Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 19, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Coinbase Insider Threat Leads to Theft of Customer Data Coinbase has released a blog post and filed an SEC Form 8-K reporting an incident whereby they received an email attempting to extort the company for $20m. According to the post, the threat actors approached customer support staff and “used cash offers to convince a small group of insiders to copy data in our customer support tools”. Stolen data includes personal details including identity documents and account data include balance and transaction history.
Featured Post

Improving Cyber and Mental Resilience with Threat Information Sharing

In a world where data provides companies with a competitive advantage, sharing it amongst other businesses, especially in the same industry, may seem counterproductive. However, in cybersecurity, where every company is a potential target for threat actors and organizations are increasingly interconnected through supply chains, sharing information can significantly enhance a company's security posture and overall resilience.

The Value of Threat Intelligence in Ensuring DORA Compliance

“Expect the unexpected” is a saying that holds particular weight in cybersecurity. In 2025, with continuing technological advancement, the divide between game-changing business opportunities and serious cyber threats has never been starker. With innovation and disruption unlikely to slow the pace any time soon, all sectors must build their operational resiliency to stay ahead and ensure stability.

Top 5 Proactive Threat Intelligence Use Cases for Enhanced Cyber Defense

In this fast-moving world where businesses operate completely through IT infrastructure, waiting for a threat to happen and finding a solution isn’t enough. There should be a proactive approach, where you spot and remove a threat even before it touches your systems.

May 12, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Software Supply Chain Attack on Golang Leads to Wiper Malware A supply-chain attack has been discovered that targeted Linux servers through malicious Golang modules, mimicking legitimate modules, that were posted on GitHub. Continued Exploitation of Critical SAP NetWeaver Critical Vulnerability Further to Kroll’s reporting in previous weeks regarding active exploitation of CVE-2025-31324, a critical vulnerability that allows a threat actor to execute code remotely.

Building a Proactive Threat Intelligence Program: Exclusive Guide For A CISO

As cyber threats grow more advanced and persistent, traditional reactive defences are no longer enough. Today’s security leaders must shift toward proactive threat intelligence, anticipating and neutralising risks before they evolve into serious breaches.

How to Adopt DORA's Threat-Led Penetration Testing Requirements

The new Digital Operational Resilience Act (DORA) requires significant financial entities in the EU to carry out Threat-Led Penetration Testing (TLPTs) on a regular basis. However, the skills required along with the planning for these types of exercises can prove difficult and time consuming. During this session, Kroll brings together our red teaming, threat intelligence and DORA regulatory compliance experts to provide practical guidance on how security, risk and resiliency leaders can adopt a sustainable threat-led penetration testing (TLPT) program as required by DORA.

Security Bulletin: Magecart Skimming Campaign

Magecart is a long-running digital skimming threat attributed to multiple financially motivated cybercriminal groups specializing in the theft of payment card data from e-commerce websites. First identified in 2015, Magecart attacks have continuously evolved, leveraging compromised third-party services, supply chain vulnerabilities, and increasingly sophisticated obfuscation tactics to inject malicious JavaScript skimmers into checkout pages.

Navigating the New Cyber Threat Landscape: Why Irish SMEs Must Think and Act Differently

Let’s be honest, keeping your business safe online feels like a never-ending race these days, especially for Small and Medium Enterprises (SMEs). At Intuity Technologies, we see it every day: the bad guys are getting smarter, faster, and ultimately relentless. With IT budgets often stretched thin, and the digital world constantly developing – it’s tougher than ever for SMEs to stay secure.

Chaining CVE-2024-38475 and CVE-2023-44221 for Full System Compromise

CVE-2024-38475 is a critical vulnerability in the Apache HTTP Server’s mod_rewrite module that permits arbitrary file read operations under specific configurations. This flaw arises from inadequate sanitization of user-controlled input passed to RewriteRule directives, which allows attackers to traverse the filesystem by manipulating server variables and regex capture groups.