Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/27 Proofpoint releases innovative detections for threat hunting: PDF Object Hashing (Proofpoint) Due to the complex nature of the PDF format and the many ways threat actors use it to their advantage, detecting malicious PDF files can range from straightforward to nearly impossible. Proofpoint researchers have identified notable campaigns leveraging PDFs and have created a new tool called PDF Object Hashing designed to track and detect the unique characteristics of PDFs used by threat actors. ht... read more.

  • October 31, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/20 Microsoft Dominates Phishing Impersonations in Q3 2025 (Check Point) According to Check Point Research’s Brand Phishing Report for Q3 2025, Microsoft accounted for 40% of all brand impersonation attempts this quarter, holding its place as the most targeted company worldwide. The dominance of major tech players in phishing campaigns shows no sign of slowing. https://blog.checkpoint.com/research/microsoft-dominates-phishing-impersonations-in-q3-2025/ AI, Quantum Computing and Other Emer... read more.

  • October 24, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/13 Pure Storage Unveils High-density QLC Flash Advancements (Pure Storage) A new software-defined architecture from Pure Storage leverages high-density QLC flash and host-based flash management to cost-effectively deliver industry-leading performance density, power, and space efficiency for AI and other hyperscale workloads. https://blog.purestorage.com/news-events/pure-storage-unveils-high-density-qlc-flash-advancements/ Understanding Indicators of Compromise and Their Role in Cybersecurity (... read more.

  • October 17, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/6 The invisible threat: Machine identity sprawl and expired certificates (CyberArk) Without central visibility, security teams inherit overlapping responsibilities and no clear ownership, allowing keys and secrets to remain unrotated or misconfigured and certificates to expire silently. That is, until they break something critical. https://www.cyberark.com/resources/blog/the-invisible-threat-machine-identity-sprawl-and-expired-certificates Tuesday 10/7 5 Essential Cyber Security Tips for Cybe... read more.

  • October 10, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/29 The emerging use of malware invoking AI (Wiz) AI has been used by threat actors for all sorts of use cases for the past few years where victims have received the output of AI (such as LLM generated phishing emails), but in this latest evolution we’re seeing the payload contains prompts to LLMs and executes the output in the victim environment.  https://www.wiz.io/blog/the-emerging-use-of-malware-invoking-ai Persuasion engineering: how to influence humans, LLMs, and AI ag... read more.

  • October 03, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Why Every Organization Needs an Inventory of Authentication and Authorization Systems Identity is the new perimeter. As organizations adopt cloud services, remote work, and third-party integrations, the number of systems that manage authentication and authorization has grown, often without centralized oversight. That’s where CIS Safeguard 6.6 comes in. What is CIS Safeguard 6.6? CIS Safeguard 6.6, p... read more.

  • September 30, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/22 What is Shadow AI and what is the risk to your organization? (Delinea) Shadow IT issues are not new to organizations. Think unauthorized cloud purchases, unmanaged bring your own device (BYOD) programs, and rogue access points. Shadow AI is a natural consequence of governance lag. Users will always innovate with new technology faster than governance and security people can work to establish sane policies and effective guardrails. https://delinea.com/blog/what-is-shadow-ai-and-what-is-the-risk... read more.

  • September 26, 2025

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation Jurassic Park and the Forgotten Gatekeepers: Why You Need an Inventory of Authentication and Authorization Systems In Jurassic Park, the park’s downfall wasn’t just the dinosaurs, it was the lack of control over who had access to what. Dennis Nedry, the disgruntled systems engineer, had unchecked access to critical systems. When he disabled security to steal embryos, no one knew how to stop him... read more.

  • September 24, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/15 npm Supply Chain Attack via Open Source maintainer compromise (Snyk) The open source developer fell victim to a phishing email that allowed an attacker to gain access to their npm account. This enabled the attacker to inject malicious code into many highly popular npm packages, creating a supply chain attack. https://snyk.io/blog/npm-supply-chain-attack-via-open-source-maintainer-compromise/ The 2025 Cybersecurity Hall of Shame: 10 Mistakes People Still Make Many cybersecurity mistakes cont... read more.

  • September 19, 2025

By Bert Amodol, Posted in Security

Many cybersecurity mistakes continue to be observed in 2025 despite the availability of advanced security tools and ongoing awareness efforts. These errors range from simple oversights to choices made for convenience, each potentially increasing the likelihood of security incidents. Below is an overview of ten common cybersecurity mistakes that still persist. Using Weak Or Default Passwords In 2025, some individuals continue to use weak passwords or leave default credentials unchanged. Weak or default pa... read more.

  • September 15, 2025