previously disclosed CVE-2024-8963 to bypass authentication and achieve remote code execution.</p>
</li>
<li>
<p>The vulnerabilities affect CSA versions 4.6 and 5.0, with Ivanti providing <strong>indicators of compromise</strong> to help detect potential attacks.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cybersecurity-risks-in-ma-deals-require-early-ciso-involvement"><a href="https://www.forbes.com/sites/tonybradley/2024/10/07/the-growing-importance-of-cybersecurity-in-mergers-and-acquisitions/?ref=mandos.io">Cybersecurity Risks in M&amp;A Deals Require Early CISO Involvement</a></h3><ul><li><strong>Inherited vulnerabilities</strong> from acquired companies can expose parent organizations to cyber threats, as seen in Verizon's acquisition of Yahoo.</li><li>Integration of disparate IT systems during M&amp;A can take 2-4 years, creating an extended period of <strong>vulnerability</strong> and complexity.</li><li>CISOs should be involved early in M&amp;A processes to conduct thorough <strong>due diligence</strong>, assess risks, and develop integration strategies prioritizing cybersecurity.</li></ul><h3 id="ciso-compensation-rises-but-so-do-challenges-and-responsibilities"><a href="https://www.darkreading.com/cyber-risk/ciso-paychecks-worth-growing-security-headaches?ref=mandos.io">CISO Compensation Rises, But So Do Challenges and Responsibilities</a></h3><ul><li>Average CISO <strong>compensation</strong> now $403,000 annually, up 6.4% from last year, but growth rate slowing compared to previous years.</li><li>CISOs face increased <strong>liability</strong> due to new SEC rules requiring breach materiality determination within 4 days, often without adequate resources.</li><li>Growing responsibilities include managing <strong>AI risks</strong>, despite many CISOs lacking comprehensive expertise in technical, governance, privacy, and data science aspects.</li></ul><h3 id="smbs-face-increasing-cyber-threats-despite-limited-resources"><a href="https://www.darkreading.com/vulnerabilities-threats/building-cyber-resilience-smbs-limited-resources?ref=mandos.io">SMBs Face Increasing Cyber Threats Despite Limited Resources</a></h3><ul><li>Nearly 70% of SMBs experienced at least one <strong>cyberattack</strong> in the past year, often due to limited budgets and inadequate security tools.</li><li>SMBs should focus on three key areas to improve cyber resilience: people (addressing skills gaps), process (developing tailored strategies), and <strong>technology</strong> (selecting appropriate tools).</li><li>Leadership involvement and external expertise are crucial for building a culture of security and staying informed about emerging <strong>threats</strong>.</li></ul><div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="addressing-cybersecurity-talent-shortage-with-contractors-and-reskilling"><a href="https://www.helpnetsecurity.com/2024/10/10/widening-cyber-talent-pool/?ref=mandos.io">Addressing Cybersecurity Talent Shortage with Contractors and Reskilling</a></h3>
<ul>
<li>
<p>Deploy certified cybersecurity <strong>contractors</strong> to quickly fill team vacancies, providing immediate support for projects and reducing pressure during hiring freezes.</p>
</li>
<li>
<p>Implement internal <strong>reskilling</strong> programs to reallocate existing employees into cybersecurity roles, leveraging their business knowledge and diverse perspectives.</p>
</li>
<li>
<p>Improve <strong>diversity</strong> in cybersecurity by prioritizing transferable skills and creating opportunities for candidates from non-traditional backgrounds, expanding the talent pool.</p>
</li>
</ul>
<h3 id="global-cybersecurity-workforce-growth-stalls-at-55m-professionals"><a href="https://www.cybersecuritydive.com/news/global-cyber-workforce-flatlines-isc2/726667/?ref=mandos.io">Global Cybersecurity Workforce Growth Stalls at 5.5M Professionals</a></h3>
<ul>
<li>
<p>Global cybersecurity workforce grew only 0.1% year-over-year, with an estimated <strong>4.8 million</strong> job gap between active workforce and perceived need.</p>
</li>
<li>
<p>One-quarter of surveyed professionals reported <strong>layoffs</strong> in their organizations, while nearly 2 in 5 observed budget cuts and hiring freezes.</p>
</li>
<li>
<p>90% of respondents reported <strong>skills shortages</strong> at their organizations, with two-thirds identifying skills gaps as a greater challenge than staffing levels.</p>
</li>
</ul>
<h3 id="security-budgets-grow-modestly-while-hiring-slows-ians-research-finds"><a href="https://www.cybersecuritydive.com/news/security-budgets-growth-hiring-slows/726511/?ref=mandos.io">Security Budgets Grow Modestly While Hiring Slows, IANS Research Finds</a></h3>
<ul>
<li>
<p>Security spending expected to reach $212 billion by 2025, a 15% increase from 2024 levels, according to <strong>Gartner</strong>.</p>
</li>
<li>
<p>Companies face competing priorities: improving cyber protection while managing overall expenses due to economic concerns.</p>
</li>
<li>
<p>Security leaders struggle to deliver better protection with limited resources, as digital technology becomes crucial for <strong>business growth</strong>.</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="ai-powered-email-analysis-detects-novel-scams-and-malicious-content"><a href="https://www.darkreading.com/cybersecurity-operations/ai-augmented-email-analysis-spots-latest-scams?ref=mandos.io">AI-Powered Email Analysis Detects Novel Scams and Malicious Content</a></h3>
<ul>
<li>
<p>Multimodal AI systems can identify <strong>fraudulent</strong> emails with over 97% accuracy, even for previously unseen brand impersonation attacks.</p>
</li>
<li>
<p>Researchers created an automated e-commerce <strong>scam</strong> platform using multiple AI agents, demonstrating potential for large-scale microtargeted campaigns.</p>
</li>
<li>
<p>AI-augmented analysis helps detect critical business workflow <strong>compromises</strong> related to money, credentials, sensitive data, and confidential processes.</p>
</li>
</ul>
<h3 id="oracle-launches-ai-powered-case-management-for-bank-fraud-detection"><a href="https://thefintechtimes.com/oracle-launches-ai-powered-case-management-solution-to-help-banks-stay-ahead-of-bad-actors/?ref=mandos.io">Oracle Launches AI-Powered Case Management for Bank Fraud Detection</a></h3>
<ul>
<li>
<p>Oracle introduces a new <strong>case management</strong> solution leveraging <strong>artificial intelligence</strong> to help banks combat financial crime and stay ahead of bad actors.</p>
</li>
<li>
<p>The system aims to streamline fraud investigation processes, potentially reducing case resolution times by up to 30% through automated data gathering and risk scoring.</p>
</li>
<li>
<p>Oracle's solution integrates with existing bank systems and utilizes machine learning to continuously improve its <strong>fraud detection</strong> capabilities based on historical case data and outcomes.</p>
</li>
</ul>
<h3 id="cloud-and-ai-skills-gap-hinders-cybersecurity-teams"><a href="https://www.darkreading.com/cloud-security/cloud-ai-talent-gaps-cybersecurity-teams?ref=mandos.io">Cloud and AI Skills Gap Hinders Cybersecurity Teams</a></h3>
<ul>
<li>
<p>Nearly 39% of security teams report difficulty finding <strong>cloud computing</strong> skills, crucial for securing virtual infrastructures across multiple providers.</p>
</li>
<li>
<p>Approximately 34% of respondents indicate a lack of <strong>AI</strong> security talent, particularly for emerging threats like prompt injection attacks.</p>
</li>
<li>
<p>Upskilling through certifications, books, and conferences is recommended to address talent gaps, with popular certifications including <strong>CISSP</strong>, CompTIA Security+, CEH, and CISM.</p>
</li>
</ul>

