This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On June 06, 2025

Monday 5/19

Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers (Check Point)

Check Point researchers have identified a large-scale phishing campaign that exploits the guise of email quarantine notifications. This campaign, consisting of 32,000 emails, has targeted 6,358 customers across various regions. The primary objective of the attackers is to deceive recipients into providing their login credentials through a fake login page.

https://blog.checkpoint.com/securing-user-and-access/phishing-campaign-mimics-email-quarantine-notifications-32000-emails-target-6358-customers/

How Poor User Experience (UX) Can Undermine Your Enterprise Security (CyberArk)

Most security vulnerabilities tied to passwords aren’t just technical; they’re human (and totally normal!). People reuse weak passwords. They write them down. They store them in spreadsheets. They share them in insecure ways. Why? Because remember and managing passwords is not just frustrating, it’s impossible.

https://www.cyberark.com/resources/blog/how-poor-user-experience-ux-can-undermine-your-enterprise-security

Tuesday 5/20

CIS Safeguard 3.11: Encrypt Sensitive Data at Rest

https://www.gothamtg.com/blog/cis-safeguard-311-encrypt-sensitive-data-at-rest

Defensive vs. offensive cybersecurity (Delinea)

Cybersecurity is a moving target. If you’re purely playing defense, you’re always running to catch up. That’s why cybersecurity leaders are increasingly incorporating proactive strategies in their security programs.

https://delinea.com/blog/defensive-vs-offensive-cybersecurity

Wednesday 6/4

Check Point to Acquire Veriti, Redefining Threat Exposure Management in Complex Multi-Vendor Environments (Check Point)

Built with a fully API-based architecture, Veriti seamlessly integrates into organizations’ existing security infrastructure without agents or disruption, supporting the broadest security ecosystem in the market. 

https://blog.checkpoint.com/security/check-point-to-acquire-veriti-redefining-threat-exposure-management-in-complex-multi-vendor-environments/

Why the Future of High-performance Computing Will Depend on Data Storage (Pure Storage)

Traditional storage has become a bottleneck, limiting the full potential of HPC environments. The future of HPC and scientific breakthroughs hinges on having a platform that is specifically engineered for these data-intensive workloads.

https://blog.purestorage.com/perspectives/future-of-high-performance-computing-data-storage/

Thursday 6/5

AI and Cybersecurity: Trends That Prove the Fundamentals Matter More Than Ever (Arctic Wolf)

AI is not changing the tactics attackers use. It is making them faster. Tasks that once took weeks — crafting phishing emails, running reconnaissance, deploying ransomware — can now unfold in minutes. But these attacks still exploit the same weaknesses: human mistakes, poor processes, and gaps in visibility.

https://arcticwolf.com/resources/blog/ai-and-cybersecurity-trends/

AI Trust in Action: How Snyk Agent Redefines Secure Development (Snyk)

A single bad fix doesn’t just cause downtime; it can introduce new vulnerabilities, compliance gaps, or break core functionality. Trust in this context isn’t about theoretical accuracy or elegant demos. It’s about real-world reliability.

https://snyk.io/blog/ai-trust-in-action-how-snyk-agent-redefines-secure-development/

Friday 6/6

The Hidden Cost of Trust: New Data Reveals Alarming Employee Engagement with Vendor Email Compromise (Abnormal AI)

In these attacks, however, the person being impersonated is an external third party rather than an internal employee. Posing as trusted partners, threat actors attempt to trick targets into paying fake invoices, initiating fraudulent wire transfers, or updating banking details to reroute funds into attacker-controlled accounts.

https://abnormal.ai/blog/new-data-vendor-email-compromise-engagement

Microsoft's Authenticator not saving new passwords as of June 1 (Delinea)

Microsoft has begun phasing out password saving in Authenticator. As of June 1, 2025, the app no longer allows users to save any new passwords. By August, saved passwords will no longer be accessible in the app at all.

https://delinea.com/blog/microsoft-authenticator-not-saving-new-passwords-as-of-june-1