Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top tips: Cyber hygiene habits you can build this week

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re breaking down the simple cyber hygiene habits that can make your digital life safer, calmer, and far easier to manage. If digital life had a skincare routine, most of us would be walking around with unwashed faces and expired sunscreen.

Extortion-as-a-Service: The Latest Threat Actor Criminal Ecosystem

For centuries, threat actors, both cyber and physical, have understood the benefits of using extortion to further their criminal activities. This has led some cyber threat groups to create Extortion-as-a-Service (EaaS) businesses. These are a formalized way for cybercriminals to offer extortion services to others for a fee or profit share. And, as we shall see, it is just one of many newer -as-a-service models that threat actors are applying.

Why Choose Active Directory Management Over Manual Scripts

A mid-sized company once tried to handle all its AD updates with a set of PowerShell scripts. Things worked fine while the user count was small, but trouble showed up once they crossed a thousand accounts. A script missed a group update, a disabled user stayed active for two extra days, and a bulk change took almost an entire afternoon to fix. None of this was a technical failure. It was the natural limit of manual scripting.

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Let’s face it: humans are creatures of habit, and nothing rattles us quite like the prospect of change. (Just ask anyone who’s dared to swap out the office coffee brand—revolutions have started over less.) According to SHRM's research on change fatigue, today’s relentless pace of disruption is exhausting employees faster than a budget ergonomic chair. But here’s where it gets fascinating—where security, HR, and fraud analysis converge in ways you might not expect.

Enumerating Users and Mailboxes in Microsoft Outlook 365 Web

During our research into Microsoft 365 security, we discovered a flaw in Outlook on the web (OWA) that exposed information about users and their mailboxes. By manipulating certain request headers against the “/owa/service.svc” endpoint, an attacker could not only confirm whether a user account existed, but also determine if that account had a mailbox associated with it.

CVE-2025-10573: Critical Unauthenticated Stored XSS in Ivanti Endpoint Manager

A newly disclosed vulnerability in Ivanti Endpoint Manager (EPM) tracked as CVE-2025-10573 allows unauthenticated attackers to inject persistent JavaScript into the EPM administrative dashboard. Assigned a CVSS score of 9.6, this vulnerability presents a critical security risk because it enables attackers to hijack administrator sessions and gain full control over managed endpoints.

Data Leakage: AI's Plumbing Problem

Sensitive information disclosure ranks on the OWASP Top 10 for LLM Applications, and for good reason. When AI-powered applications inadvertently expose private data like personally identifiable information (PII), financial records, health information, API keys, or proprietary business intelligence, the consequences cascade quickly: regulatory violations, competitive disadvantage, and shattered user trust.