<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-analysis" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET ANALYSIS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="human-security-raises-50-million-to-enhance-bot-and-fraud-defense-platform"><a href="https://finance.yahoo.com/news/human-raises-50-million-growth-093000106.html?ref=mandos.io">HUMAN Security Raises $50+ Million to Enhance Bot and Fraud Defense Platform</a></h3>
<ul>
<li>
<p>HUMAN Security secured <strong>growth funding</strong> led by WestCap, with participation from Goldman Sachs and others, to expand its Human Defense Platform that verifies 20 trillion digital interactions weekly.</p>
</li>
<li>
<p>The investment will accelerate platform growth by incorporating advanced <strong>AI</strong> techniques, improving digital account protections, and developing new media security solutions for <strong>click fraud</strong> defense and advertising integrity.</p>
</li>
<li>
<p>HUMAN's platform protects against <strong>account takeover</strong>, scraping, transaction abuse, and fake interactions across the entire customer journey, from ad serving to account creation and transactions.</p>
</li>
</ul>
<h3 id="cyrisma-raises-7m-to-expand-msp-focused-cyber-risk-management-platform"><a href="https://www.securityweek.com/cyrisma-raises-7-million-for-risk-management-platform/?ref=mandos.io">Cyrisma Raises $7M to Expand MSP-Focused Cyber Risk Management Platform</a></h3>
<ul>
<li>
<p><strong>Cyrisma</strong>, a cyber risk management firm founded in 2018, announced raising $7 million in Series A funding, bringing the total raised to nearly $9 million.</p>
</li>
<li>
<p>The platform helps <strong>MSPs</strong> identify sensitive data, connected assets, configuration errors, and security defects, providing visibility into customers' entire <strong>attack surface</strong>.</p>
</li>
<li>
<p>The new funding will be used to accelerate <strong>product development</strong>, expand sales and marketing efforts, and invest in customer support, enabling Cyrisma to enter new markets and increase brand awareness.</p>
</li>
</ul>
<h3 id="relyance-ai-raises-321m-series-b-to-scale-ai-governance-platform"><a href="https://www.darkreading.com/application-security/relyance-ai-raises-32m-series-b-funding-to-safeguard-ai-innovation-in-the-enterprise?ref=mandos.io">Relyance AI Raises $32.1M Series B to Scale AI Governance Platform</a></h3>
<ul>
<li>
<p><strong>Relyance AI</strong>, an AI-powered data governance platform, announced a $32.1 million Series B funding round led by <strong>Thomvest Ventures</strong> with participation from M12, Microsoft Ventures Fund, Cheyenne Ventures, Menlo Ventures, and Unusual Ventures.</p>
</li>
<li>
<p>The platform provides visibility into enterprise-wide data processing and compares it against contractual commitments, global <strong>privacy regulations</strong>, and <strong>compliance</strong> frameworks, helping companies navigate the complex regulatory landscape surrounding AI use.</p>
</li>
<li>
<p>The funding will be used to further develop Relyance AI's platform and scale go-to-market efforts in response to significant recent momentum, with the company increasing its enterprise customer base by 30% in the first half of 2024 and projected to double its <strong>annual recurring revenue</strong>.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="event-generator"><a href="https://cybersectools.com/tools/event-generator?ref=mandos.io">event-generator</a></h3>
<p>Generate a variety of suspect actions that are detected by Falco rulesets.</p>
<h3 id="netresec"><a href="https://cybersectools.com/tools/netresec?ref=mandos.io">NETRESEC</a></h3>
<p>NETRESEC is an independent software vendor specializing in network security, offering tools like NetworkMiner for network forensic analysis, CapLoader for handling large pcap files, and RawCap for lightweight sniffing. They also maintain a list of publicly available pcap files.</p>
<h3 id="cloudsplaining"><a href="https://cybersectools.com/tools/cloudsplaining?ref=mandos.io">Cloudsplaining</a></h3>
<p>Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized HTML report.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ 3 Critical Steps to Build an Intelligence-Led SOC ]]></title>
        <description><![CDATA[ Learn how to transform your Security Operations Center from reactive to proactive. Discover key strategies to overcome common challenges and build an intelligence-led SOC. ]]></description>
        <link>https://mandos.io/blog/3-steps-build-intelligence-led-soc-ciso-guide/</link>
        <guid isPermaLink="false">66f949db4e96150001839e5a</guid>
        <category><![CDATA[ Cybersecurity ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 08 Oct 2024 12:00:35 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/09/Building-an-Intelligence-Led-SOC--A-Practical-Guide-for-Cybersecurity-Leaders.webp" medium="image"/>
        <content:encoded><![CDATA[ <p>\As a cybersecurity strategist, I've seen firsthand the evolution of security operations centers (SOCs). We've moved from reactive, alert-driven models to more proactive and intelligence-led approaches. This shift is essential in today's threat landscape, but I often hear from fellow security leaders who struggle to make it happen.</p><p>So, what does "intelligence-led" really mean? </p><p>It's about building a SOC that anticipates threats instead of just reacting to them. It means using threat intelligence to make informed decisions about resource allocation, technology investments, and security posture. </p><p>The benefits are clear: a more proactive stance, faster and more effective incident response, and better protection for your organization's critical assets.</p><h2 id="the-struggle-is-real">The Struggle is Real</h2><p>Unfortunately, building this type of SOC is easier said than done. Many organizations struggle to translate the concept into a practical reality. </p><p>Why? Here are a few reasons.</p><p>One of the primary issues is the overwhelming volume of threats, vulnerabilities, and security alerts that SOCs must handle. This can lead to a reactive approach, where teams focus on the latest high-profile attacks rather than prioritizing the most relevant threats to their organization. To overcome this, it's essential to develop a clear strategy that aligns with the company's overall business goals and provides a roadmap for investing in the right tools, processes, and skill sets.</p><p>Another common challenge is the lack of integration between disparate security tools. Many SOCs rely on a patchwork of systems that don't communicate effectively, creating data silos and hindering visibility. This fragmentation slows down threat detection and response, making it harder for analysts to get a comprehensive view of their security posture.</p><p>Staffing is also a significant hurdle for many organizations. The shortage of skilled security professionals makes it difficult to find and retain the talent needed to effectively operationalize an intelligence-led approach. This can lead to overburdened analysts and a lack of expertise in key areas. </p><p>In addition to staffing challenges, many SOCs still rely heavily on manual processes, which are time-consuming and prone to error. This can result in alert fatigue and reduced efficiency. To address this, organizations must embrace automation to streamline repetitive tasks and free up analysts to focus on higher-level responsibilities, such as threat hunting and incident response. Despite these challenges, building an effective, intelligence-led SOC is within reach.</p><p>Nevertheless, I want to assure you that building an effective, intelligence-led SOC is achievable. It requires a shift in mindset, a clear strategy, and a commitment to continuous improvement.</p><div class="kg-card kg-callout-card kg-callout-card-accent"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Download the FREE checklist at the end of this article to supercharge your journey. Stay tuned!</div></div><p>Here's a step-by-step guide to get you started:</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><!--members-only--><h2 id="step-1-define-your-threat-model-and-prioritize-your-defenses">Step 1: Define Your Threat Model and Prioritize Your Defenses</h2><p>Start by understanding the threats that matter most to your organization. Conduct a thorough threat assessment, considering your industry, data assets, and existing security posture.<br><br>When conducting your threat assessment, keep in mind that not all threats are created equal. You need to focus your limited resources on defending against the threats that are most likely to materialize and have the biggest impact on your business.<br><br>To illustrate this point, consider the following example: A financial institution might prioritize threats related to financial fraud, data breaches, and ransomware attacks, while a healthcare organization might focus on protecting patient data from unauthorized access and disclosure.</p><h2 id="step-2-embrace-threat-intelligence-as-your-guide">Step 2: Embrace Threat Intelligence as Your Guide</h2><p>Integrate threat intelligence into every aspect of your SOC operations. Use it to inform your threat model, prioritize alerts, guide incident investigations, and proactively hunt for threats. </p><p>Threat intelligence provides the context and insights you need to make informed decisions about your security posture. It helps you stay ahead of emerging threats and adapt your defenses as needed.<br><br>However, organizations often make the following mistakes when implementing threat intelligence:</p><ul><li><strong>Relying Solely on Open-Source Intelligence:</strong> While valuable, open-source intelligence should be supplemented with commercial or industry-specific feeds to get a more comprehensive view of the threat landscape.</li><li><strong>Treating Threat Intelligence as a "Set It and Forget It" Solution</strong>: Threat intelligence is dynamic and constantly evolving. You need to continuously monitor and update your feeds to ensure you're getting the most up-to-date information.</li></ul><p>To avoid these pitfalls and effectively leverage threat intelligence, consider the following best practices:</p><ul><li><strong>Invest in a Threat Intelligence Platform (TIP): </strong>A TIP can help you aggregate, analyze, and operationalize threat intelligence from multiple sources.</li><li><strong>Develop Relationships with Threat Intelligence Vendors and Communities:</strong> Sharing information and best practices can help you stay ahead of the curve.</li><li><strong>Establish Processes for Evaluating and Validating Threat Intelligence:</strong> Not all intelligence is accurate or relevant. You need to have a system for filtering and prioritizing the information you receive.</li></ul><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="step-3-automate-and-orchestrate-for-efficiency-and-scale">Step 3: Automate and Orchestrate for Efficiency and Scale</h2><p>Embrace automation to streamline repetitive tasks, accelerate incident response, and free up analysts to focus on higher-level activities. Automation is essential for improving SOC efficiency, reducing alert fatigue, and enabling your team to handle the increasing volume and complexity of security threats.<br><br>To identify tasks that can be automated, consider the following examples: </p><p><strong>Alert Triage and Enrichment: </strong>Automating the process of gathering additional context about an alert (e.g., IP reputation, user activity, geolocation) can save analysts valuable time. </p><p><strong>Incident Response Playbooks:</strong> Creating automated workflows for common incident types can help you respond to threats faster and more consistently. </p><p><strong>Threat Hunting:</strong> Automating data analysis and correlation can help you proactively identify threats that might otherwise go undetected. By automating these tasks, SOCs can experience several significant benefits.<br><br>Automation comes with great benefits. By automating routine tasks, analysts can focus on more strategic and impactful work. Moreover, automated workflows can help you contain threats faster and minimize damage to your organization by enabling quick detection and response. Proactive threat hunting is another advantage of automation. It allows you to identify and mitigate threats before they can cause harm, further enhancing your organization's security posture.</p><h2 id="conclusion">Conclusion</h2><p>By taking these steps, you can move towards a more mature and effective security operations model. </p><p>Remember that building an intelligence-led SOC is an ongoing journey, not a destination. </p><p>You'll need to continuously adapt your processes, technologies, and skill sets to stay ahead of the curve. However, with a clear vision and a commitment to continuous improvement, you can build a SOC that is truly equipped to protect your organization from the ever-evolving threat landscape.</p><h3 id="before-you-go">Before you go</h3><p>If you found this article useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='24bcf30e-807a-41d6-9cf5-b0361a780e42' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p><hr><p><strong>Grab your FREE checklist below.</strong></p><!--members-only--><div class="kg-card kg-file-card"><a class="kg-file-card-container" href="https://mandos.io/content/files/2024/09/CISO-Checklist-Building-an-Intelligence-Led-SOC.pdf" title="Download" download=""><div class="kg-file-card-contents"><div class="kg-file-card-title">CISO Checklist Building an Intelligence-Led SOC</div><div class="kg-file-card-caption"></div><div class="kg-file-card-metadata"><div class="kg-file-card-filename">CISO Checklist Building an Intelligence-Led SOC.pdf</div><div class="kg-file-card-filesize">1 MB</div></div></div><div class="kg-file-card-icon"><svg viewBox="0 0 24 24"><defs><style>.a{fill:none;stroke:currentColor;stroke-linecap:round;stroke-linejoin:round;stroke-width:1.5px;}</style></defs><title>download-circle</title><polyline class="a" points="8.25 14.25 12 18 15.75 14.25"></polyline><line class="a" x1="12" y1="6.75" x2="12" y2="18"></line><circle class="a" cx="12" cy="12" r="11.25"></circle></svg></div></a></div> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #72: NVIDIA flaw, 3.8 Tbps Cloudflare DDoS, AWS AI hijacking ]]></title>
        <description><![CDATA[ Mysterious Linux malware exploiting misconfigurations, LLMs&#39; package hallucination risks, and new API Security Maturity Model ]]></description>
        <link>https://mandos.io/newsletter/brief-72-nvidia-flaw-3-8-tbps-cloudflare-ddos-aws-ai-hijacking/</link>
        <guid isPermaLink="false">670275ecebf137000173ea15</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 06 Oct 2024 15:00:49 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/10/40.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>A massive 3.8 Tbps DDoS attack targeting financial and telecom sectors</li><li>How humor can enhance cybersecurity training effectiveness</li><li>The launch of a new AI-powered mobile app for CISOs</li></ul><p>And much more.</p><p><strong>Prefer to listen?</strong></p><div class="kg-card kg-audio-card"><img src="" alt="audio-thumbnail" class="kg-audio-thumbnail kg-audio-hide"><div class="kg-audio-thumbnail placeholder"><svg width="24" height="24" fill="none"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"></path></svg></div><div class="kg-audio-player-container"><audio src="https://mandos.io/content/media/2024/10/Brief-72--NVIDIA-flaw--3.8-Tbps-Cloudflare-DDoS--AWS-AI-hijacking.wav" preload="metadata"></audio><div class="kg-audio-title">Brief 72 NVIDIA flaw 38 Tbps Cloudflare DDoS AWS AI hijacking</div><div class="kg-audio-player"><button class="kg-audio-play-icon" aria-label="Play audio"><svg viewBox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"></path></svg></button><button class="kg-audio-pause-icon kg-audio-hide" aria-label="Pause audio"><svg viewBox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"></rect><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"></rect></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">717.96</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate" aria-label="Adjust playback speed">1×</button><button class="kg-audio-unmute-icon" aria-label="Unmute"><svg viewBox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"></path></svg></button><button class="kg-audio-mute-icon kg-audio-hide" aria-label="Mute"><svg viewBox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"></path></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><p><em>(Led by AI characters)</em></p><p><strong>How would you prefer to consume Mandos Brief newsletter?</strong></p><p><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/1?ref=mandos.io">1️⃣ Written format only (no podcast)</a></p><p><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/2?ref=mandos.io">2️⃣ Written format + AI-generated podcast</a></p><p><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/3?ref=mandos.io">3️⃣ Written format + podcast with me speaking</a></p><hr><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="record-breaking-38-tbps-ddos-attack-targets-financial-and-telecom-sectors"><a href="https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/?ref=mandos.io">Record-Breaking 3.8 Tbps DDoS Attack Targets Financial and Telecom Sectors</a></h3>
<ul>
<li>
<p><strong>Cloudflare</strong> researchers reported a month-long DDoS campaign targeting organizations in the financial services, internet, and telecommunications sectors, with the largest <strong>volumetric</strong> attack peaking at 3.8 Tbps.</p>
</li>
<li>
<p>The attacks leveraged a global network of compromised devices, including <strong>Asus routers</strong>, <strong>MikroTik</strong> systems, DVRs, and web servers, with many located in Russia, Vietnam, the U.S., Brazil, and Spain.</p>
</li>
<li>
<p>Cloudflare successfully mitigated all attacks autonomously, while a separate report from <strong>Akamai</strong> confirmed that recently disclosed <strong>CUPS vulnerabilities</strong> in Linux could be a viable vector for future DDoS attacks.</p>
</li>
</ul>
<h3 id="critical-nvidia-container-toolkit-flaw-allows-container-escape-attacks"><a href="https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability?ref=mandos.io">Critical NVIDIA Container Toolkit Flaw Allows Container Escape Attacks</a></h3>
<ul>
<li>
<p><strong>Wiz Research</strong> discovered a critical vulnerability (CVE-2024-0132, <strong>CVSS 9.0</strong>) in the <strong>NVIDIA Container Toolkit</strong>, which allows adversaries to perform <strong>container escape attacks</strong> and gain full access to the host system.</p>
</li>
<li>
<p>The flaw affects NVIDIA Container Toolkit 1.16.1 and earlier, and GPU Operator 24.6.1 and older, impacting over 35% of cloud environments that rely on these tools for <strong>GPU</strong> access in <strong>AI</strong> applications.</p>
</li>
<li>
<p>Attackers can exploit the lack of secure isolation between the containerized GPU and the host by mounting sensitive parts of the host filesystem or accessing writable <strong>Unix sockets</strong>, enabling them to execute commands or exfiltrate data.</p>
</li>
</ul>
<h3 id="mysterious-linux-malware-exploits-thousands-of-server-misconfigurations"><a href="https://www.darkreading.com/threat-intelligence/perfctl-fileless-malware-targets-millions-linux-servers?ref=mandos.io">Mysterious Linux Malware Exploits Thousands of Server Misconfigurations</a></h3>
<ul>
<li>
<p>Aqua Nautilus researchers have analyzed the long-running "<strong>perfctl</strong>" malware that has been infecting Linux servers worldwide for years, exploiting misconfigurations to deploy <strong>cryptomining</strong> and <strong>proxyjacking</strong> malware.</p>
</li>
<li>
<p>The malware is highly persistent and difficult to eradicate, constantly hiding itself. It targets any <strong>Linux server</strong> connected to the Internet, and has likely compromised thousands out of millions targeted.</p>
</li>
<li>
<p>Researchers discovered a list of nearly 20,000 potential exploit paths used by the malware, including over 12,000 known <strong>server misconfigurations</strong>, 2,000 paths for stealing <strong>credentials</strong> and <strong>keys</strong>, 1,000 unauthorized login techniques, and dozens of <strong>application</strong>-specific flaws.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="humor-emerges-as-powerful-tool-in-cybersecurity-training-and-culture"><a href="https://www.darkreading.com/cybersecurity-operations/cybersecurity-serious-not-boring?ref=mandos.io">Humor Emerges as Powerful Tool in Cybersecurity Training and Culture</a></h3>
<ul>
<li>
<p>According to a CompTIA study, the <strong>human element</strong> accounts for 52% of data breaches, but traditional cybersecurity training often fails to engage employees, resulting in low retention of key security concepts.</p>
</li>
<li>
<p>Humor in training can boost retention, create a more relaxed learning environment, and transform routine tasks into memorable experiences, as supported by research from TrainSmart and Edutopia showing humor activates <strong>dopamine pathways</strong> essential for motivation and memory.</p>
</li>
<li>
<p>While humor can be effective in combating <strong>security fatigue</strong> and engaging remote workers, it also carries risks if not implemented carefully, as it may trivialize serious <strong>threats</strong>, so balance is key to engage without undermining the importance of cybersecurity.</p>
</li>
</ul>
<h3 id="api-security-maturity-model-assesses-weaknesses-and-vulnerabilities"><a href="https://www.techtarget.com/searchsecurity/feature/API-security-maturity-model-to-assess-API-security-posture?ref=mandos.io">API Security Maturity Model Assesses Weaknesses and Vulnerabilities</a></h3>
<ul>
<li>
<p><strong>Isabelle Mauny</strong>, Field CTO at 42Crunch, formulated a six-domain API security maturity model to determine an organization's current security posture and roadmap toward a more secure posture. The model includes <strong>inventory</strong>, <strong>design</strong>, <strong>development</strong>, <strong>testing</strong>, <strong>protection</strong>, and <strong>governance</strong> domains.</p>
</li>
<li>
<p>The model features activities for each domain, which may exist to varying degrees based on maturity levels: non-existent, <strong>emerging</strong>, or <strong>established</strong>. Key elements include maintaining an accurate API inventory, addressing security concerns during the design phase, following secure coding practices, integrating security testing into CI/CD, implementing dedicated API protection mechanisms, and ensuring APIs meet organizational governance requirements.</p>
</li>
<li>
<p>Without adequate API security measures, organizations risk deploying insecure APIs vulnerable to attacks. A defense-in-depth approach and robust governance process are essential to reduce risk and ensure APIs are designed, developed, tested, and protected according to the organization's methodology.</p>
</li>
</ul>
<h3 id="secrets-sprawl-in-public-repos-reaches-128-million-driven-by-api-keys"><a href="https://blog.gitguardian.com/securing-your-machine-identities/?ref=mandos.io">Secrets Sprawl in Public Repos Reaches 12.8 Million, Driven by <strong>API Keys</strong></a></h3>
<ul>
<li>
<p>GitGuardian's State of Secrets Sprawl report reveals that <strong>12.8 million secrets</strong> were detected in GitHub public repos in 2024, up from 10 million the previous year and 6 million the year before, with the vast majority being <strong>API keys</strong>.</p>
</li>
<li>
<p>The term "<strong>machine identities</strong>" is being adopted to distinguish the unique challenges of secrets sprawl related to machine-to-machine communication, such as API access keys, certificates, and PKI, from human identities and credentials.</p>
</li>
<li>
<p>The historical reliance on password-based authentication for machine-to-machine communication has led to the current problem of <strong>credentials</strong> being leaked into code and collaboration platforms at an alarming rate.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="qualys-offers-free-cybersecurity-training-and-certification-courses"><a href="https://www.qualys.com/training/?ref=mandos.io">Qualys Offers Free Cybersecurity Training and Certification Courses</a></h3>
<ul>
<li>
<p>Qualys provides free self-paced and instructor-led <strong>certified training</strong> on core cybersecurity topics including <strong>Vulnerability Management</strong>, <strong>Policy Compliance</strong>, <strong>PCI Compliance</strong>, and <strong>Endpoint Detection and Response (EDR)</strong>.</p>
</li>
<li>
<p>The training includes hands-on labs featuring the latest <strong>Qualys Suite</strong> features and best practices, allowing learners to gain practical experience.</p>
</li>
<li>
<p>Foundational courses are available for each topic to help learners understand the basics before diving into more advanced courses that cover specific tools and strategies for effective cybersecurity management.</p>
</li>
</ul>
<h3 id="cyberthreat-2024-empowering-europes-cyber-security-community-in-london"><a href="https://www.sans.org/cyber-security-training-events/cyberthreat-24/?ref=mandos.io">CyberThreat 2024: Empowering Europe's Cyber Security Community in London</a></h3>
<ul>
<li>
<p>The National Cyber Security Centre (NCSC) and SANS Institute are hosting the two-day <strong>CyberThreat 2024</strong> conference in London on December 9-10, 2024, bringing together Europe's <strong>cyber security</strong> community.</p>
</li>
<li>
<p>The event covers both <strong>offensive</strong> and <strong>defensive</strong> disciplines with a focus on technical aspects, featuring presentations from renowned experts, hands-on opportunities like CTF events, team problem solving, and "Hackathon" challenges.</p>
</li>
<li>
<p>Attending in-person offers benefits such as participating in the challenging CyberThreat CTF, attempting the interactive <strong>hackable badge</strong> challenge, enjoying cutting-edge tech features, and networking with like-minded security practitioners.</p>
</li>
</ul>
<h3 id="cisco-offers-free-cybersecurity-training-and-certification-in-giveaway"><a href="https://mkto.cisco.com/cybersecurity-giveaway-oct-2024.html?ref=mandos.io">Cisco Offers Free Cybersecurity Training and Certification in Giveaway</a></h3>
<ul>
<li>
<p>Cisco is offering a free cybersecurity training and certification giveaway aimed at <strong>network engineers</strong> looking to transition into <strong>cybersecurity</strong> roles.</p>
</li>
<li>
<p>Five randomly selected winners will be able to choose from <strong>e-learning</strong> and <strong>exam bundles</strong> for Cisco Certified CyberOps Associate, Cisco Certified CyberOps Professional, CCNP Security, or a 1-year subscription to Cisco U. Essentials.</p>
</li>
<li>
<p>The giveaway is open until November 15, 2024, and aims to help participants enhance their skills and become their organization's "cybersecurity superstar."</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="llms-package-hallucination-problem-poses-supply-chain-risk"><a href="https://www.infoworld.com/article/3542884/large-language-models-hallucinating-non-existent-developer-packages-could-fuel-supply-chain-attacks.html?ref=mandos.io">LLMs' Package Hallucination Problem Poses Supply Chain Risk</a></h3>
<ul>
<li>
<p>A multi-university study found that Large Language Models (LLMs) have a serious "<strong>package hallucination</strong>" problem, where they generate code referencing non-existent <strong>Python</strong> and <strong>JavaScript</strong> packages, potentially leading to a wave of <strong>maliciously-coded packages</strong> in the software supply chain.</p>
</li>
<li>
<p>The study generated 2.23 million code samples using various LLM models and discovered that 19.7% contained references to hallucinated packages, with 205,474 unique examples of hallucinated <strong>package names</strong>, highlighting the severity and pervasiveness of the threat.</p>
</li>
<li>
<p>Researchers discuss potential mitigations, such as addressing the underlying issue of why LLMs generate <strong>hallucinations</strong>, using Retrieval Augmented Generation (RAG), and fine-tuning LLMs to improve output on tasks more likely to generate hallucinations, but note that LLM developers themselves need to act to implement these improvements.</p>
</li>
</ul>
<h3 id="mitre-launches-ai-incident-sharing-initiative-to-improve-collective-defense"><a href="https://ai-incidents.mitre.org/?ref=mandos.io">MITRE Launches AI Incident Sharing Initiative to Improve Collective Defense</a></h3>
<ul>
<li>
<p><strong>MITRE's Center for Threat-Informed Defense</strong> collaborated with over 15 companies to launch the AI Incident Sharing initiative, aiming to improve collective awareness and defense of <strong>AI-enabled systems</strong> by enabling rapid and protected sharing of information about <strong>attacks</strong> or accidents.</p>
</li>
<li>
<p>The Secure AI collaboration also extended the <strong>ATLAS threat framework</strong> to update the adversarial threat landscape for <strong>generative AI-enabled systems</strong>, adding new case studies, attack techniques, and mitigation methods to the public knowledge base.</p>
</li>
<li>
<p>MITRE operates other information-sharing public-private partnerships, including the Common Vulnerabilities and Exposures (CVE) list and the Aviation Safety Information Analysis and Sharing (ASIAS) database, and recently announced the full release of the <strong>EMB3D Threat Model</strong> for embedded devices.</p>
</li>
</ul>
<h3 id="attackers-hijacking-aws-ai-infrastructure-to-power-unfiltered-sexual-roleplaying-chatbots"><a href="https://permiso.io/blog/exploiting-hosted-models?ref=mandos.io">Attackers Hijacking AWS AI Infrastructure to Power Unfiltered Sexual Roleplaying Chatbots</a></h3>
<ul>
<li>
<p>Permiso reports that attacks against AWS <strong>Bedrock</strong> GenAI infrastructure have increased substantially over the last 6 months, particularly with exposed access keys.</p>
</li>
<li>
<p>Attackers are hijacking victim GenAI infrastructure to power their own LLM applications, including sexual roleplaying chatbots that allow users to have 1:1 conversations with AI characters and generate <strong>CSEM</strong> content.</p>
</li>
<li>
<p>Attackers perform 3 main steps when hijacking LLMs in Bedrock: checking for <strong>model availability</strong>, requesting access to models, and <strong>invoking</strong> the models through prompting, bypassing content filters using common <strong>jailbreak</strong> techniques.</p>
</li>
</ul>

