This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On April 11, 2025

Monday 4/7

The Expanding Attack Surface: How One Determined Attacker Thrives in Today’s Evolving Digital Workplace (Proofpoint)

While email remains the primary threat vector, cybercriminals are exploiting new channels like messaging collaboration platforms, cloud apps and file-sharing services. This has created a fragmented security landscape with disconnected point products, resulting in higher operational costs, and increasing security gaps.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/relentless-cybercriminal-workplace-attacks

XFiles: A Fileless Malware Delivered via Phishing Campaigns (Abnormal Security)

Delivered via phishing emails, XFiles uses a malicious link or HTML attachment to redirect targets to a malicious landing page to execute the fileless payload. Even more nefarious? The landing page includes a Cloudflare Turnstile, a legitimate verification widget repurposed as a social engineering tool to create a false sense of trust.

https://abnormalsecurity.com/blog/xfiles-fileless-malware-delivered-via-phishing

Tuesday 4/8

The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs (Check Point)

While 68% of malicious attacks are delivered through email, PDF-based attacks now account for 22% of all malicious email attachments, according to Check Point Research. This makes them particularly insidious for businesses that share large quantities of these files in the course of daily work.

https://blog.checkpoint.com/research/the-weaponization-of-pdfs-68-of-cyberattacks-begin-in-your-inbox-with-22-of-these-hiding-in-pdfs/

The rising danger of AI poisoning: When data turns toxic (Delinea)

AI poisoning attacks often play out by leveraging enterprise identities and credentials. Illicit access to the systems that host AI applications and their data sets create blind spots akin to third-party access from an extensive software supply chain.

https://delinea.com/blog/ai-poisoning-when-data-turns-toxic

Wednesday 4/9

Platformization Maximizes Security Efficacy & IT Operations Efficiency (Palo Alto Networks)

Businesses can’t improve defenses or achieve resilience by relying on fragmented processes, disparate systems, siloed security, development or cloud operations teams. The way forward is through embracing strategic platform integration.

https://www.paloaltonetworks.com/blog/2025/04/platformization-maximizes-security-efficacy-it-operations-efficiency/

Holistic Data Security and Compliance for Microsoft 365: Reducing Risk and Boosting Efficiency (Rubrik)

Microsoft 365 environments generate massive volumes of sensitive data across Exchange Online, SharePoint, OneDrive, Teams, and more. For Chief Information Security Officers (CISOs) and compliance officers, managing this data to meet regulatory compliance and security standards is a complex challenge.

https://www.rubrik.com/blog/technology/25/3/holistic-data-security-and-compliance-for-microsoft365

Thursday 4/10

Introducing Wiz Defend: Redefining a new standard for cloud detection and response (Wiz)

Wiz Defend unifies runtime signals from the Wiz Sensor, real-time analysis of cloud and SaaS telemetry, our proprietary threat intelligence, and the deep code-to-cloud context of the Wiz Security Graph to provide Security Analysts, Detection Engineers, Incident Responders, and Threat Hunters with precise detection and complete analysis of threats.

https://www.wiz.io/blog/wiz-defend-general-availability

79%

79 is the percentage of breaches that occurred without malware. Hence the much-used quote, “hackers don’t break in, they log in.”

https://www.gothamtg.com/blog/79-percent

Friday 4/11

Unraveling Cyber Defense Model Secrets: Lateral Movement (Adlumin)

One of the most dangerous phases of an attack is lateral movement, where intruders pivot across a network to access sensitive data and high-value systems, making it hard to detect. Identifying this behavior quickly can mean the difference between a contained incident and a full-scale breach.

https://adlumin.com/post/unraveling-cyber-defense-model-secrets-lateral-movements/

Proactive Identity Security: Addressing Unmanaged Endpoint Risks (CyberArk)

Unmanaged endpoints are quickly becoming critical attack vectors, yet securing them is rarely straightforward and often overlooked. IT teams do not have full access to such endpoints, and without viable options to secure these endpoints in the same manner as managed endpoints, this gap in the organization’s security system lingers.

https://www.cyberark.com/resources/blog/proactive-identity-security-addressing-unmanaged-endpoint-risks