- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Author: Staff Writer
John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.
Fast Facts Misconception of Scattered Spider: The term "Scattered Spider" is a label created by CrowdStrike for a range of malicious activities by various criminal groups, rather than a standalone entity, indicating a larger community of cybercriminals utilizing similar tactics. Help Desk Scams as a Primary Approach: Scattered Spider has effectively employed help desk scams, leveraging social engineering techniques to reset credentials and bypass MFA, which has been pivotal in their recent high-profile attacks, including those on M&S and Co-op. Diverse Attack Techniques: Beyond help desk scams, Scattered Spider utilizes a wide array of identity-based attack methods, including SIM swapping…
Essential Insights Nominees for Cybersecurity Leadership: Sean Plankey and Sean Cairncross have received broad support from various cybersecurity experts and organizations for their nominations to key cybersecurity leadership positions in the Trump administration. Plankey’s Expertise: Plankey’s experience in both public and private sectors positions him well to protect critical infrastructure, with emphasis on establishing cyber partnerships due to his unique background in operational technology. Cairncross’s Political Influence: Cairncross, while lacking a technical background, is backed for his extensive political ties and managerial experience, essential for enhancing the political influence of the Office of the National Cyber Director. Urgent Need for…
Essential Insights Mandatory Reporting: Australia now requires businesses with a turnover of $3 million AUD or more, including critical infrastructure entities, to report ransomware and cyber extortion payments within 72 hours of making such payments. Comprehensive Reporting Requirements: Reports must detail the cyber incident, attackers’ demands, communication, ransom amount, and any non-monetary benefits given, as well as submitted via the Australian Signals Directorate’s online form. Initial Guidance Period: The Department of Home Affairs will assist organizations with compliance in the first six months, shifting to a stricter regulatory focus starting January 1, 2026. Information Utilization: Collected reports aim to enhance…
Summary Points A data breach at Coinbase, linked to India-based customer support representatives from TaskUs, involved bribery by threat actors to steal sensitive user data, first discovered in January 2025. Two TaskUs employees admitted to funneling Coinbase user data—including names, emails, and financial information—to hackers in exchange for bribes, with the breach impacting nearly 70,000 customers. Coinbase disclosed the incident on May 15, 2025, noting that cyber criminals demanded a $20 million ransom but instead opted to reward information leading to the identification of the extortionists. TaskUs confirmed their involvement, stating the rogue agents were part of a broader criminal…
Summary Points Postponed Earnings Report: Victoria’s Secret has delayed its fiscal first quarter earnings report due to a cyberattack hindering access to critical systems. Data Breach Impact: The company experienced a data breach that led to the temporary shutdown of corporate systems and its website, though retail operations have largely resumed. Ongoing Assessment: While the breach did not materially disrupt financial results, Victoria’s Secret continues to evaluate its impact and anticipates related costs could affect future earnings. Wider Cyber Threat: The incident raises concerns about coordinated attacks by the hacker group Scattered Spider, which is linked to multiple breaches in…
Top Highlights High-Profile Attacks Highlight Vulnerability: Scattered Spider has targeted UK retailers like Marks & Spencer and Co-op through sophisticated help desk scams, leading to significant disruptions and losses, totaling hundreds of millions in profits. Help Desk Scams Exploit Trust: Attackers impersonate victims, often using personal information to manipulate help desk operators into resetting credentials or MFA, ultimately gaining control of sensitive accounts and facilitating further breaches. Proven Techniques and Rising Impact: Scattered Spider’s tactics, including vishing and social engineering, have successfully bypassed security measures since 2022. High-profile incidents, such as those involving Caesars and MGM Resorts, demonstrate the severe…
Essential Insights Economic Impact: Scams are projected to cost the global economy $1.03 trillion in 2024, emerging as a major business due to high profitability compared to legitimate work. Crime-as-a-Service Growth: The rise of crime-as-a-service (CaaS) has facilitated easier scamming, with specialized tools and services allowing both skilled and unskilled individuals to engage in cybercrime. Social Engineering Dominance: The effective use of social engineering has become more critical for scammers than technical skills, enabling attacks like "pig butchering," which rely on building trust with victims over time. Persistent Challenges: Despite efforts to prosecute cybercriminals, the global nature of the threat…
Quick Takeaways Over 1,000 Instantel Micromate industrial monitoring devices are vulnerable to remote hacking due to a critical flaw (CVE-2025-1907), which lacks authentication on a configuration port, scoring a CVSS of 9.8. The vulnerability allows attackers to execute arbitrary commands, potentially altering or disabling monitoring functions, compromising data integrity, and disrupting critical operations in mining, construction, and environmental safety. Security researcher Souvik Kandar identified numerous internet-exposed Micromate devices globally at risk, emphasizing the potential for attackers to exploit the flaw for lateral movement into connected IT or OT systems. CISA has advised users to restrict access to the affected devices…
Top Highlights Data Breach Disclosure: MainStreet Bancshares reported a data breach affecting approximately 4.65% of its customers due to a compromised third-party vendor, with the incident occurring between April 17, 2023, and April 22, 2025. Incident Response: The bank activated its incident response plan, terminated the vendor involved, and confirmed that its own IT systems remained secure with no unauthorized transactions executed. Compromised Information: During the breach, sensitive card data (names, numbers, expiration dates) was leaked, although there is no evidence of compromised Social Security numbers or bank account numbers. Customer Advisory: Affected customers are advised to visit a bank…
Essential Insights Emergency Update Release: Google has issued an urgent security update for Chrome to address a third zero-day vulnerability (CVE-2025-5419) exploited since early 2023, affecting its V8 JavaScript engine. Mitigation and Fix: A configuration change was implemented to mitigate the issue, followed by the release of Chrome versions 137.0.7151.68/.69 for Windows/Mac and 137.0.7151.68 for Linux that will be rolled out to users in the coming weeks. Exploitation Confirmed: Google has confirmed that the CVE-2025-5419 vulnerability is actively exploited, but will withhold details about the attacks until a majority of users have updated. Recurring Issue: This marks Google’s third zero-day…