<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-analysis" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET ANALYSIS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="apono-raises-155m-in-series-a-funding-to-advance-cloud-access-governance"><a href="https://www.darkreading.com/cloud-security/apono-raises-15-5m-series-a-funding-for-ai-driven-least-privilege-solution-set?ref=mandos.io">Apono Raises $15.5M in Series A Funding to Advance Cloud Access Governance</a></h3>
<ul>
<li>
<p><strong>Apono</strong>, a leader in privileged access for the cloud, announced the successful completion of its $15.5 million Series A funding round led by New Era Capital Partners.</p>
</li>
<li>
<p>The funds will be used to accelerate product development, deliver value to customers, and solidify Apono's position in the <strong>identity security</strong> space, bringing the total investment to $20.5 million.</p>
</li>
<li>
<p>Apono's AI-driven solution addresses critical challenges in <strong>cloud access management</strong>, providing organizations with robust, scalable solutions to manage and secure access in today's dynamic <strong>cloud</strong> environments.</p>
</li>
</ul>
<h3 id="safe-security-launches-generative-ai-powered-mobile-app-for-cisos"><a href="https://siliconangle.com/2024/10/01/safe-security-launches-safe-x-help-cisos-prioritize-cyber-risks-ai/?ref=mandos.io">Safe Security Launches Generative AI-Powered Mobile App for CISOs</a></h3>
<ul>
<li>
<p>Safe Security, an AI-based <strong>cyber risk management</strong> company, has launched Safe X, a new generative AI-powered mobile app that provides CISOs with real-time <strong>business impact insights</strong> into their cybersecurity posture.</p>
</li>
<li>
<p>Safe X integrates data from existing cybersecurity products and converts them into actionable insights, enabling CISOs to make proactive decisions that drive the highest <strong>risk reduction</strong> and improve <strong>risk prioritization</strong>.</p>
</li>
<li>
<p>The app leverages generative AI to provide instant answers to pressing cybersecurity questions, such as vulnerability to the latest <strong>ransomware attacks</strong>, cyber risks with the highest business impact, and the effectiveness of investments in reducing risks.</p>
</li>
</ul>
<h3 id="crowdstrike-expands-marketplace-to-meet-demand-for-integrated-cybersecurity-solutions"><a href="https://www.crowdstrike.com/press-releases/crowdstrike-expands-crowdstrike-marketplace/?ref=mandos.io">CrowdStrike Expands Marketplace to Meet Demand for Integrated Cybersecurity Solutions</a></h3>
<ul>
<li>
<p>CrowdStrike announces the expansion of the CrowdStrike Marketplace, which has grown to over 260 listings from 140 partners in its first year, adding strategic resellers to help customers discover, try, and buy <strong>integrated</strong> third-party solutions.</p>
</li>
<li>
<p>The Marketplace assists customers in optimizing their cybersecurity investments, reducing risks associated with <strong>siloed tools</strong> and complex security stacks, and maximizing the power of the <strong>Falcon platform</strong>.</p>
</li>
<li>
<p>With the addition of top global and national resellers like CDW, GuidePoint Security, Optiv, and World Wide Technology (WWT), CrowdStrike is expanding access to leading ISVs, strengthening the Marketplace's role in aligning the cybersecurity <strong>ecosystem</strong> around customer success.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="rect-framework"><a href="https://cybersectools.com/tools/reandct-framework?ref=mandos.io">RE&amp;CT Framework</a></h3>
<p>A framework — knowledge base of actionable Incident Response techniques. A community-driven collection of Security Incident Response and a data source of the Atomic Threat Coverage framework.</p>
<h3 id="wapiti"><a href="https://cybersectools.com/tools/wapiti?ref=mandos.io">Wapiti</a></h3>
<p>The web-application vulnerability scanner Wapiti allows you to audit the security of your websites or web applications. It performs 'black-box' scans by crawling webpages, looking for scripts and forms to inject data, and acts like a fuzzer to test vulnerabilities.</p>
<h3 id="shuffler"><a href="https://cybersectools.com/tools/shuffler?ref=mandos.io">Shuffler</a></h3>
<p>Shuffle Automation is an open-source SOAR (Security Orchestration, Automation, and Response) solution designed to streamline security workflows and improve incident response times.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ CISO&#x27;s Guide to Securing the AI Data Pipeline ]]></title>
        <description><![CDATA[ CISOs face unprecedented challenges in securing AI data pipelines. Learn about the complexities, risks, and a three-step guide to fortify your AI security posture. ]]></description>
        <link>https://mandos.io/blog/securing-the-ai-data-pipeline-a-cisos-guide-to-robust-controls/</link>
        <guid isPermaLink="false">66f87a0e4e96150001839daf</guid>
        <category><![CDATA[ AI ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 01 Oct 2024 12:00:04 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/09/CISO-s-Guide-to-Securing-the-AI-Data-Pipeline.webp" medium="image"/>
        <content:encoded><![CDATA[ <p>CISOs are no strangers to the pressure of staying ahead of evolving threats. We've seen buzzwords come and go, but generative AI feels different. It brings a fundamental shift in how businesses operate, and with it comes a whole new set of security challenges.</p><p>Unfortunately, securing AI data often feels like trying to hit a moving target in the dark. Many organizations struggle to establish robust security for their AI initiatives, leaving sensitive data and even the AI models themselves vulnerable to compromise.</p><h2 id="why-is-securing-ai-data-so-complex">Why is securing AI data so complex?</h2><p>AI security is a relatively new domain, and we're all still learning. The technology itself is complex, and the attack surface is constantly expanding. Many organizations lack the in-house expertise to effectively identify and mitigate AI-specific threats.</p><p>Adding to this complexity is the issue of speed. The AI industry is improving rapidly, and new tools, techniques, and, yes, threats emerge almost daily. This rapid pace of change can make it difficult to establish and maintain a robust security posture.</p><p>In response to these challenges, many organizations turn to third-party AI services or pre-trained models. However, it's dangerous to assume that the security burden falls solely on the provider. While providers play a crucial role, organizations must also take responsibility for their AI security.</p><p>This shared responsibility is particularly crucial when it comes to data protection. After all, data is the king in AI. AI thrives on it, and often, that data is incredibly sensitive. Training data, user inputs, and even the AI model's outputs can contain confidential information that must be protected.</p><p>While securing data is essential, it's important to remember that technology alone cannot guarantee security. In fact, our employees are often the weakest link in any security chain. Lack of awareness, accidental data sharing, or even malicious insiders can undermine even the most robust security controls.</p><p>Despite these challenges in AI security, from rapid technological changes to data protection and human factors, there's reason for optimism. Just like with any cybersecurity challenge, securing your AI data pipeline is about taking a proactive, strategic, and optimistic approach.</p><div class="kg-card kg-callout-card kg-callout-card-accent"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Download the FREE checklist at the end of this article to supercharge your journey. Stay tuned!</div></div><p>Here's a three-step guide to help you get started:</p><!--members-only--><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="step-1-know-your-data-your-ai-and-your-risks">Step 1: Know Your Data, Your AI, and Your Risks</h2><p>This step is all about gaining clarity and laying the groundwork for a targeted security strategy.</p><p>To achieve this clarity, begin by identifying all AI initiatives within your organization. This includes understanding the types of AI applications in use (e.g., chatbots, content generators, predictive models), the data they process, and where that data resides. By cataloging your AI landscape, you'll be better equipped to assess and address potential risks.</p><p>Once you've identified your AI initiatives, it's crucial to categorize them within a structured framework. AWS introduced a valuable tool for this purpose called the "<a href="https://aws.amazon.com/blogs/security/securing-generative-ai-an-introduction-to-the-generative-ai-security-scoping-matrix/?ref=mandos.io">Generative AI Security Scoping Matrix</a>". This matrix categorizes AI usage into five distinct scopes, ranging from utilizing public AI services like ChatGPT (Scope 1) to building and training your own AI models from scratch (Scope 5). Each scope has its own risk profile and requires a tailored approach to security.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://mandos.io/content/images/2024/09/AWS-AI-Scoping-Matrix.png" class="kg-image" alt="AWS AI Scoping Matrix" loading="lazy" width="1491" height="772" srcset="https://mandos.io/content/images/size/w600/2024/09/AWS-AI-Scoping-Matrix.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AWS-AI-Scoping-Matrix.png 1000w, https://mandos.io/content/images/2024/09/AWS-AI-Scoping-Matrix.png 1491w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">AWS AI Scoping Matrix</span></figcaption></figure><p>With your AI initiatives categorized, the next step is to visualize how data moves within your AI applications and across different systems. Building upon the scopes identified in the matrix, use data flow diagrams to illustrate these paths, highlighting potential points of vulnerability and where to focus your security controls.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Let's say your marketing team uses a third-party AI tool to generate content for social media campaigns. This would fall under Scope 2 of the matrix (Enterprise app using generative AI features). Your data flow map might show that the tool accesses customer data stored in your CRM system and interacts with your social media management platform.</div></div><h2 id="step-2-build-your-ai-security-brick-by-brick">Step 2: Build Your AI Security (Brick by Brick)</h2><p>Now it's time to translate your understanding of risks into tangible security controls. The good news is that many well-established security principles still apply.</p><p>Just like with any critical system, you need to restrict access to your AI models, training data, and APIs. This means implementing strong authentication, authorization, and role-based access control (RBAC) mechanisms. The principle of least privilege is crucial here – only grant users the bare minimum access they need to perform their tasks.</p><p>In addition to access control, another crucial security measure is encryption. Encrypt your data at rest and in transit, including training data, model artifacts, and any sensitive information processed by your AI applications. Additionally, consider techniques like data minimization (only collecting and storing the data you absolutely need) and de-identification (removing or masking identifying information) to further reduce your risk surface.</p><p>While technical controls like access management and encryption are essential, it's equally important to approach AI security from a strategic perspective. This is where threat modeling comes into play. Traditional threat modeling needs an AI-specific makeover. This means understanding potential threats unique to AI systems, such as prompt injection, where attackers manipulate AI outputs by carefully crafting malicious inputs. Consider tools like <a href="https://aws.amazon.com/bedrock/guardrails/?ref=mandos.io">Amazon Bedrock Guardrails</a>, which allow you to define policies and filters to detect and mitigate undesirable content in both user inputs and AI outputs.</p><p>As part of your comprehensive AI security strategy, don't overlook the importance of evaluating your AI vendors' security practices. Through my experience and discussing with peers I have found that most business leaders assume that AI vendors have security all figured out. This is all very wrong. Carefully review their security policies and practices, and don't hesitate to ask tough questions. Thorough vendor assessment, combined with the internal security measures discussed earlier, will help ensure the overall security of your AI systems.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2025/01/step-2.png" class="kg-image" alt="" loading="lazy" width="890" height="638" srcset="https://mandos.io/content/images/size/w600/2025/01/step-2.png 600w, https://mandos.io/content/images/2025/01/step-2.png 890w" sizes="(min-width: 720px) 720px"></figure>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='24bcf30e-807a-41d6-9cf5-b0361a780e42' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<h2 id="step-3-empower-your-people-foster-collaboration-and-never-stop-learning">Step 3: Empower Your People, Foster Collaboration, and Never Stop Learning</h2><p>As much as we might want it, as long as humans are involved, technology alone can't secure your AI initiatives. You need to cultivate a security-first culture and empower your people to be your first line of defense.</p><p>Conduct regular training to educate your employees about AI-related security risks, data handling policies, and reporting procedures. The more they know, the better equipped they'll be to spot and report potential issues.</p><p>In addition to internal training, it's crucial to stay connected with industry peers and share information about emerging threats and best practices. We all know that the AI security world is constantly evolving, so keep connecting on professional platforms, attend conferences, and don't be shy to share your pain points. Trust me, your peers are in the same boat.</p><p>While staying informed about industry developments is important, it's equally critical to regularly monitor your own AI systems for suspicious activity. Analyze security logs, conduct penetration testing, and use the insights you gain to continuously improve your security posture.</p><h2 id="conclusion">Conclusion</h2><p>By embracing these steps, you're not just securing your AI data pipeline – you're building trust with your customers, safeguarding your organization's reputation, and ultimately creating a more secure and resilient future.</p><p>A robust AI security program should result in reduced risk of data breaches, improved compliance with relevant regulations, increased user confidence in your AI initiatives, and a stronger overall security posture. The only constant is change, and the organizations that prioritize security will be the ones best positioned to thrive.</p><h3 id="before-you-go">Before you go</h3><p>If you found this article useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='24bcf30e-807a-41d6-9cf5-b0361a780e42' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p><p><strong>Grab your FREE checklist below.</strong></p><!--members-only--><div class="kg-card kg-file-card"><a class="kg-file-card-container" href="https://mandos.io/content/files/2024/09/CISO-Checklist-Securing-the-AI-Data-Pipeline.pdf" title="Download" download=""><div class="kg-file-card-contents"><div class="kg-file-card-title">CISO Checklist Securing the AI Data Pipeline</div><div class="kg-file-card-caption"></div><div class="kg-file-card-metadata"><div class="kg-file-card-filename">CISO Checklist Securing the AI Data Pipeline.pdf</div><div class="kg-file-card-filesize">1 MB</div></div></div><div class="kg-file-card-icon"><svg viewBox="0 0 24 24"><defs><style>.a{fill:none;stroke:currentColor;stroke-linecap:round;stroke-linejoin:round;stroke-width:1.5px;}</style></defs><title>download-circle</title><polyline class="a" points="8.25 14.25 12 18 15.75 14.25"></polyline><line class="a" x1="12" y1="6.75" x2="12" y2="18"></line><circle class="a" cx="12" cy="12" r="11.25"></circle></svg></div></a></div> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #71: Storm-0501 Targets Hybrid Clouds, CUPS RCE Flaw, AI Security Challenges, Wiz&#x27;s $20B Valuation ]]></title>
