Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 19, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Coinbase Insider Threat Leads to Theft of Customer Data Coinbase has released a blog post and filed an SEC Form 8-K reporting an incident whereby they received an email attempting to extort the company for $20m. According to the post, the threat actors approached customer support staff and “used cash offers to convince a small group of insiders to copy data in our customer support tools”. Stolen data includes personal details including identity documents and account data include balance and transaction history.

BNPL Fraud Risks: Why 'Buy Now, Pay Later' Is a Target for Cybercriminals

Buy Now, Pay Later services offer a more flexible method for online purchases. Consumers aren't required to make an immediate, full payment; they can instead split the sum into a schedule that works for them. These services work similarly to credit cards but do not incur interest fees over time. Most people have seen Klarna, Afterpay, or Affirm offered on Amazon or other e-commerce websites. They are the most popular BNPL providers, but the market is steadily growing.

Why You Can't "SAST" Your Way Through AI Security #AppSec #LLMs #CloudSecurity #Cybersecurity

AI apps break the traditional rules of application security. Here’s why: AI is cloud-native from day one. That means you’ve got runtime risk before your app even launches. Static analysis (SAST) doesn’t cut it. You can’t predict risk from just looking at code. AI models are just vectors. You need new methods.

Top Security Threats Worldwide Q4 2024

Join WatchGuard Director of Security Operations Marc Laliberte and Security Engineer Trevor Collins as they discuss key findings from the WatchGuard Threat Lab’s Q4 2024 Internet Security Report. They’ll cover the latest malware and network attack trends targeting small and midsized enterprises and defensive tips you can take back to your organization to stay ahead of modern threat actor tactics.

2025 Ransomware Update with Ryan Estes - The 443 Podcast - Episode 329

This week on the podcast, we bring on Ryan Estes from the WatchGuard Threat Lab to discuss the latest trends in ransomware operations. Ryan is an expert in ransomware analysis and currently owns the data behind WatchGuard's public Ransomware Tracker on the WatchGuard Security Center. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

How external attack surface analysis enhances pen testing

Despite advancements in security, web applications are still a problem. Attackers target web applications because they’re exposed, complex, and not as well protected as they should be. According to Verizon1, web applications are the most prevalent attack vector, with exploitations of vulnerabilities increasing by 180% in 2024.

A Complete Guide to EC2 Instance Backup: AWS Snapshots vs. AMIs

Amazon Web Services (AWS) provides two native options that can be used to back up AWS EC2 instances – AWS EBS Snapshots and Amazon Machine Images (AMIs). This blog post explains the differences between these two approaches to backup and explains when each method is optimal. NAKIVO for AWS EC2 Backup Backup of Amazon EC2 instances to EC2, AWS S3 and onsite. Anti-ransomware options. Fast recovery of instances and application objects. DISCOVER SOLUTION.

A Sting on Bing: Bumblebee delivered through Bing SEO poisoning campaign

Bumblebee is a downloader malware which has become known for its sophistication and effectiveness. The malware was first discovered in 2022 and was believed to be a tool for ransomware groups due to the developer’s close ties with Conti. Since then, it has been used in various attacks and has been delivered through multiple methods, including phishing emails, malicious documents, and SEO poisoning.