Cybersecurity

Marks & Spencer’s ransomware nightmare – more details emerge 

Marks & Spencer’s ransomware nightmare – more details emerge 

Over Easter, retail giant Marks & Spencer (M&S) discovered that it had suffered a highly damaging ransomware attack that left some shop shelves empty, shut down online ordering, some staff unable to clock in and out, and caused some of its major suppliers to resort to pen and paper.

In a gloating abuse-filled email to M&S CEO Stuart Machin, the DragonForce hacker group claimed responsibility for the attack.

Read more in my article on the Hot for Security blog.

Empower Users and Protect Against GenAI Data Loss 

Empower Users and Protect Against GenAI Data Loss 

When generative AI tools became widely available in late 2022, it wasn’t just technologists who paid attention. Employees across all industries immediately recognized the potential of generative AI to boost productivity, streamline communication and accelerate work. Like so many waves of consumer-first IT innovation before it—file sharing, cloud storage and collaboration platforms—AI landed in

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam 

Microsoft Helps CBI Dismantle Indian Call Centers Behind Japanese Tech Support Scam 

India’s Central Bureau of Investigation (CBI) has revealed that it has arrested four individuals and dismantled two illegal call centers that were found to be engaging in a sophisticated transnational tech support scam targeting Japanese citizens.
The law enforcement agency said it conducted coordinated searches at 19 locations across Delhi, Haryana, and Uttar Pradesh on May 28, 2025, as part of

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV 

Inside the Mind of the Adversary: Why More Security Leaders Are Selecting AEV 

Cybersecurity involves both playing the good guy and the bad guy. Diving deep into advanced technologies and yet also going rogue in the Dark Web. Defining technical policies and also profiling attacker behavior. Security teams cannot be focused on just ticking boxes, they need to inhabit the attacker’s mindset.
This is where AEV comes in.
AEV (Adversarial Exposure Validation) is an advanced

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack 

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack 

A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos.
“The attack was instrumented via a legitimate endpoint administration framework, indicating that the attackers likely had access to the administrative console, that was then used to issue malicious commands and deploy PathWiper across

Proxy Services Feast on Ukraine’s IP Address Exodus 

Proxy Services Feast on Ukraine’s IP Address Exodus 

Ukraine has seen nearly one-fifth of its Internet space come under Russian control or sold to Internet address brokers since February 2022, a new study finds. The analysis indicates large chunks of Ukrainian Internet address space are now in the hands of proxy and anonymity services nested at some of America’s largest Internet service providers (ISPs).

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials 

Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials 

Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.

“Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP,” Yuanjing Guo, a security researcher in the Symantec’s Security Technology and Response

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands 

Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands 

The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government.
That’s according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis.
“Their diverse toolset shows consistent coding patterns across malware families, particularly in

Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation 

Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation 

Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational impact, and avoiding loss.
The

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X