        <description><![CDATA[ Storm-0501 ransomware targets hybrid clouds, CUPS vulnerability allows Linux RCE, AI models face sophisticated attacks, and Wiz discusses $15-20B valuation. CISOs navigate AI hype and technical debt. ]]></description>
        <link>https://mandos.io/newsletter/storm0501-hybrid-cloud-cups-vulnerability-ai-security/</link>
        <guid isPermaLink="false">66f7c5974e96150001839d3c</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 29 Sep 2024 18:00:12 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/09/39.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. </p><p>In this edition, I am covering:</p><ul><li>A newly discovered CUPS vulnerability affecting Linux systems</li><li>The increasing frequency and sophistication of adversarial attacks on AI models</li><li>Free practice exams for the (ISC)² Certified in Cybersecurity certification</li></ul><p>And much more.</p><p><strong>🎧 You can now listen to Mandos Brief in a form of a podcast, currently led by AI characters.</strong></p><div class="kg-card kg-audio-card"><img src="" alt="audio-thumbnail" class="kg-audio-thumbnail kg-audio-hide"><div class="kg-audio-thumbnail placeholder"><svg width="24" height="24" fill="none"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"></path></svg></div><div class="kg-audio-player-container"><audio src="https://mandos.io/content/media/2024/09/Brief--71-Storm-0501-Targets-Hybrid-Clouds--CUPS-RCE-Flaw--AI-Security-Challenges--Wiz-s--20B-Valuation.wav" preload="metadata"></audio><div class="kg-audio-title">Brief 71 Storm 0501 Targets Hybrid Clouds CUPS RCE Flaw AI Security Challenges Wizs 20B Valuation</div><div class="kg-audio-player"><button class="kg-audio-play-icon" aria-label="Play audio"><svg viewBox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"></path></svg></button><button class="kg-audio-pause-icon kg-audio-hide" aria-label="Pause audio"><svg viewBox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"></rect><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"></rect></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">603.08</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate" aria-label="Adjust playback speed">1×</button><button class="kg-audio-unmute-icon" aria-label="Unmute"><svg viewBox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"></path></svg></button><button class="kg-audio-mute-icon kg-audio-hide" aria-label="Mute"><svg viewBox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"></path></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><p><strong>How do you like the podcast format? Shall I keep it?</strong></p><ul><li><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/1?ref=mandos.io">👍 Valuable - Keep it</a></li><li><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/2?ref=mandos.io">🤔 Would prefer a real-person speaking</a></li><li><a href="https://a.feedletter.co/s/352a56ed-1dbd-49fd-9d63-f8ca507c4441/3?ref=mandos.io">👎 Not valuable - I prefer to read</a></li></ul><hr><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="cups-vulnerability-allows-remote-code-execution-on-linux-systems"><a href="https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/?ref=mandos.io">CUPS Vulnerability Allows Remote Code Execution on Linux Systems</a></h3>
<ul>
<li>
<p><strong>Simone Margaritelli</strong> discovered a vulnerability in the <strong>cups-browsed</strong> service, part of the CUPS printing system, that allows <strong>remote code execution</strong> on Linux systems by sending a malicious UDP packet to port 631.</p>
</li>
<li>
<p>The vulnerability stems from unsafe parsing of packet data, potential <strong>buffer overflows</strong> and <strong>race conditions</strong>, and the ability to leverage the <strong>foomatic-rip filter</strong> to execute arbitrary commands via the *FoomaticRIPCommandLine directive in printer PPD files.</p>
</li>
<li>
<p>While the researcher responsibly disclosed the findings, the <strong>disclosure process</strong> was challenging, with initial dismissals and prolonged debates about the severity of the issues, despite their widespread impact across Linux distributions.</p>
</li>
</ul>
<h3 id="storm-0501-ransomware-targets-hybrid-cloud-environments"><a href="https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/?ref=mandos.io">Storm-0501 Ransomware Targets Hybrid Cloud Environments</a></h3>
<ul>
<li>
<p>Microsoft warns that ransomware threat actor <strong>Storm-0501</strong> has recently switched tactics to target <strong>hybrid cloud environments</strong>, expanding its strategy to compromise all victim assets.</p>
</li>
<li>
<p>Storm-0501 gains initial access by exploiting <strong>vulnerabilities</strong> like CVE-2022-47966 (Zoho ManageEngine), CVE-2023-4966 (Citrix NetScaler), and possibly CVE-2023-29300 or CVE-2023-38203 (ColdFusion 2016), or using stolen credentials to move laterally and steal data.</p>
</li>
<li>
<p>The threat actor plants a persistent <strong>backdoor</strong> by creating a new federated domain within the Microsoft Entra tenant, allowing them to authenticate as any user, and deploys <strong>Embargo ransomware</strong> or maintains access for later.</p>
</li>
</ul>
<h3 id="north-korean-hackers-use-poisoned-python-packages-to-deliver-pondrat-malware"><a href="https://thehackernews.com/2024/09/new-pondrat-malware-hidden-in-python.html?m=1&ref=mandos.io">North Korean Hackers Use Poisoned Python Packages to Deliver PondRAT Malware</a></h3>
<ul>
<li>
<p>Palo Alto Networks Unit 42 researchers observed threat actors tied to North Korea using <strong>poisoned</strong> Python packages to deliver a new malware called <strong>PondRAT</strong>, a lighter version of the known <strong>POOLRAT</strong> macOS backdoor.</p>
</li>
<li>
<p>The attackers uploaded several malicious Python packages to <strong>PyPI</strong>, a popular repository, as part of Operation Dream Job, luring targets with fake job offers to trick them into downloading the malware.</p>
</li>
<li>
<p>The goal of the attacks, attributed to the Lazarus Group sub-cluster Gleaming Pisces, is believed to be gaining access to <strong>supply chain</strong> vendors' customers' endpoints through compromised <strong>developers</strong>' systems.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="lack-of-clarity-during-cyber-crises-leads-to-leadership-mistakes"><a href="https://www.darkreading.com/cyberattacks-data-breaches/allies-executives-boards-leverage-during-cyber-crisis?ref=mandos.io">Lack of Clarity During Cyber Crises Leads to Leadership Mistakes</a></h3>
<ul>
<li>
<p><strong>Breaches</strong> persist despite organizations' efforts to limit risk and exposure, and leaders continue to make mistakes during cyber crises due to lack of clarity on roles, responsibilities, and authority.</p>
</li>
<li>
<p>The biggest challenge facing crisis response teams is the limited time to gather, verify, and analyze information to make the best decisions, causing executives to fixate on shortening remediation time while overlooking risk reduction.</p>
</li>
<li>
<p>To minimize <strong>business</strong> and reputational impact, leaders must rely on guiding principles to define communication strategy, establish a secure crisis war room, categorize the event, define roles, and maintain constant communication with each line of <strong>business</strong>.</p>
</li>
</ul>
<h3 id="apac-cisos-face-challenges-in-becoming-true-business-leaders"><a href="https://www.forrester.com/blogs/who-is-your-ciso-understand-their-background-to-reduce-risk-and-bolster-trust/?ref=mandos.io">APAC CISOs Face Challenges in Becoming True Business Leaders</a></h3>
<ul>
<li>
<p>Forrester analysts Chiara Bragato and Jinan Budge analyzed the representation, career paths, and tenure of CISOs in top APAC companies. They found that despite extensive experience, many CISOs struggle to secure a spot in the <strong>executive</strong> suite.</p>
</li>
<li>
<p>The majority of APAC CISOs (69%) hold <strong>STEM</strong> degrees, but only 35% of master's degrees are MBAs. Many CISOs acquire certifications more suited to practitioners than senior executives.</p>
</li>
<li>
<p>Women face significant challenges in attaining and retaining CISO roles in APAC, accounting for only 9% of CISOs. The average male CISO has been in their role 34% longer than their female counterparts.</p>
</li>
</ul>
<h3 id="legacy-security-tools-and-practices-contribute-to-technical-debt-and-increased-risk"><a href="https://www.csoonline.com/article/3532475/when-technical-debt-strikes-the-security-stack.html?ref=mandos.io">Legacy Security Tools and Practices Contribute to Technical Debt and Increased Risk</a></h3>
<ul>
<li>
<p><strong>Srikumar Ramanathan</strong>, chief solutions officer at Mphasis, says common forms of security technical debt include overreliance on <strong>outdated security tools</strong>, inadequate <strong>security by design</strong>, and poor <strong>software development practices</strong>.</p>
</li>
<li>
<p><strong>Solution debt</strong> arises when the security stack lacks the controls or functional capabilities to keep up with managing risk in a modern IT environment and detecting the newest <strong>attacker behaviors</strong>, according to Maxime Lamothe-Brassard, CEO of LimaCharlie.</p>
</li>
<li>
<p><strong>Tool sprawl</strong> and integration debt occur when security departments suffer from both solution debt causing coverage gaps and rampant tool sprawl eating up budget, making it difficult to effectively use tools, as experienced by Andrew Kim, managing director and cyber strategy lead for Accenture Federal Services.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Improve Your Cybersecurity Leadership</span></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Join security leaders receiving the most critical insights, strategies, and resources to stay ahead in cybersecurity.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="certpreps-offers-free-practice-exams-for-isc%C2%B2-certified-in-cybersecurity-certification"><a href="https://certpreps.com/cc/?ref=mandos.io#1">CertPreps Offers Free Practice Exams for (ISC)² Certified in Cybersecurity Certification</a></h3>
<ul>
<li>
<p>CertPreps, is offering <strong>free practice exams</strong> for their Certified in Cybersecurity certification.</p>
</li>
<li>
<p>The practice exams, while not containing actual exam questions, are designed to closely simulate the real test and significantly increase candidates' <strong>readiness</strong> and <strong>preparedness</strong>.</p>
</li>
<li>
<p>(ISC)² recommends that candidates who can comfortably score 70% or higher on these practice exams will be well-prepared to <strong>pass</strong> the official Certified in Cybersecurity <strong>certification exam</strong>.</p>
</li>
</ul>
<h3 id="10-tips-for-cybersecurity-professionals-to-get-published-regularly"><a href="https://www.darkreading.com/cybersecurity-operations/how-to-get-published-regularly?ref=mandos.io">10 Tips for Cybersecurity Professionals to Get Published Regularly</a></h3>
<ul>
<li>
<p><strong>Josh Sokol</strong>, the author, says writing well on a regular basis takes a lot of effort and there are no shortcuts - aspiring writers need to set aside dedicated time.</p>
</li>
<li>
<p>Finding <strong>creative</strong> angles to approach security topics and taking inspiration from the world around you can help generate fresh material to write about regularly.</p>
</li>
<li>
<p>Writers should know their <strong>audience</strong>, speak their language, provide <strong>practical</strong> and actionable takeaways, stay focused despite distractions, and follow through to create finished pieces that deliver value to readers.</p>
</li>
</ul>
<h3 id="cybersecurity-professional-shares-salary-and-career-advice-on-reddit"><a href="https://www.reddit.com/r/Salary/comments/1fq7prq/29_cybersecurity_i_would_highly_recommend_this/?ref=mandos.io">Cybersecurity Professional Shares Salary and Career Advice on Reddit</a></h3>
<ul>
<li>
<p><strong>Redditor</strong>, a 29-year-old cybersecurity professional, shares their $220k salary and recommends the field to others.</p>
</li>
<li>
<p>Emphasizes the importance of having a strong foundation in <strong>IT</strong> and <strong>networking</strong> fundamentals, along with hands-on experience through homelabs or in the field.</p>
</li>
<li>
<p>Suggests pursuing a <strong>Computer Science</strong> degree with a minor in cybersecurity, and highlights the value of certifications like <strong>Security+</strong>, <strong>Network+</strong>, CEH, and Pentest+, while cautioning against attempting advanced certs like CISSP or OSCP without sufficient experience.</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="adversarial-attacks-on-ai-models-becoming-more-frequent-and-sophisticated"><a href="https://venturebeat.com/security/adversarial-attacks-on-ai-models-are-rising-what-should-you-do-now/?ref=mandos.io">Adversarial Attacks on AI Models Becoming More Frequent and Sophisticated</a></h3>
<ul>
<li>
<p>A recent Gartner survey found that 73% of enterprises have hundreds or thousands of <strong>AI models</strong> deployed, and 41% reported experiencing an AI <strong>security incident</strong>, including <strong>adversarial attacks</strong> targeting ML models.</p>
</li>
<li>
<p>Adversarial attacks exploit weaknesses in data integrity and ML model robustness, with types including <strong>data poisoning</strong>, evasion attacks, model inversion, and model stealing, posing risks to sectors like finance, healthcare, and autonomous vehicles.</p>
</li>
<li>
<p>The growing complexity of <strong>network environments</strong> demands more sophisticated ML techniques, creating new vulnerabilities for attackers to exploit, with adversarial ML attacks on network security reaching epidemic levels according to researchers.</p>
</li>
</ul>
<h3 id="ai-in-cybersecurity-navigating-the-hype-and-reality"><a href="https://www.helpnetsecurity.com/2024/09/26/cisos-ai-use/?ref=mandos.io">AI in Cybersecurity: Navigating the Hype and Reality</a></h3>
<ul>
<li>
<p><strong>Alon Shwartz, the author, suggests that</strong> the recent downturn in tech stocks, particularly those heavily invested in AI, underscores the mounting pressure on CISOs to demonstrate that AI can deliver measurable results in cybersecurity.</p>
</li>
<li>
<p>CISOs must ask critical questions before integrating AI into their cybersecurity strategies, such as determining where AI can have the greatest impact, relying on proven use cases like <strong>UEBA</strong>, and ensuring access to high-quality data.</p>
</li>
<li>
<p>AI may not yet be the best solution for immature or emerging <strong>attack surfaces</strong> like <strong>APIs</strong>, where fundamental security practices may still be evolving, and the lack of reliable data can hinder AI's effectiveness.</p>
</li>
</ul>
<h3 id="aws-releases-methodology-for-incident-response-on-generative-ai-workloads"><a href="https://aws.amazon.com/blogs/security/methodology-for-incident-response-on-generative-ai-workloads/?ref=mandos.io">AWS Releases Methodology for Incident Response on Generative AI Workloads</a></h3>
<ul>
<li>
<p>The AWS Customer Incident Response Team (CIRT) has developed a methodology for investigating <strong>security incidents</strong> involving <strong>generative AI</strong> applications, building on their existing Security Incident Response Guide.</p>
</li>
<li>
<p>Generative AI workloads include components like <strong>foundation models</strong>, custom models, guardrails, agents, knowledge bases, training data, and plugins, which require additional considerations during incident response.</p>
</li>
<li>
<p>The new methodology consists of seven elements to consider when triaging and responding: access, <strong>infrastructure changes</strong>, AI changes, data store changes, <strong>invocation</strong>, private data, and agency.</p>
</li>
</ul>

