- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Author: Staff Writer
John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.
Summary Points Two cybersecurity professionals, Ryan Goldberg and Kevin Martin, were sentenced to four years in prison for deploying BlackCat ransomware to extort over $1.2 million from victims in 2023. The defendants, despite working in cybersecurity, conspired to use their skills for malicious extortion, sharing profits with BlackCat administrators and laundering the stolen funds. The BlackCat ransomware-as-a-service scheme targeted over 1,000 victims globally before being dismantled; one extortion case involved a ransom of approximately $1.2 million. The case highlights how cyber experts exploited their knowledge to facilitate ransomware attacks, emphasizing the threat of insider skills used for malicious purposes. Cybercriminals…
Essential Insights The CyberTech Media Room provides focused, high-impact insights on cybersecurity, AI, and enterprise risks for decision-makers. It emphasizes relevance, strategic clarity, and actionable intelligence over volume of content. The storytelling integrates data, expert analysis, and market context to inform business and technology decisions. Collaborating with industry leaders, it delivers strategic insights to help organizations navigate complex digital threats. Recent Developments in Cybersecurity Technology This week, several notable advancements highlight how technology continues to evolve rapidly. For example, new security systems now better detect and prevent cyber threats using artificial intelligence. These innovations aim to make digital infrastructure more…
Reliable issuance processes are crucial for establishing trust in digital credentials like mobile driver’s licenses (mDLs), ensuring they are issued to verified individuals and can be authenticated later. Current standards and practices (e.g., DHS, AAMVA, NIST) aim to secure remote issuance, but inconsistencies across states pose interoperability challenges. Emerging standards like OpenID4VCI and efforts from organizations such as FIDO and ISO aim to standardize credential issuance protocols and enhance interoperability. Improving trust, security, and scalability involves certification programs for wallets and including issuance metadata within credentials, supporting broader applications beyond government IDs. Applying ‘From DMV to Wallet’ in Everyday Business…
Quick Takeaways Vietnamese threat actors are using Google AppSheet to send sophisticated phishing emails impersonating Meta Support, bypassing spam filters and targeting Facebook Business account owners. The operation, AccountDumpling, has compromised around 30,000 Facebook accounts, stealing credentials, 2FA codes, personal data, and government IDs for resale. Evidence links the campaign to individual PHẠM TÀI TÂN, with stolen accounts sold on illicit markets, showcasing the misuse of trusted platforms for malicious activities. Threat Overview, Techniques, and Targets A cyber threat operation linked to Vietnamese actors has been identified. This operation uses Google AppSheet to send fake emails pretending to be Meta…
Top Highlights A China-aligned cyber espionage campaign, SHADOW-EARTH-053, targets government and defense sectors across Asia and Europe, exploiting known vulnerabilities in internet-facing systems for persistent access. The attackers deploy web shells like Godzilla and ShadowPad malware via DLL sideloading, using open-source tunneling tools and techniques such as Mimikatz for privilege escalation and lateral movement. New phishing campaigns by China-affiliated groups GLITTER CARP and SEQUIN CARP impersonate journalists and activists, aiming to harvest credentials and gain email access through sophisticated impersonation tactics. Evidence suggests these operations are part of China’s overall strategic approach to digital repression, involving a network of actors…
Essential Insights The majority of stolen cryptocurrency funds are funneled to North Korea, with 76% of reported losses in 2026 attributed to DPRK hackers. North Korean cyberattacks primarily involve high-yield, targeted breaches, leveraging AI to enhance reconnaissance and social engineering, resulting in multi-hundred million dollar heists. The structural vulnerabilities of DeFi platforms, such as lack of trust verification and governance issues, facilitate state-sponsored crypto thefts, with North Korea responsible for $575 million stolen in 18 days in 2025. The integration of AI significantly escalates cyberattack capabilities, reducing response times and increasing exploitation risks, urging crypto ecosystems to implement automated, real-time…
Quick Takeaways A malicious ad impersonates the legitimate Homebrew website to distribute MacSync Stealer malware, which collects and exfiltrates user data. The attack employs a fake download script that prompts victims to enter their passwords, enabling unauthorized access and malware installation. The malware’s communication with its command-and-control server involves exfiltrating stolen information via encrypted zip files to a specific domain. Threat Overview, Attack Techniques, and Targets The threat involves malicious ads appearing in search results. These ads redirect users to fake web pages impersonating Homebrew, a legitimate macOS package manager. The fake pages promote malware named MacSync Stealer. Attackers use…
Top Highlights Handala, linked to Iran’s Ministry of Intelligence, conducted WhatsApp influence operations threatening U.S. troops with surveillance and missile/drone attacks. The group exposed personal details of 2,379 U.S. Marines in the Persian Gulf, increasing targeted insider risks. Their cyber tactics include social engineering, data wipers, and commercial tools, representing a shift to directly threaten military personnel. Threat, Attack Techniques, and Targets Handala is an Iran-linked cyber threat group that launched an influence campaign against U.S. troops in Bahrain. They used WhatsApp to send messages warning of surveillance and upcoming drone and missile attacks. This group has several aliases, including…
Summary Points GitHub faced multiple security issues, including a supply chain attack leading to data leaks and a high-severity flaw allowing remote code execution, with ongoing outages impacting users significantly. North Korean threat actors are deploying AI-generated malicious npm packages, such as "@validate-sdk/v2," to extract sensitive information from compromised environments. The U.S. considers designating data centers as a standalone critical infrastructure sector to bolster protections amid frequent targeted attacks. Anthropic launched Claude Security Beta, a vulnerability scanning tool, which is being integrated into major security platforms, highlighting advancements in AI-driven cybersecurity solutions. Underlying Problem This week, the Department of Know,…
New Spyware Platform Empowers Buyers to Rebrand and Resell Android Surveillance Malware
Essential Insights A new Android spyware tool, KidsProtect, is openly sold on the internet with a white-label reseller model, enabling buyers to rebrand and resell it, complicating law enforcement efforts to shut it down. Despite advertising as a parental monitoring app, KidsProtect operates covertly in the background, granting full control over infected devices, with features such as hidden app names and aggressive permissions. It evades detection by disguising itself as system services like "WiFi Service" and using a package name (com.example.parentguard) that hints at deliberate obfuscation; it also requests extensive permissions and abuses Android’s accessibility features. Its architecture is designed…