This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On September 05, 2025

Tuesday 9/4

What Is a Hybrid Mesh Firewall and Why It Matters (Palo Alto Networks)

A hardware-only approach leaves gaps at the edge, while cloud-only firewalls can’t provide consistent protection across on-premises infrastructure. The result is operational complexity with blind spots and an expanding attack surface.

https://www.paloaltonetworks.com/blog/2025/08/hybrid-mesh-firewall-and-why-it-matters/

Cybersecurity Stop of the Month: BEC Attacks Targeting Government Agencies (Proofpoint)

What makes BEC threats so dangerous is that they typically don't involve malicious links or malware payloads. Instead, cybercriminals rely on lies, impersonation, and social engineering tactics to bypass traditional security defenses. Attacks that don’t have payloads are a blind spot for many security vendors.

https://www.proofpoint.com/us/blog/email-and-cloud-threats/rice-bec-attacks-targeting-government-agencies

Wednesday 9/3

s1ngularity: supply chain attack leaks secrets on GitHub: everything you need to know (Wiz)

On August 26, 2025, multiple malicious versions of the widely used Nx build system package were published to the npm registry. These versions contained a post-installation malware script designed to harvest sensitive developer assets, including cryptocurrency wallets, GitHub and npm tokens, SSH keys, and more.

https://www.wiz.io/blog/s1ngularity-supply-chain-attack

Understanding the Role of Incident Response in Cybersecurity (Arctic Wolf)

The goal of incident response is to limit the damage from a cyber incident, understand what happened and permanently resolve the situation, get business operations back to normal as quickly as possible, and prevent the same issue from occurring again. At its core, incident response is about protecting the organization’s business, reputation, and bottom line.

https://arcticwolf.com/resources/blog/why-you-need-incident-response-as-part-of-your-cybersecurity-strategy/

Thursday 9/4

Why BEC Remains the $2.8 Billion Problem CISOs Can’t Ignore (Abnormal AI)

What makes BEC so dangerous is its simplicity. Unlike phishing or malware, these attacks rarely include suspicious links or attachments. Instead, they rely on psychology. A message arrives from what appears to be a trusted colleague, a senior executive, or even a known vendor. It carries urgency and by the time the fraud is discovered, the money is long gone.

https://abnormal.ai/blog/bec-problem-cisos-cant-ignore

Non-human identities are the silent majority. How can you manage and protect them? (Delinea)

Without proper identity management, these bots could be hijacked or impersonated. Similarly, NHI management secures automated access to Tier Zero assets, critical systems like domain controllers and identity providers, by ensuring that only authorized non-human entities can access them.

https://delinea.com/blog/how-to-manage-and-protect-non-human-identities

Friday 9/5

CrowdStrike to Acquire Onum to Transform How Data Powers the Agentic SOC (CrowdStrike)

Onum delivers the real-time data architecture to transform data in motion into high-fidelity intelligence, fueling CrowdStrike Falcon® Next-Gen SIEM and powering the agentic SOC. This is a pivotal step forward in our mission to stop breaches.

https://www.crowdstrike.com/en-us/blog/crowdstrike-to-acquire-onum/

Cato CTRL™ Threat Research: Threat Actors Abuse Simplified AI to Steal Microsoft 365 Credentials (Cato Networks)

This social engineering combined with phishing highlights a dangerous evolution: threat actors are merging impersonation with sophisticated phishing techniques while exploiting the era of AI adoption in enterprise organizations.

https://www.catonetworks.com/blog/cato-ctrl-threat-actors-abuse-simplified-ai-to-steal-microsoft-365-credentials/