<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p></p><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-analysis" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET ANALYSIS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="torq-raises-70m-to-accelerate-adoption-of-ai-powered-security-automation"><a href="https://www.securityweek.com/torq-secures-70m-series-c-for-hypersoc/?ref=mandos.io">Torq Raises $70M to Accelerate Adoption of AI-Powered Security Automation</a></h3>
<ul>
<li>
<p><strong>Torq</strong>, a New York-based startup, has raised $70 million in a Series C funding round led by Evolution Equity Partners, bringing the total raised to $192 million.</p>
</li>
<li>
<p>The company's flagship product, <strong>Torq HyperSOC</strong>, uses <strong>AI</strong> and natural language processing to automate threat investigation, triage, and <strong>remediation</strong> for enterprise security teams.</p>
</li>
<li>
<p>Torq has found traction with high-profile enterprise clients, including Procter &amp; Gamble, PepsiCo, and Siemens, aiming to alleviate alert fatigue and resource constraints in security operations.</p>
</li>
</ul>
<h3 id="wiz-discusses-share-sale-at-15-20-billion-valuation"><a href="https://finance.yahoo.com/news/wiz-talks-sell-shares-valuation-225104083.html?ref=mandos.io">Wiz Discusses Share Sale at $15-20 Billion Valuation</a></h3>
<ul>
<li>
<p>According to people with knowledge of the matter, <strong>cybersecurity startup</strong> Wiz Inc. is in discussions to sell existing shares at a valuation ranging from $15 billion to $20 billion.</p>
</li>
<li>
<p>The potential transaction would allow existing shareholders to tender $500 million to $700 million of their holdings, and Wiz may also raise money directly from <strong>investors</strong>.</p>
</li>
<li>
<p>In July, Wiz turned down a $23 billion <strong>acquisition</strong> offer from Google, deciding it could ultimately be worth more as a public company and expressing concerns about a lengthy <strong>regulatory approval</strong> process.</p>
</li>
</ul>
<h3 id="tamnoon-secures-12m-series-a-funding-for-managed-cloud-security-remediation"><a href="https://fintech.global/2024/09/25/tamnoon-secures-12m-series-a-for-pioneering-hybrid-human-ai-cloud-security-service/?ref=mandos.io">Tamnoon Secures $12M Series A Funding for Managed Cloud Security Remediation</a></h3>
<ul>
<li>
<p><strong>Tamnoon</strong>, a leader in <strong>Managed Cloud Security Remediation</strong>, has secured $12 million in Series A funding led by <strong>Bright Pixel Capital</strong>, with participation from new investors Blu Ventures and Mindset Ventures, as well as existing backers.</p>
</li>
<li>
<p>Tamnoon's unique hybrid <strong>human-AI</strong> managed service is specifically designed for cloud security remediation, integrating artificial intelligence with human intelligence to provide a scalable, expert-guided remediation process without disrupting <strong>business operations</strong>.</p>
</li>
<li>
<p>The funding will be used to accelerate Tamnoon's product roadmap, expand its partnership ecosystem, and drive innovation in managed cloud security remediation, with the company aiming to reduce critical cloud exposures by 90% within 90 days of deployment.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the most critical cybersecurity news, insights, and strategies delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="rudder"><a href="https://cybersectools.com/tools/rudder?ref=mandos.io">Rudder</a></h3>
<p>Rudder is an IT infrastructure automation platform that simplifies the management of hybrid infrastructure through configuration, patch, and security management.</p>
<h3 id="crossc2"><a href="https://cybersectools.com/tools/crossc2?ref=mandos.io">CrossC2</a></h3>
<p>CrossC2 is a tool used to generate CobaltStrike's cross-platform payloads, facilitating operations across different operating systems.</p>
<h3 id="honeyd-tools"><a href="https://cybersectools.com/tools/honeyd-tools?ref=mandos.io">Honeyd Tools</a></h3>
<p>There are several tools that can be used in conjunction with Honeyd, for data analysis or for other purposes.</p>
<hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io"><strong>LinkedIn</strong></a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io"><strong>BlueSky</strong></a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io"><strong>Mastodon</strong></a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Brief #70: China&#x27;s 260K-Device Botnet Thwarted, SolarWinds RCE Flaw, macOS Zero-Click Exploit, AI in Compliance ]]></title>
        <description><![CDATA[ FBI dismantles massive China-backed botnet, SolarWinds patches critical RCE flaw, zero-click macOS vulnerability discovered, and AI revolutionizes compliance monitoring. ]]></description>
        <link>https://mandos.io/newsletter/china-botnet-solarwinds-macos-exploit-ai-compliance/</link>
        <guid isPermaLink="false">66efbdf3335f170001d04b48</guid>
        <category><![CDATA[ Brief ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Sun, 22 Sep 2024 17:00:09 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/09/38.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Happy Sunday!</p><p>I hope this Brief finds you well and ready to tackle the week ahead. In this edition, I am covering:</p><ul><li>FBI's successful takedown of a massive China-backed botnet</li><li>A comprehensive guide for choosing the right Security Operations Center model</li><li>The importance of skills-based hiring in addressing the AppSec talent gap</li></ul><p>And much more.</p><hr><blockquote>Your feedback shapes Mandos Brief and I'd love to hear your thoughts about the content I share. </blockquote>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<hr><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Industry-News-1.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Industry-News-1.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Industry-News-1.png 1000w, https://mandos.io/content/images/2024/09/Industry-News-1.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="industry-news" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">INDUSTRY NEWS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="fbi-and-partners-thwart-china-backed-260000-device-botnet"><a href="https://www.theregister.com/2024/09/18/fbi_flax_typhoon_ransomware/?ref=mandos.io">FBI and Partners Thwart China-Backed 260,000-Device Botnet</a></h3>
<ul>
<li>
<p><strong>FBI Director Christopher Wray</strong> revealed that a China-backed group called Flax Typhoon had built a 260,000-device <strong>botnet</strong> since 2021, targeting US critical infrastructure, government, and academics.</p>
</li>
<li>
<p>The FBI's <strong>Cyber National Mission Force (CNMF)</strong> and the <strong>NSA</strong> took control of the botnet's command and control servers, withstanding a <strong>DDoS attack</strong> and preventing the Chinese team from regaining control, ultimately leading to the botnet's abandonment.</p>
</li>
<li>
<p>The botnet utilized customized <strong>Mirai malware</strong> to exploit vulnerabilities in internet-connected devices, with an SQL database containing 1.2 million records on compromised devices and over 80 subdomains linked to the command-and-control servers.</p>
</li>
</ul>
<h3 id="solarwinds-patches-critical-rce-flaw-in-access-rights-manager"><a href="https://www.securityweek.com/solarwinds-patches-critical-vulnerability-in-access-rights-manager/?ref=mandos.io">SolarWinds Patches Critical RCE Flaw in Access Rights Manager</a></h3>
<ul>
<li>
<p>SolarWinds has released patches for two vulnerabilities in its Active Directory and Azure AD user provisioning tool Access Rights Manager, including a <strong>critical</strong> CVE-2024-28991 (CVSS score 9.0) that could allow <strong>remote code execution</strong>.</p>
</li>
<li>
<p>Trend Micro's Zero Day Initiative, which reported the issues, explains that CVE-2024-28991 is a <strong>deserialization</strong> of untrusted data flaw allowing an <strong>authenticated</strong> attacker to execute code as SYSTEM and bypass authentication.</p>
</li>
<li>
<p>The second vulnerability, CVE-2024-28990, is a <strong>hardcoded credential</strong> flaw that could allow an attacker to bypass authentication and access the RabbitMQ management console.</p>
</li>
</ul>
<h3 id="malware-abuses-browser-kiosk-mode-to-steal-google-credentials"><a href="https://www.bleepingcomputer.com/news/security/malware-locks-browser-in-kiosk-mode-to-steal-google-credentials/?ref=mandos.io">Malware Abuses Browser Kiosk Mode to Steal Google Credentials</a></h3>
<ul>
<li>
<p>OALABS researchers discovered a malware campaign that locks users in their browser's <strong>kiosk mode</strong> on Google's login page, blocking the "ESC" and "F11" keys, to frustrate them into entering and saving their Google credentials.</p>
</li>
<li>
<p>Once credentials are saved, the <strong>StealC</strong> information-stealing malware steals them from the credential store and sends them back to the attacker. This attack method has been used in the wild since at least August 22, 2024, mainly by <strong>Amadey</strong>, a malware loader, info-stealer, and system reconnaissance tool.</p>
</li>
<li>
<p>To exit the kiosk mode, users should avoid entering sensitive information and try hotkey combos like 'Alt + F4', 'Ctrl + Shift + Esc', 'Ctrl + Alt +Delete', 'Alt +Tab', or perform a <strong>hard reset</strong>. Running a full antivirus scan in Safe Mode is recommended to remove the malware.</p>
</li>
</ul>
<h3 id="cloudimposer-potential-rce-vulnerability-in-google-cloud-platform"><a href="https://www.tenable.com/blog/cloudimposer-executing-code-on-millions-of-google-servers-with-a-single-malicious-package?ref=mandos.io">CloudImposer: Potential RCE Vulnerability in Google Cloud Platform</a></h3>
<ul>
<li>
<p><strong>Tenable Research</strong> discovered an RCE vulnerability dubbed <strong>CloudImposer</strong> that could have allowed attackers to run code on millions of <strong>Google Cloud Platform (GCP)</strong> servers and customer servers, potentially leading to a massive <strong>supply chain attack</strong>.</p>
</li>
<li>
<p>The affected GCP services include <strong>App Engine</strong>, <strong>Cloud Function</strong>, and <strong>Cloud Composer</strong>. Documentation from GCP and the Python Software Foundation could have put customers at risk of a <strong>dependency confusion</strong> attack.</p>
</li>
<li>
<p>Supply chain attacks in the cloud are exponentially more harmful than on-premises, as one malicious package can be deployed to millions of users. Users should analyze their package installation process, specifically the <strong>"--extra-index-url"</strong> argument in <strong>Python</strong>, to prevent breaches.</p>
</li>
</ul>
<h3 id="zero-click-vulnerability-chain-in-macos-calendar-allows-access-to-sensitive-photos-data"><a href="https://mikko-kenttala.medium.com/zero-click-calendar-invite-critical-zero-click-vulnerability-chain-in-macos-a7a434fc887b?ref=mandos.io">Zero-Click Vulnerability Chain in macOS Calendar Allows Access to Sensitive Photos Data</a></h3>
<ul>
<li>
<p>Security researcher Mikko Kenttälä discovered a <strong>zero-click vulnerability</strong> in macOS Calendar that allows an attacker to add or delete arbitrary files within the Calendar sandbox environment.</p>
</li>
<li>
<p>By exploiting the vulnerability during a macOS version upgrade process, an attacker can gain <strong>remote code execution (RCE)</strong> capabilities without any user interaction by injecting malicious files via calendar invites.</p>
</li>
<li>
<p>The exploit chain abuses the <strong>Photos app</strong> configuration to gain access to the user's sensitive <strong>iCloud Photos</strong> data, bypassing <strong>TCC protections</strong>, and demonstrating the potential impact of the vulnerabilities.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Leadership-Insights.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Leadership-Insights.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Leadership-Insights.png 1000w, https://mandos.io/content/images/2024/09/Leadership-Insights.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="leadership-insights" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">LEADERSHIP INSIGHTS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="choosing-a-security-operations-center-in-house-hybrid-or-outsourced"><a href="https://mandos.io/blog/securing-your-enterprise-in-house-soc-vs-hybrid-vs-outsourced/">Choosing a Security Operations Center: In-House, Hybrid, or Outsourced</a></h3>
<ul>
<li>
<p>I have written a guide to help <strong>cybersecurity</strong> leaders decide between in-house, hybrid, or outsourced <strong>Security Operations Center (SOC)</strong> models, covering 7 major steps.</p>
</li>
<li>
<p>Key steps include conducting a <strong>risk assessment</strong> to understand the environment, threats and potential business impact, defining security goals around monitoring, <strong>compliance</strong>, response time and user training, and evaluating costs of different SOC models.</p>
</li>
<li>
<p>In this guide I also recommend assessing the <strong>skills</strong> required for an effective SOC, including cyber threat analysis, incident response, threat hunting, network and cloud security, security engineering, automation and scripting abilities.</p>
</li>
</ul>
<h3 id="secure-by-design-whitepaper-highlights-key-considerations-for-building-secure-products"><a href="https://d1.awsstatic.com/partner-network/AWS-SANS-Secure-by-Design-Whitepaper-2024.pdf?ref=mandos.io">Secure by Design Whitepaper Highlights Key Considerations for Building Secure Products</a></h3>
<ul>
<li>
<p><strong>SANS Institute</strong> whitepaper "Building Security from the Ground up with Secure by Design" explores how to integrate <strong>Secure by Design (SbD)</strong> principles into product development to mitigate vulnerabilities early and recognize security as a core business requirement.</p>
</li>
<li>
<p>Key considerations include integrating SbD into the <strong>software development lifecycle (SDLC)</strong>, supporting SbD with <strong>automation</strong>, reinforcing <strong>defense-in-depth</strong>, applying SbD to <strong>artificial intelligence (AI)</strong>, identifying threats early with <strong>threat modeling</strong>, using SbD to simplify <strong>compliance</strong>, and establishing a culture of security.</p>
</li>
<li>
<p>The whitepaper provides five action items to help organizations get started on the journey to SbD, which is an iterative process that aims to reduce the cybersecurity burden by developing foundationally secure products from the ground up.</p>
</li>
</ul>
<h3 id="boards-need-to-understand-their-role-in-cybersecurity-governance"><a href="https://www.cio.com/article/3523667/do-boards-understand-their-new-role-in-cybersecurity.html?amp=1&ref=mandos.io">Boards Need to Understand Their Role in Cybersecurity Governance</a></h3>
<ul>
<li>
<p>Julie Ragland, former CIO of Navistar, says boards often fall into the trap of thinking <strong>cybersecurity</strong> is a purely <strong>technical</strong> issue, focusing too much on tools and protections while missing key areas of responsibility.</p>
</li>
<li>
<p>Ragland emphasizes that boards need to understand their role in <strong>investment prioritization</strong> and <strong>incident response</strong> behaviors, which are not technical but critical for effective cybersecurity governance.</p>
</li>
<li>
<p>To educate boards, CIOs should provide external assessments of cyber recovery plans, penetration testing results, and focus on business risks and how IT contributes to protecting the organization, rather than giving technical presentations.</p>
</li>
</ul>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">Stay Ahead in Cybersecurity!</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the week's top cybersecurity news and insights in 8 minutes or less</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Career-Development.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Career-Development.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Career-Development.png 1000w, https://mandos.io/content/images/2024/09/Career-Development.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="career-development" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">CAREER DEVELOPMENT</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="skills-based-hiring-key-to-filling-appsec-talent-gap"><a href="https://securityboulevard.com/2024/09/why-breaking-into-cybersecurity-isnt-as-easy-as-you-think/?ref=mandos.io">Skills-Based Hiring Key to Filling AppSec Talent Gap</a></h3>
<ul>
<li>
<p>Tanya Janca, an AppSec program director, says many companies still require <strong>college degrees</strong> for entry-level positions, despite calls for skills-based hiring from the National Cyber Director.</p>
</li>
<li>
<p>Entry-level AppSec job postings often list impossible requirements like <strong>CISSP certification</strong>, which requires five years of security experience, creating misaligned expectations.</p>
</li>
<li>
<p>Companies struggle to accurately define AppSec roles, covering areas from <strong>tools</strong> and <strong>architecture</strong> to monitoring and <strong>incident response</strong>, leading to hiring freezes until they determine their focus.</p>
</li>
</ul>
<h3 id="must-read-books-for-cybersecurity-professionals"><a href="https://www.reddit.com/r/cybersecurity/comments/1fig40m/whats_a_must_read_book_for_cyber_security/?share_id=4U-hQYA1l7tFz-D9DDb5K&utm_content=1&utm_medium=ios_app&utm_name=ioscss&utm_source=share&utm_term=1">Must-Read Books for Cybersecurity Professionals</a></h3>
<ul>
<li>
<p><strong>Cliff Stoll's</strong> "The Cuckoo's Egg" is widely considered essential reading for cybersecurity professionals, according to Reddit users.</p>
</li>
<li>
<p>Other highly recommended books include "Security Engineering" by <strong>Ross Anderson</strong>, "How to Measure Anything" by <strong>Douglas W. Hubbard</strong>, and "This Is How They Tell Me the World Ends" by <strong>Nicole Perlroth</strong>, which delves into the history of <strong>zero-days</strong>.</p>
</li>
<li>
<p>Books by <strong>Kevin Mitnick</strong>, such as "The Art of Invisibility", "The Art of Deception", and "Ghost in the Wires", are also popular suggestions, with Mitnick being referred to as "The OG" of cybersecurity.</p>
</li>
</ul>
<h3 id="cisco-conducts-second-round-of-layoffs-in-2024-impacting-thousands"><a href="https://techcrunch.com/2024/09/17/ciscos-second-layoff-of-2024-affect-thousands-of-employees/?ref=mandos.io">Cisco Conducts Second Round of Layoffs in 2024, Impacting Thousands</a></h3>
<ul>
<li>
<p><strong>Cisco</strong>, the U.S. tech giant, has announced its second <strong>layoff</strong> of 2024, letting go of approximately 5,600 employees, or 7% of its workforce.</p>
</li>
<li>
<p>The company refused to disclose who was affected by the layoffs until September 16, creating a "<strong>toxic environment</strong>" according to one employee, and the layoffs also impacted the <strong>Talos Security</strong> unit.</p>
</li>
<li>
<p>Despite Cisco citing 2024 as its "second strongest year on record" with nearly $54 billion in <strong>annual revenue</strong>, and CEO Chuck Robbins earning close to $32 million in 2023, the company stated that the layoffs would allow for investment in "key growth opportunities" and drive "efficiencies."</p>
</li>
</ul>
<!--members-only--><div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/AI---Security.png" srcset="https://mandos.io/content/images/size/w600/2024/09/AI---Security.png 600w, https://mandos.io/content/images/size/w1000/2024/09/AI---Security.png 1000w, https://mandos.io/content/images/2024/09/AI---Security.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="ai-amp-security" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">AI &amp; SECURITY</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="linkedin-opts-users-into-ai-training-without-consent-offers-opt-out"><a href="https://www.theverge.com/2024/9/18/24248471/linkedin-ai-training-user-accounts-data-opt-in?ref=mandos.io">LinkedIn Opts Users into AI Training Without Consent, Offers Opt-Out</a></h3>
<ul>
<li>
<p><strong>LinkedIn</strong> has opted accounts into training <strong>generative AI models</strong> without asking, according to reports from 404Media and TechCrunch, before updating its privacy policy.</p>
</li>
<li>
<p>The updated policy states that LinkedIn may use personal data to improve, develop, and provide products and services, develop and train <strong>AI models</strong>, and gain insights with the help of AI, automated systems, and inferences.</p>
</li>
<li>
<p>Users can opt out of having their data used for generative AI training by turning off the "Data for Generative AI Improvement" toggle in their account settings, but this does not affect training that has already taken place or other <strong>machine learning</strong> tools used for personalization and moderation.</p>
</li>
</ul>
<h3 id="xbow-releases-unique-benchmarks-to-test-ai-offensive-capabilities"><a href="https://xbow.com/blog/benchmarks/?ref=mandos.io">XBOW Releases Unique Benchmarks to Test AI Offensive Capabilities</a></h3>
<ul>
<li>
<p>Nico Waisman, Head of Security at XBOW, discusses the challenges CISOs face in evaluating security products amidst inflated claims and hype, especially in the AI domain.</p>
</li>
<li>
<p>XBOW engaged pentesting companies to develop 104 novel benchmarks that closely replicate various classes of real-life vulnerabilities, such as <strong>SQL Injections</strong>, <strong>IDOR</strong>, and <strong>SSRF</strong>, ensuring the AI system generates new ideas instead of regurgitating memorized examples.</p>
</li>
<li>
<p>The benchmarks, designed for testing both offensive tools and human experts, revealed that XBOW achieved an impressive <strong>85% success rate</strong>, equivalent to an experienced <strong>pentester's</strong> performance within a week, and are now being made public for others to utilize and build upon while respecting the included canary string.</p>
</li>
</ul>
<h3 id="security-lake-and-amazon-q-enable-generative-ai-for-security-observability"><a href="https://aws.amazon.com/blogs/security/create-security-observability-using-generative-ai-with-security-lake-and-amazon-q-in-quicksight/?ref=mandos.io">Security Lake and Amazon Q Enable Generative AI for Security Observability</a></h3>
<ul>
<li>
<p>AWS announced a serverless solution for querying security data in Amazon Security Lake using natural language with Amazon Q in QuickSight, enabling use cases like generating visualizations and querying vulnerability data.</p>
</li>
<li>
<p>Security Lake centralizes security data from AWS, SaaS, on-premises, and cloud sources into a data lake stored in your AWS account, converting it to Apache Parquet format and the Open Cybersecurity Schema Framework (OCSF).</p>
</li>
<li>
<p>The solution architecture uses Security Lake for ingestion, Athena views for defining interesting fields, QuickSight datasets for analysis, and Amazon Q topics for natural language querying, requiring specific prerequisites and IAM permissions.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/Market-Analysis.png" srcset="https://mandos.io/content/images/size/w600/2024/09/Market-Analysis.png 600w, https://mandos.io/content/images/size/w1000/2024/09/Market-Analysis.png 1000w, https://mandos.io/content/images/2024/09/Market-Analysis.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="market-analysis" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">MARKET ANALYSIS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="sedric-ai-secures-185m-series-a-to-expand-ai-powered-compliance-platform"><a href="https://www.fintechfutures.com/2024/09/llm-powered-compliance-platform-sedric-ai-secures-18-5m-series-a/?ref=mandos.io">Sedric AI Secures $18.5M Series A to Expand AI-Powered Compliance Platform</a></h3>
<ul>
<li>
<p>Sedric AI, a New York-based <strong>regtech</strong>, has raised $18.5 million in a Series A funding round led by Foundation Capital, with participation from existing investors StageOne Ventures and The Garage, and new investor Amex Ventures.</p>
</li>
<li>
<p>The Sedric platform uses <strong>large language models (LLMs)</strong> to help financial institutions manage regulatory <strong>compliance</strong>, risk, and communication monitoring across multiple channels and customer touchpoints.</p>
</li>
<li>
<p>With a total of $22 million in funding, Sedric plans to develop its AI lab in Tel Aviv and expand its global go-to-market teams, having seen a fivefold increase in <strong>revenue</strong> over the last 12 months.</p>
</li>
</ul>
<h3 id="sase-market-growth-slows-impacting-cybersecurity-stocks"><a href="https://www.investors.com/news/technology/cybersecurity-stocks-zscaler-palo-alto-face-slowdown-sase-market/?ref=mandos.io">SASE Market Growth Slows, Impacting Cybersecurity Stocks</a></h3>
<ul>
<li>
<p>According to a report by <strong>Dell'Oro Group</strong>, the Secure Access Service Edge (SASE) market growth has slowed down in the June quarter, climbing 9.7% to $2.3 billion compared to a 37% jump in the year-earlier period.</p>
</li>
<li>
<p>Despite the slowdown due to economic uncertainty, Dell'Oro analyst Mauricio Sanchez anticipates a rebound in the coming year as enterprises shift focus to long-term investments in <strong>cloud-based security</strong> and networking solutions, with single-vendor SASE solutions emerging as a clear winner.</p>
</li>
<li>
<p>The SASE market, which combines <strong>Security Service Edge (SSE)</strong> and <strong>SD-WAN</strong> technologies, has major players including <strong>Zscaler</strong>, <strong>Palo Alto Networks</strong>, Cisco Systems, Broadcom, Fortinet, and Netskope, with their stocks being impacted by the market slowdown.</p>
</li>
</ul>
<h3 id="crowdstrike-aws-and-nvidia-launch-cybersecurity-startup-accelerator-program"><a href="https://cxotoday.com/press-release/crowdstrike-expands-cybersecurity-startup-accelerator-with-aws-and-nvidia-to-support-the-next-generation-of-global-cloud-security-companies/?ref=mandos.io">CrowdStrike, AWS, and NVIDIA Launch Cybersecurity Startup Accelerator Program</a></h3>
<ul>
<li>
<p>CrowdStrike, in partnership with Amazon Web Services (AWS) and NVIDIA, announced the launch of their second annual Cybersecurity Startup Accelerator program to support disruptive startups in the U.S. and EMEA with mentorship, technical expertise, funding, and go-to-market opportunities.</p>
</li>
<li>
<p>Selected startups will participate in a free eight-week program offering mentorship from industry experts, access to global <strong>cybersecurity</strong> investors, up to $25,000 in AWS Activate credits, and the opportunity to present at an in-person Demo Day during the <strong>RSA Conference</strong> in April 2025.</p>
</li>
<li>
<p>The program aims to cultivate the next generation of <strong>cloud security</strong> companies by leveraging the expertise of market-leading cybersecurity (<strong>CrowdStrike</strong>), cloud (AWS), and <strong>AI</strong> (NVIDIA) providers, with potential funding from the CrowdStrike Falcon Fund for winning presentations.</p>
</li>
</ul>
<div class="kg-card kg-header-card kg-v2 kg-width-regular " data-background-color="#000000">
            
