Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 27, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Joint Cybersecurity Advisory released on KTA007 (APT28) A joint advisory has been released warning of Russian-attributed threat actors targeting western logistics entities and technology companies since 2022. Microsoft leads global action to disrupt LUMMASTEALER Microsoft’s Digital Crimes Unit has recently seized and facilitated the takedown, suspension, and blocking of approximately 2,300 malicious domains that formed the backbone of LUMMASTEALER infrastructure.

The MemcycoFM Show: Episode 3 - Memcyco Recognized in Datos Insights' 2025 Fintech Spotlight Report

The battle for digital trust is intensifying. Fraudsters are no longer lone actors, they’re industrialized operations, using AI-driven phishing kits and Phishing-as-a-Service models to exploit businesses and their customers at unprecedented speed. In this environment, traditional fraud defenses are collapsing under the weight of innovation they weren’t designed to face.

The MemcycoFM Show: Episode 2 - How to Choose the Best Domain Takedown Service

If you’re searching for the best domain takedown service, chances are your brand has already been impersonated, or you’re proactively trying to stop that from happening. Either way, you know the stakes: malicious sites that mimic your brand can destroy trust, harvest credentials, and cost your business real revenue. Of course, ‘best’ depends on your threat landscape and internal priorities. This episode breaks down what actually matters so you can choose the right fit for your needs.

Entra ID OAuth Single Sign-On (SSO) | Log into Joomla using Entra ID as OAuth Client

Learn how to set up Entra ID OAuth Single Sign-On (SSO) with your Joomla website using our Joomla OAuth Client extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Entra ID, allowing users to log into Joomla with their Entra ID credentials using the OAuth protocol. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

OneLogin SAML Single Sign-On (SSO) | Log into Joomla using OneLogin

Learn how to set up OneLogin SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and OneLogin, allowing users to log into Joomla using their OneLogin credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Okta SAML Single Sign-On (SSO) | Log into Joomla using Okta

Learn how to set up Okta SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Okta, allowing users to log into Joomla using their Okta credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Entra ID SAML Single Sign-On (SSO) | Log into Joomla using Entra ID

Learn how to set up Entra ID SAML Single Sign-On (SSO) with your Joomla website using our Joomla SAML SP extension. This tutorial guides you through the process of configuring SSO between your Joomla site and Entra ID, allowing users to log into Joomla using their Entra ID credentials. Timestamps: Contact us at joomlasupport@xecurify.com if you have any queries.

Don't Let Data DRAIN Your Budget! #cybersecurity #appsec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Signal and TeleMessage - The 443 Podcast - Episode 330

This week on the podcast, we cover Coinbase's recent filing with the SEC that described an insider threat event that led to a ransomware extortion. After that, we dive into Signal and other secure messaging apps, how they protect communications, and how other apps can undermine those protections. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

Charlotte AI - Agentic Workflows - Hunting Fake CAPTCHAs

Adversaries are faking CAPTCHAs to trick users into running malicious commands—and using AI to make it convincing. See how CrowdStrike’s Charlotte AI and Agentic Workflows detect these threats, automate response with context-aware actions, and adapt based on risk. CrowdStrike Charlotte AI: ► Work smarter, not harder. Turn hours of work into minutes, or even seconds, with a conversational AI assistant.