weekly
SIGNALS WEEKLY: Android Banking Malware & VS Code Worms Go Mainstream
šØ CodeRED alerts ransomed. š Shai Hulud 2.0 looting CI/CD secrets. š± 107 Android bugs + Albiriox on-device fraud. Signals Weekly on what to fix first.
weekly
šØ CodeRED alerts ransomed. š Shai Hulud 2.0 looting CI/CD secrets. š± 107 Android bugs + Albiriox on-device fraud. Signals Weekly on what to fix first.
weekly
Wormed npm repos. Multi-vector APTs. KEV-listed identity RCE. If your CI/CD + SSO arenāt on the same crisis board this week, youāre already late. ššØ
ta558
TA558ās āSteganoAmorā campaign leverages steganography to deliver commodity malware across oil, gas, maritime, and industrial targets. The groupās use of image-embedded payloads and compromised infrastructure...
poisonseed
If your bulk email or CRM gets popped, PoisonSeed rides your good reputation straight past filters and usersā instincts. Hereās the fast path to detect and blunt itāwithout boiling the ocean.
supply-chain
Your code assistant invents a āhelpfulā package; an attacker registers it; your pipeline installs it. As of Aug 27, 2025, this is moving from edge case to repeatable tactic. Hereās how to spot it fast and force your builds to fail-closed.
ransomware
Hybrid attacks are hitting navigation and port systems harder than ever ā from ransomware to GPS spoofing ā threatening safety, operations, and global trade.
ransomware
Three converging trendsāransomware, volatile regulations, and global instabilityāare reshaping risk for US tech, finance, and education. The common thread? Disruption spreads faster than most organizations can detect or respond.
bumblebee
Bumblebee malware has escalated its tactics by compromising the supply chain of RVTools, a widely used VMware utility, to deliver trojanized installers containing a malicious version.dll loader. This attack, detected in May 2025, distributed malware via both official and typosquatted domains..
m-trends
I take a SPECULATIVE deep dive into what I think might be in the 2025 Mandiant M-TRENDS report.
vendors
Vendor management programs are essential for organizations to manage risks associated with third-party vendors. These programs typically include components such as security questionnaires, contract language...
ev
As the adoption of electric vehicles (EVs) and connected car technologies accelerates, the cybersecurity of EV charging infrastructure and connected car networks has become a critical concern.
strategy
AI-powered attacks represent another formidable threat, as cybercriminals leverage AI and machine learning technologies to automate and scale their operations...