            <picture><img class="kg-header-card-image" src="https://mandos.io/content/images/2024/09/TOOLS.png" srcset="https://mandos.io/content/images/size/w600/2024/09/TOOLS.png 600w, https://mandos.io/content/images/size/w1000/2024/09/TOOLS.png 1000w, https://mandos.io/content/images/2024/09/TOOLS.png 1200w" loading="lazy" alt=""></picture>
        
            <div class="kg-header-card-content">
                
                <div class="kg-header-card-text kg-align-center">
                    <h2 id="tools" class="kg-header-card-heading" style="color: #FFFFFF;" data-text-color="#FFFFFF"><span style="white-space: pre-wrap;">TOOLS</span></h2>
                    
                    
                </div>
            </div>
        </div><h3 id="packetstreamer"><a href="https://cybersectools.com/tools/packetstreamer?ref=mandos.io">PacketStreamer</a></h3>
<p>High-performance remote packet capture and collection tool used for forensic analysis in cloud workloads.</p>
<h3 id="credstash"><a href="https://cybersectools.com/tools/credstash?ref=mandos.io">CredStash</a></h3>
<p>CredStash is a tool used for managing and securely storing credentials, requiring installation of dependencies and setup of a key in AWS KMS, with specific Linux installation instructions available.</p>
<h3 id="airiam"><a href="https://cybersectools.com/tools/airiam?ref=mandos.io">AirIAM</a></h3>
<p>AirIAM is an AWS IAM to least privilege Terraform execution framework that compiles AWS IAM usage and leverages that data to create a least-privilege IAM Terraform that replaces the exiting IAM management method.</p>
<div class="kg-card kg-signup-card kg-width-regular " data-lexical-signup-form="" style="background-color: #04051F; display: none;">
            
