Monday 8/11
From Cloud to Hybrid: 360° Runtime Protection, Anywhere You Run (Wiz)
Securing hybrid infrastructure requires more than just extending existing tools. It demands a new approach that connects workload insights with broader infrastructure context, all in real-time.
https://www.wiz.io/blog/from-cloud-to-hybrid-360deg-runtime-protection-anywhere-you-run
How to Prevent Helpdesk Social Engineering Attacks (HYPR)
Helpdesks are critical support hubs, but their central role makes them prime targets for sophisticated social engineering attacks. These attacks exploit human psychology, tricking helpdesk personnel into divulging sensitive information or compromising security, often by targeting credential resets. When attackers convince an agent to reset a legitimate user's password, they bypass security, gaining unauthorized access to sensitive systems and data.
https://blog.hypr.com/prevent-helpdesk-social-engineering-attacks
Tuesday 8/12
New Data Reveals July’s Worst Ransomware Groups and Attack Surges (Check Point)
From critical infrastructure to classrooms, no sector is being spared. In July 2025, cyber attacks surged across nearly every industry and region, marking a sharp escalation in both scale and sophistication.
https://blog.checkpoint.com/research/global-cyber-threats-july-snapshot-of-an-accelerating-crisis/
Ransomware Evolution: The Changing Landscape of Cyber Extortion (Arctic Wolf)
Traditional ransomware mitigation strategies are no longer enough. Businesses must now invest in tools and processes that prevent and mitigate cyber extortion.
https://arcticwolf.com/resources/blog/ransomware-evolution-the-changing-landscape-of-cyber-extortion/
Wednesday 8/13
CIS Safeguard 5.5: Establish and Maintain an Inventory of Service Accounts
https://www.gothamtg.com/blog/cis-safeguard-55-establish-and-maintain-an-inventory-of-service-accounts
Cyber-resilient Storage Can Save You When Prevention Fails—and It Will (Pure Storage)
AI-powered cyber threats are evolving faster than defenses. Providing a secure, high-performance foundation, cyber-resilient storage amplifies both cybersecurity and cyber recovery efforts.
https://blog.purestorage.com/perspectives/cyber-resilient-storage-can-save-you/
Don’t Phish-let Me Down: FIDO Authentication Downgrade (Proofpoint)
Proofpoint threat researchers have recently uncovered a threat vector that could enable attackers to downgrade FIDO-based authentication mechanisms, presenting a potential risk to organizations and individual users alike.
https://www.proofpoint.com/us/blog/threat-insight/dont-phish-let-me-down-fido-authentication-downgrade
Thursday 8/14
CrowdStrike’s Approach to Better Machine Learning Evaluation Using Strategic Data Splitting (CrowdStrike)
Because of the kinds of relationships present in cybersecurity data, our domain requires us to carefully consider the ML concepts of train-test leakage and data splitting. When observations are not independent of one another, the data should be split in a way that does not cause overconfidence.
https://www.crowdstrike.com/en-us/blog/machine-learning-evaluation-using-data-splitting/
Fixing Fix Fatigue: Building Developer Trust for Secure AI Code (Snyk)
When security tooling is slow, noisy, or feels bolted on, it becomes background noise. Developers learn to ignore alerts, skip validations, or roll back autonomous fixes. And once that trust breaks, the cycle gets harder to stop.
https://snyk.io/blog/fixing-fix-fatigue-building-developer-trust-for-secure-ai-code/
Friday 8/15
Rethinking secondary accounts: How zero standing privileges (ZSP) reshape identity security (CyberArk)
The secondary account approach, once considered best practice, is now challenged by modern identity security models like ZSP. This modern approach to performing administrative or privileged tasks effectively addresses security and compliance requirements to reduce the risk associated with persistent permissions.
https://www.cyberark.com/resources/blog/rethinking-secondary-accounts-how-zero-standing-privileges-zsp-reshape-identity-security
Cato CTRL™ Threat Research: Oyster Malware Loader Targets Tech-Savvy Users with Smarter Techniques During Summer Malvertising Campaign (Cato Networks)
Oyster is a malware loader previously observed by Rapid7 in a malvertising campaign in 2024. Recently, Oyster has returned with a stealthier twist. We’ve recently observed a new malvertising campaign in July 2025 where Oyster was disguised as a trusted admin tool and lured technical users through a spoofed domain.
https://www.catonetworks.com/blog/cato-ctrl-oyster-malware-campaign/