Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Phishing Campaign Targets International Students in the US

The FBI has issued an alert on a wave of phishing attacks targeting Middle Eastern students who are studying in the US. The campaign has targeted students from the United Arab Emirates (UAE), Saudi Arabia, Qatar, and Jordan. The scammers impersonate government officials and claim there is an issue with the student’s visa.

The Ransomware Threat: Still Alive and Kicking

Many organizations, after a period of relative quiet, might believe the ransomware bubble has burst. The headlines may have shifted, and other emerging cyber threats might seem to dominate the news cycle, but recent data from Marsh's 2024 UK cyber insurance claims report suggests otherwise. It paints a stark picture of an ongoing and evolving threat landscape. While claims decreased by 20% compared to 2023, they remained significantly higher than in previous years.

How the 4 Elements of Fraud Power Modern Scams

Many of today’s most damaging scams are built on repeatable, well-understood patterns. The legal world defines four core elements of fraud with direct applicability to today’s phishing, impersonation, and account takeover (ATO) threats: By understanding this structure, security leaders and fraud teams can spot threats earlier and counter them more effectively.

How to Build an Insider Threat Program [10-step Checklist]

An effective insider threat program is a core part of any modern cybersecurity strategy. Having controls in place to detect and respond to insider attacks is necessary to protect your organization’s sensitive data and critical systems. It’s also a requirement of many IT regulations, standards, and laws. An insider threat program can enhance your overall cybersecurity and support compliance with HIPAA, PCI DSS, and NIS2, among others.

Attackers Abuse TikTok and Instagram APIs

It must be the season for API security incidents. Hot on the heels of a developer leaking an API key for private Tesla and SpaceX LLMs, researchers have now discovered a set of tools for validating account information via API abuse, leveraging undocumented TikTok and Instagram APIs. The tools, and assumed exploitation, involve malicious Python packages - checker-SaGaF, stein lurks, and inner core - uploaded to PyPI.

How To Get a Child an IP PIN and Protect Their Identity

An IP PIN is a six-digit code that protects US residents from fraudulent tax submissions. Electronic tax filings require an IP PIN and Social Security Number, allowing the former to act as a form of two-factor authentication. While IP PINs are primarily used by adults, they can also protect minors from having their identities used by fraudulent actors. A child without an IP PIN is at risk of having their identity used to file fake taxes.

SafeBreach Coverage for US CERT AA25-141B (Sticky Werewolf)

On May 21, 2025, the FBI and CISA released a joint Cybersecurity Advisory (CSA), designated AA25-141B, warning about the rise in attacks leveraging LummaC2, attributed to a threat group referred to internally as Sticky Werewolf, this cyber espionage campaign has used LummaC2 malware since at least April 2023 to target Russian and Belarusian government agencies, science centers, and aviation manufacturers.

Resolving a request smuggling vulnerability in Pingora

On April 11, 2025 09:20 UTC, Cloudflare was notified via its Bug Bounty Program of a request smuggling vulnerability (CVE-2025-4366) in the Pingora OSS framework discovered by a security researcher experimenting to find exploits using Cloudflare’s Content Delivery Network (CDN) free tier which serves some cached assets via Pingora.

Exploited! Grafana CVE-2025-4123 - Open Redirect & Stored XSS Give Attackers a Springboard Into Your Cloud

Grafana—the cloud-native observability dashboard almost every DevOps team relies on—rushed out Grafana 12.0.0-security-01 yesterday to squash CVE-2025-4123, a high-severity open-redirect and stored cross-site scripting (XSS) vulnerability. When chained with the popular Grafana Image Renderer plugin the bug escalates to a full-read server-side request forgery (SSRF), exposing cloud-metadata services and internal APIs.