            <div class="kg-signup-card-content">
                
                <div class="kg-signup-card-text ">
                    <h2 class="kg-signup-card-heading" style="color: #FFFFFF;"><b><strong style="white-space: pre-wrap;">🔔 Want to stay ahead in cybersecurity?</strong></b></h2>
                    <p class="kg-signup-card-subheading" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">Get the latest developments, security tools, market updates and resources delivered to your inbox every week.</span></p>
                    
        <form class="kg-signup-card-form" data-members-form="signup">
            <input data-members-label="" type="hidden" value="From Brief">
            <div class="kg-signup-card-fields">
                <input class="kg-signup-card-input" id="email" data-members-email="" type="email" required="true" placeholder="Your email">
                <button class="kg-signup-card-button kg-style-accent" style="color: #FFFFFF;" type="submit">
                    <span class="kg-signup-card-button-default">Sign up</span>
                    <span class="kg-signup-card-button-loading"><svg xmlns="http://www.w3.org/2000/svg" height="24" width="24" viewBox="0 0 24 24">
        <g stroke-linecap="round" stroke-width="2" fill="currentColor" stroke="none" stroke-linejoin="round" class="nc-icon-wrapper">
            <g class="nc-loop-dots-4-24-icon-o">
                <circle cx="4" cy="12" r="3"></circle>
                <circle cx="12" cy="12" r="3"></circle>
                <circle cx="20" cy="12" r="3"></circle>
            </g>
            <style data-cap="butt">
                .nc-loop-dots-4-24-icon-o{--animation-duration:0.8s}
                .nc-loop-dots-4-24-icon-o *{opacity:.4;transform:scale(.75);animation:nc-loop-dots-4-anim var(--animation-duration) infinite}
                .nc-loop-dots-4-24-icon-o :nth-child(1){transform-origin:4px 12px;animation-delay:-.3s;animation-delay:calc(var(--animation-duration)/-2.666)}
                .nc-loop-dots-4-24-icon-o :nth-child(2){transform-origin:12px 12px;animation-delay:-.15s;animation-delay:calc(var(--animation-duration)/-5.333)}
                .nc-loop-dots-4-24-icon-o :nth-child(3){transform-origin:20px 12px}
                @keyframes nc-loop-dots-4-anim{0%,100%{opacity:.4;transform:scale(.75)}50%{opacity:1;transform:scale(1)}}
            </style>
        </g>
    </svg></span>
                </button>
            </div>
            <div class="kg-signup-card-success" style="color: #FFFFFF;">
                Email sent! Check your inbox to complete your signup.
            </div>
            <div class="kg-signup-card-error" style="color: #FFFFFF;" data-members-error=""></div>
        </form>
        
