Threats & Breaches

The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in ...

Identity is the New Perimeter: CybeReady’s Analysis of IBM’s X-Force 2025 Threat Intelligence Index
The New Dawn Returns – Horizon Shifts in Cyberattack Trends Following our in-depth analysis of IBM’s 2025 Threat Intelligence Index, CybeReady’s research team has identified a significant “Back to the Future” moment ...

NSFOCUS APT Monthly Briefing – March 2025
Regional APT Threat Situation Overview In March 2025, the global threat hunting system of NSFOCUS Fuying Laboratory discovered a total of 19 APT attack activities. These activities were mainly distributed in South ...
Webinar Recap: How AI is Revolutionizing Cybersecurity in Healthcare
Protecting patient data isn’t just about keeping up with regulations; it’s about safeguarding lives and preserving trust. For healthcare organizations like City of Hope, cybersecurity is a mission-critical responsibility. A breach can ...

200,000 Workers’ PII at Risk in WorkComposer S3 SNAFU
Don’t say ‘spyware’—21 million screenshots in one open bucket ...

Cybersecurity Insights with Contrast CISO David Lindner | 04/25/25
Insight No. 1 — Fast code, slow security? Think ADR Consider the scenario: Development teams are pushing code at unprecedented speeds, and vulnerabilities, whether human or AI-generated, are lingering far too long ...

Security at Arm’s Length: Why the Lag Between Detection and Action Keeps Growing
Vulnerabilities: It's not their presence but their visibility and controlled management that defines secure development ...

ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they ...

Adversary-in-the-Middle Attacks Persist – Strategies to Lessen the Impact
Adversary-in-the-middle fraud (AiTM) represents a significant, ongoing challenge for businesses, with tactics like email hijacking, AI attacks and account takeovers becoming increasingly complex ...

Massive Increase to Unwanted Cell Calls
Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely give out the number so I assume one of the following:Ended up on a ...