                    <p class="kg-signup-card-disclaimer" style="color: #FFFFFF;"><span style="white-space: pre-wrap;">I will never spam or sell your information.</span></p>
                </div>
            </div>
        </div><hr><h3 id="before-you-go">Before you go</h3><p>If you found this newsletter useful, I'd really appreciate if you could forward it to your community and share your feedback below!</p>
<!--kg-card-begin: html-->
 <div id="feedletter-widget"></div> <script> var feedletterFormId ='d4d10dba-aa1b-45e4-ad75-aadf8bc796e1' </script> <script type="text/javascript" defer src="https://feedletter.co/embed/widget.js"></script> 
<!--kg-card-end: html-->
<p>For more frequent cybersecurity leadership insights and tips, follow me on <a href="https://www.linkedin.com/in/nikolozk/?ref=mandos.io">LinkedIn</a>,&nbsp;<a href="https://bsky.app/profile/nikolozk.bsky.social?ref=mandos.io">BlueSky</a>&nbsp;and&nbsp;<a href="https://infosec.exchange/@nikolozk?ref=mandos.io">Mastodon</a>.<br><br>Best,&nbsp;<br>Nikoloz</p> ]]></content:encoded>
    </item>
    <item>
        <title><![CDATA[ Choosing a Security Operations Center: In-House, Hybrid, or Outsourced ]]></title>
        <description><![CDATA[ Struggling to choose between an in-house, hybrid or outsourced Security Operations Center (SOC)? This guide helps you weigh pros, cons, costs, and business goals to make an informed decision. ]]></description>
        <link>https://mandos.io/blog/securing-your-enterprise-in-house-soc-vs-hybrid-vs-outsourced/</link>
        <guid isPermaLink="false">650c223facd5050001a5f5a5</guid>
        <category><![CDATA[ Cybersecurity ]]></category>
        <dc:creator><![CDATA[ Nikoloz Kokhreidze ]]></dc:creator>
        <pubDate>Tue, 17 Sep 2024 12:00:50 +0200</pubDate>
        <media:content url="https://mandos.io/content/images/2024/09/SOC-inhouse-vs-outsourced.png" medium="image"/>
        <content:encoded><![CDATA[ <p>Are you struggling to decide between an in-house Security Operations Center (SOC), hybrid, and outsourcing? This critical decision impacts your organization's cybersecurity posture and operations. In this guide, I will walk you through the steps to help you decide which option is the best for your use case.</p><h1 id="what-is-the-security-operations-center-soc">What is the Security Operations Center (SOC)?</h1><p>Before diving in, you should understand what a Security Operations Center (SOC) is. It is a centralized hub for an organization's cybersecurity needs, going beyond mere monitoring to provide a comprehensive suite of services. It continuously assesses the organization's networks, infrastructure, and endpoints for signs of security incidents, breaches, and vulnerabilities.</p><p>When a threat is detected, the SOC team uses incident response playbooks to contain and neutralize it swiftly to minimize risk. Automation tools are integrated to manage the volume of data and alerts, filter out false positives, and streamline processes. The SOC also engages in proactive threat hunting, sifting through networks and datasets to identify hidden threats that automated systems might overlook. </p><p>In addition to these operational tasks, the SOC plays a crucial role in ensuring compliance with industry regulations and standards. It generates detailed reports to both demonstrate compliance and inform senior management about the organization's holistic security posture.</p><p>Overall, the SOC is instrumental in strengthening an organization's cybersecurity defenses, minimizing risk, and enabling effective responses to security incidents.</p><p>Suppose SOC is something you are considering using. In that case, you will likely have to choose from three different types: in-house, hybrid, and outsourced.</p><p>Let's explore the pros and cons of each.</p><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2024/09/3.png" class="kg-image" alt="Advantages Security Operations Cente: In-House vs Hybrid vs Outsourced" loading="lazy" width="1414" height="2000" srcset="https://mandos.io/content/images/size/w600/2024/09/3.png 600w, https://mandos.io/content/images/size/w1000/2024/09/3.png 1000w, https://mandos.io/content/images/2024/09/3.png 1414w" sizes="(min-width: 720px) 720px"></figure><h2 id="in-house-soc">In-House SOC</h2>
<!--kg-card-begin: html-->
<table>
<thead>
  <tr>
    <th>✅ Pros</th>
    <th>❌ Cons</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Tailor security protocols to fit your specific organizational needs.</td>
    <td>Requires substantial investment in security tools and technology, which can quickly become outdated.</td>
  </tr>
  <tr>
    <td>In-house teams can build a deep understanding of your unique infrastructure, leading to more effective security measures.</td>
    <td>Smaller teams may face burnout due to the constant pressure and wide range of responsibilities.</td>
  </tr>
  <tr>
    <td>An in-house team can be a strong internal advocate for security needs during budget and resource allocation discussions.</td>
    <td>In-house teams might develop a narrow focus or blind spots, missing out on broader industry trends and threats.</td>
  </tr>
  <tr>
    <td>Ensures that all data remains under local jurisdiction, which can be crucial for compliance.</td>
    <td>Need of constant training and upskilling.</td>
  </tr>
</tbody>
</table>
<!--kg-card-end: html-->
<h2 id="hybrid-soc">Hybrid SOC</h2>
<!--kg-card-begin: html-->
<table>
<thead>
  <tr>
    <th>✅ Pros</th>
    <th>❌ Cons</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>You can balance the budget by keeping critical functions in-house and outsourcing less critical tasks.</td>
    <td>Managing two different types of SOCs can be complex and may require specialized management skills.</td>
  </tr>
  <tr>
    <td>Easier to scale your operations. You can add in-house resources or extend the outsourced contract as needed.</td>
    <td>Effective communication between in-house and outsourced teams can be challenging.</td>
  </tr>
  <tr>
    <td>You can allocate in-house staff to high-priority tasks while outsourcing routine monitoring, thus optimizing talent.</td>
    <td>While it may seem cost-effective, managing multiple vendors and contracts can add hidden costs.</td>
  </tr>
  <tr>
    <td>It is easier to meet compliance needs by keeping sensitive data in-house and outsourcing less sensitive tasks.</td>
    <td>Data might be stored in multiple locations, making it harder to manage and secure.</td>
  </tr>
</tbody>
</table>
<!--kg-card-end: html-->
<h2 id="outsourced-soc">Outsourced SOC</h2>
<!--kg-card-begin: html-->
<table>
<thead>
  <tr>
    <th>✅ Pros</th>
    <th>❌ Cons</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>Most outsourced SOCs offer round-the-clock services, providing constant vigilance.</td>
    <td>Service might be restricted by the terms of the contract, limiting flexibility in response to new threats.</td>
  </tr>
  <tr>
    <td>Access to a broader range of skills and expertise that might be too expensive to maintain in-house.</td>
    <td>The quality of service can vary significantly between vendors, and poor service can be detrimental.</td>
  </tr>
  <tr>
    <td>It is faster to set up initially, as the outsourced SOC is already a functioning entity.</td>
    <td>An outsourced SOC might not fully understand the specific business or industry culture, leading to gaps in service.</td>
  </tr>
  <tr>
    <td>Benefit from a more extensive database of threat intelligence, often collected from multiple sectors and geographies.</td>
    <td>Dependence on a particular vendor's tools and processes could make transitioning to another service or in-house operation costly and complex.</td>
  </tr>
</tbody>
</table>
<!--kg-card-end: html-->
<div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h1 id="making-the-decision">Making the Decision</h1><p>Now, let's dive into the steps that will help you make the decision that is best suited for your organization, its objectives, and its culture. Keep in mind that not all steps might be necessary for your particular use case. My goal is to provide you with a holistic view of considerations that I had to take in while helping various organizations that have been at different stages of their security operations.</p><!--members-only--><h2 id="step-1-understand-your-business-needs">Step 1: Understand Your Business Needs</h2><p>Before choosing between an in-house, hybrid, and outsourced Security Operations Center (SOC), it's vital to understand your business needs. Without aligning your information security and cybersecurity decision with your business goals, you risk creating a disconnect that could lead to inefficient resource allocation, increased vulnerability to threats, and, ultimately, a failure to meet key performance indicators or business objectives. The size of your enterprise, the industry you operate in, and your risk profile are key factors that will influence your decision.</p><h3 id="conduct-a-risk-assessment">Conduct a Risk Assessment</h3><p>Start by understanding your environment, risks, and potential business impact.</p><ol><li><strong>Identify Assets and Resources</strong>: List all the assets that need protection. This includes physical assets like servers and endpoints and digital assets like products, software, and cloud.</li><li><strong>Identify Threats and Vulnerabilities</strong>: Use tools like vulnerability scanners to find vulnerabilities and identify threats that can exploit those vulnerabilities.</li><li><strong>Assess Impact</strong>: For each vulnerability, assess the potential impact if exploited. Use metrics like financial loss or downtime.</li><li><strong>Prioritize Risks</strong>: Not all risks are equal. Rank them based on impact and likelihood.</li><li><strong>Consult Stakeholders</strong>: Involve key people like department heads, business leaders and IT managers in the risk assessment process.</li></ol><h3 id="define-your-security-goals">Define Your Security Goals</h3><p>Now that you are familiar with the environment and risks let's define the security goals that can help address those risks.</p><ol><li><strong>Monitoring Needs</strong>: Decide what level of monitoring is needed based on the sensitivity of the data, risks associated with assets, business objectives, customer requirements, and internal processes.</li><li><strong>Compliance</strong>: Identify the legal and industry standards you must meet. This could be GDPR for data protection, HIPAA for health data or PCI DSS for payment security. Consider data masking.</li><li><strong>Response Time</strong>: Set a target for how quickly your team should respond to security incidents.</li><li><strong>User Training</strong>: Determine the extent of cybersecurity awareness training needed for your staff.</li></ol><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">When conducting a risk assessment, don't just focus on current threats. Anticipate future risks based on industry trends and emerging technologies. This forward-thinking approach ensures your security strategy remains robust, not just for today but for the long term.</div></div><h2 id="step-2-evaluate-costs">Step 2: Evaluate Costs</h2><p>It would be best if you got a clear picture of the financial impact of both options. This isn't just about upfront costs, consider long-term expenses, too.</p><figure class="kg-card kg-image-card"><img src="https://mandos.io/content/images/2024/09/2.png" class="kg-image" alt="Costs of SOC" loading="lazy" width="1414" height="2000" srcset="https://mandos.io/content/images/size/w600/2024/09/2.png 600w, https://mandos.io/content/images/size/w1000/2024/09/2.png 1000w, https://mandos.io/content/images/2024/09/2.png 1414w" sizes="(min-width: 720px) 720px"></figure><h3 id="identify-components-of-in-house-soc-costs">Identify Components of In-House SOC Costs</h3><ul><li><strong>Staff Salaries</strong>: Calculate the annual salaries for SOC analysts, engineers, managers, and other staff. Include promotions and salary raises.</li><li><strong>Infrastructure</strong>: Estimate the cost of computing, storage, detection and response infrastructure, licenses, other software and hardware. </li><li><strong>Software Licenses</strong>: Add up the costs of SIEM tools, EDR, ADR and other applications.</li><li><strong>Training</strong>: Factor in ongoing staff training.</li><li><strong>Utilities</strong>: Include electricity, internet, and other utilities.</li><li><strong>Sum Up</strong>: Add all these components to get the total annual cost of an in-house SOC.</li></ul><h3 id="identify-components-of-hybrid-soc-costs">Identify Components of Hybrid SOC Costs</h3><ul><li><strong>In-House Staff</strong>: Calculate partial salaries for roles you'll keep in-house.</li><li><strong>Outsourced Fees</strong>: Factor in monthly or annual fees for outsourced services.</li><li><strong>Infrastructure</strong>: You'll still need some in-house hardware.</li><li><strong>Software Licenses</strong>: Both in-house and outsourced services may require specific software.</li><li><strong>Coordination Costs</strong>: Time and resources spent on managing and coordinating between in-house and outsourced teams.</li><li><strong>Sum Up</strong>: Add all these to get the total annual cost of a Hybrid SOC.</li></ul><h3 id="identify-components-of-outsourced-soc-costs">Identify Components of Outsourced SOC Costs</h3><ul><li><strong>Monthly/Annual Fees</strong>: Get quotes from multiple vendors.</li><li><strong>Setup Fees</strong>: Some vendors charge an initial setup fee.</li><li><strong>Overage Charges</strong>: Understand what activities might incur extra costs.</li><li><strong>Exit Costs</strong>: Know the costs if you decide to terminate the service.</li><li><strong>Sum Up</strong>: Add all these to get the total annual cost of an outsourced SOC.</li></ul><h3 id="evaluate">Evaluate</h3><ul><li><strong>Compare All Options</strong>: Create a side-by-side comparison chart for In-House, Outsourced, and Hybrid SOCs—factor in hidden costs like time spent managing teams or liaising with vendors.</li><li><strong>Consider ROI</strong>: Evaluate the return on investment for all three options. This could be in terms of reduced risk, faster response times, or other metrics significant to your business.</li></ul><p>By doing this, you'll have a clearer financial picture to make an informed decision.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Don't just look at upfront costs. Use a Total Cost of Ownership (TCO) analysis to include hidden and long-term costs. This gives you a full cost picture.</div></div><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div><h2 id="step-3-assess-skill-requirements">Step 3: Assess Skill Requirements</h2><p>To have a robust security posture, you need the right skills on your team. This step helps you identify those skills and see if your current team is up to the mark.&nbsp;</p><p>Here are the skills that I would recommend you to take into account.</p><h3 id="in-house-soc-1">In-House SOC</h3><ul><li><strong>Cyber Threat Analysis</strong>: Ability to identify and analyze potential threats specific to the organization's environment.</li><li><strong>Incident Response</strong>: Skills in managing and mitigating security incidents within the organization's network.</li><li><strong>Threat Hunting</strong>: Skills in proactively identifying unknown threats in the internal network before they cause harm.</li><li><strong>Network Security</strong>: Deep understanding of the organization's firewalls, intrusion detection systems, etc.</li><li><strong>Cloud Security</strong>: Expertise in managing the organization's cloud workloads, configurations, and deployments.</li><li><strong>Security Engineering</strong>: Skills in designing systems and integrations tailored to the organization's needs.</li><li><strong>Automation</strong>: Ability to automate repetitive security tasks within the internal environment.</li><li><strong>Scripting</strong>: Proficiency in scripting languages for custom security tasks.</li><li><strong>Windows Systems</strong>: Understanding of Windows-based security measures specific to the organization.</li><li><strong>Unix Systems</strong>: Knowledge of Unix/Linux-based security measures used in the organization.</li><li><strong>Stakeholder Communication</strong>: Skills in communicating incident details to internal stakeholders, aligning with corporate protocols.</li><li><strong>Compliance and Reporting</strong>: Proficiency in ensuring organizational activities meet established laws, regulations, and internal policies.</li></ul><h3 id="outsourced-soc-1">Outsourced SOC</h3><ul><li><strong>Vendor Oversight</strong>: Skills in managing and evaluating the performance and quality of outsourced services.</li><li><strong>Vendor Management</strong>: Ability to oversee and control interactions with third-party vendors.</li><li><strong>Contract Negotiation</strong>: Skills in securing favorable terms and minimizing risks in contracts with vendors.</li><li><strong>External Communication</strong>: Capability to interact effectively with external parties like vendors and regulatory bodies.</li><li><strong>Internal Incident Coordination</strong>: Ability to liaise between the outsourced SOC and internal departments, ensuring alignment with organizational policies.</li><li><strong>Compliance and Reporting</strong>: Proficiency in ensuring that outsourced activities comply with laws, regulations, and internal policies.</li></ul><h3 id="hybrid-soc-1">Hybrid SOC</h3><ul><li><strong>Internal-External Coordination</strong>: Ability to manage and coordinate between in-house and outsourced teams.</li><li><strong>Flexibility</strong>: Ability to adapt to changing security needs and configurations in both in-house and outsourced environments.</li><li><strong>Multi-Environment Management</strong>: Skills in managing security in both in-house and cloud-based environments.</li><li><strong>Data Segmentation</strong>: Understanding of what data to keep in-house and what to trust to an outsourced service.</li><li><strong>Incident Response</strong>: Skills in coordinating incident response activities between in-house and outsourced teams.</li><li><strong>Compliance and Reporting</strong>: Proficiency in ensuring that both in-house and outsourced activities comply with laws, regulations, and internal policies.</li></ul><h3 id="analyze-skill-gaps-and-coordinate">Analyze Skill Gaps and Coordinate</h3><p>Now that you have the list of necessary skills. It's time to identify gaps.</p><ul><li><strong>List Current Skills</strong>: Use a spreadsheet to list team members, stakeholders, and their skills.</li><li><strong>Compare with Core Competencies</strong>: Align this list with the core competencies needed.</li><li><strong>Evaluate the Cost of Skill Acquisition</strong>: Calculate the cost of training or hiring new staff with the required skills. Factor this into your overall budget assessment.</li><li><strong>Check for Internal Talent:&nbsp;</strong>Sometimes, employees from other departments have the skills you need. Consider internal transfers as a cost-effective way to fill skill gaps.</li><li><strong>Consult with HR:&nbsp;</strong>Work with your HR department to understand hiring timelines. This helps in planning if new hires are needed.</li></ul><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Focus on both current and future needs. Cyber threats evolve, and so should your skillset. Make skill development an ongoing process, not a one-time effort.</div></div><h2 id="step-4-consider-scalability">Step 4: Consider Scalability</h2><p>Scalability is critical for long-term success, and this is where most SOC decisions fail. Often, organizations choose one of the categories of Security Operations Center that fits their current needs but do not consider the future growth of the company or long-term requirements. In my experience, this often leads to a situation where either:</p><ol><li>The internal team could not grow sufficiently quickly to catch up with business.</li><li>Processes were not flexible enough to adapt the hybrid model with changes in internal operations.</li><li>The security team ended up locked in with the service provider for a 3-5-year period and is not able to change contract terms to fit the new reality.</li></ol><p>Your security setup should grow with your business. Here's how to assess scalability for both in-house and outsourced options.</p><h3 id="in-house-soc-scalability">In-House SOC Scalability</h3><ul><li><strong>Resource Flexibility</strong>: Assess the ability to quickly onboard new staff or scale down as needed.</li><li><strong>Tech Adaptability</strong>: Evaluate if your current technology stack can easily integrate new tools or scale existing ones.</li><li><strong>Process Evolution</strong>: Ensure that internal processes can adapt to increased workload or complexity.</li><li><strong>Budget Elasticity</strong>: Check if your budget can accommodate sudden scaling needs, both upwards and downwards.</li></ul><h3 id="hybrid-soc-scalability">Hybrid SOC Scalability</h3><ul><li><strong>Coordination Complexity</strong>: Evaluate how easily you can manage scaling across both in-house and outsourced components.</li><li><strong>Service Integration</strong>: Check if outsourced services can be easily integrated or removed without affecting in-house operations.</li><li><strong>Cost Predictability</strong>: Understand how scaling one component (in-house or outsourced) will impact overall costs.</li><li><strong>Flexibility in Transition</strong>: Assess the ease with which you can move from a hybrid to an entirely in-house or fully outsourced model if needed.</li></ul><h3 id="outsourced-soc-scalability">Outsourced SOC Scalability</h3><ul><li><strong>Contract Terms</strong>: Review the contract for clauses that allow for scaling the services.</li><li><strong>Vendor Capabilities</strong>: Assess if the vendor can handle increased workload or specific new requirements.</li><li><strong>Exit Strategy</strong>: Understand the costs and processes involved if you need to switch vendors for scalability reasons.</li><li><strong>Data Portability</strong>: Ensure you can quickly move your data if you decide to change vendors or bring services in-house.</li></ul><p>By considering these factors, you'll be better equipped to choose a SOC model that not only meets your current needs but also scales effectively with your organization's growth and evolving security landscape. Given your extensive background in cybersecurity and strategic advising, this comprehensive approach to scalability will align well with both operational and strategic objectives.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">Don't just scale up; scale smart. Scalability is not just about growing bigger; it's about becoming more efficient. Look for opportunities to automate and optimize as you scale.</div></div><h2 id="step-5-examine-response-time">Step 5: Examine Response Time</h2><p>Response time is a vital metric in the effectiveness of a SOC. The speed at which SOC can detect, analyze, and respond to incidents directly impacts the severity and cost of a security breach.&nbsp;</p><p>Here's how to examine response time for In-House, Outsourced, and Hybrid SOCs.</p><h3 id="measure-your-in-house-teams-response-time">Measure Your In-House Team's Response Time</h3><ul><li><strong>Define Metrics</strong>: Decide on key metrics like Time to Detect (TTD) and Time to Respond (TTR).<ul><li><strong>TTD</strong>: The time it takes to detect a threat.</li><li><strong>TTR</strong>: The time it takes to contain and eliminate the threat.</li></ul></li><li><strong>Run Simulations</strong>: Conduct mock cyber-attacks to test your team's response.</li><li><strong>Record Data</strong>: Log the TTD and TTR during these simulations.</li><li><strong>Calculate Average</strong>: Take the average TTD and TTR from multiple simulations for a balanced view - this will result in Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).</li></ul><h3 id="evaluate-the-outsourcedhybrid-vendors-response-time">Evaluate the Outsourced/Hybrid Vendor's Response Time</h3><ul><li><strong>Request Metrics</strong>: Ask for the vendor's average MTTD and MTTR.</li><li><strong>Check SLAs</strong>: Review the Service Level Agreements (SLAs) for response times.</li><li><strong>Ask for Proof</strong>: Request case studies or performance data to validate their claims.</li><li><strong>Consult Reviews</strong>: Look for customer feedback on the vendor's response time.</li></ul><h3 id="compare-and-analyze">Compare and Analyze</h3><ul><li><strong>Draw Comparisons</strong>: Put your in-house metrics side by side with the vendor's. Ensure that you can internally support in case of a major incident that requires shorter. response times</li><li><strong>Consider Variability</strong>: Understand that real-world scenarios can differ from simulations or promises.</li><li><strong>Make an Informed Decision</strong>: Choose the option that offers the best balance of speed and reliability and fits your organization's processes.</li></ul><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text">When comparing response times, also evaluate the types of threats each option has successfully mitigated. This will give you a more nuanced understanding of their capabilities, helping you make a more informed decision.</div></div><h2 id="step-6-weigh-legal-and-compliance-issues">Step 6: Weigh Legal and Compliance Issues</h2><p>Ensure that your security operations center, whether in-house, hybrid or outsourced, complies with all relevant laws, regulations, and industry standards. Take into account your industry and the one of your customers.</p><h3 id="identify-compliance-requirements">Identify Compliance Requirements</h3><ul><li><strong>List Applicable Laws and Regulations</strong>: Make a list of all laws and regulations that apply to your industry. This could include GDPR, CCPA, or HIPAA.</li><li><strong>Consult Legal Experts</strong>: Work with legal advisors to understand the implications of these laws on your SOC.</li><li><strong>Industry Standards</strong>: Identify any industry-specific standards like PCI DSS for payments or ISO 27001 for information security.</li></ul><h3 id="assess-compliance-capabilities">Assess Compliance Capabilities</h3><ul><li><strong>In-House Assessment</strong>: If considering an in-house SOC, evaluate your current infrastructure's ability to meet these laws and standards.</li><li><strong>Vendor Assessment</strong>: If considering outsourcing or hybrid, ask potential vendors for proof of compliance. This could be in the form of certifications or audit reports.</li></ul><h3 id="gap-analysis">Gap Analysis</h3><ul><li><strong>Identify Gaps</strong>: Compare your current state with the required compliance levels. Note any gaps.</li><li><strong>Cost of Bridging Gaps</strong>: Calculate the cost and time needed to bridge these gaps for in-house, hybrid and outsourced options.</li><li><strong>Risk Assessment</strong>: Weigh the risks of non-compliance against the costs of achieving it.</li><li><strong>Final Review</strong>: Have a final consultation with your legal team to ensure all compliance issues are addressed.</li></ul><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">💡</div><div class="kg-callout-text"> If your vendor operates outside your regulated geographical zone, ensure that trans-geographic data transfer and remote system access comply with both regulations and customer requirements. This is crucial for maintaining data privacy and meeting compliance standards.</div></div><h2 id="step-7-make-the-decision">Step 7: Make the Decision</h2><p>Congrats, you have arrived at your final destination. At this stage the goal is to make a well-informed decision that aligns with your enterprise's needs, budget, and long-term goals.</p><h3 id="finalize-output-from-previous-steps">Finalize Output from Previous Steps</h3><ul><li><strong>Compile Data</strong>: Gather all the data and insights you've collected from Steps 1-6.</li><li><strong>Create a Decision Matrix</strong>: Use a decision matrix to objectively compare the pros and cons of both options and which parts matter to you the most.</li><li><strong>Consult Stakeholders</strong>: Share your findings with key stakeholders for input.</li></ul><h3 id="evaluate-risks-and-benefits">Evaluate Risks and Benefits</h3><ul><li><strong>Risk Assessment</strong>: Revisit the risk profile of your organization. Does one option mitigate these risks better?</li><li><strong>Benefit Analysis</strong>: List the benefits each option offers. Consider factors like cost savings, expertise, and focus on core business.</li></ul><h3 id="financial-considerations">Financial Considerations</h3><ul><li><strong>Budget Alignment</strong>: Ensure the choice aligns with your budget constraints.</li><li><strong>ROI Calculation</strong>: Estimate the return on investment for both options over a set period.</li></ul><h3 id="make-the-final-choice">Make the Final Choice</h3><ul><li><strong>Review Compiled Data</strong>: Go through the decision matrix, stakeholder input, and your own analyses one last time.</li><li><strong>Make the Decision</strong>: Choose the option that scores highest in the decision matrix and aligns best with stakeholder input and your analyses.</li><li><strong>Document the Decision</strong>: Record why this choice was made for future reference and compliance needs.</li></ul><p>By following these actionable steps, you'll be well-equipped to make a decision that not only addresses immediate security needs but also aligns with your enterprise's long-term objectives.</p><h2 id="conclusion">Conclusion</h2><p>You've now learned a comprehensive approach to evaluate whether an in-house or outsourced Security Operations Center is the right fit for your enterprise. Your next steps could include implementing the chosen solution and continuously monitoring its effectiveness. If you found this guide helpful and need more insights, feel free to reach out for a tailored advise.</p><div class="kg-card kg-cta-card kg-cta-bg-green kg-cta-minimal  kg-cta-has-img  kg-cta-centered" data-layout="minimal">
            
                <div class="kg-cta-sponsor-label-wrapper">
                    <div class="kg-cta-sponsor-label">
                        <span style="white-space: pre-wrap;">A Quick note</span>
                    </div>
                </div>
            
            <div class="kg-cta-content">
                
                    <div class="kg-cta-image-container">
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io"><img src="https://mandos.io/content/images/2025/08/Nikoloz_Kokhreidze_Fractional_CISO.png" alt="CTA Image" data-image-dimensions="200x250"></a>
                    </div>
                
                
                    <div class="kg-cta-content-inner">
                    
                        <div class="kg-cta-text">
                            <p><u><b><strong class="underline" style="white-space: pre-wrap;">Is Security Blocking Your Next Enterprise Deal?</strong></b></u></p><p><span style="white-space: pre-wrap;">Let's discuss how fractional CISO services can unlock your pipeline without the full-time overhead.</span></p>
                        </div>
                    
                    
                        <a href="https://cal.com/nikolozk/30min?ref=mandos.io" class="kg-cta-button kg-style-accent" style="color: #FFFFFF;">
                            Book a Free Discovery Call
                        </a>
                        
                    </div>
                
            </div>
        </div> ]]></content:encoded>
    </item>

</channel>
</rss>