Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 45 - Teen Hackers, SIM Swaps & Russian Ransomware

In Part 2 of our Russia cyber threat series, we unpack the Western cybercrime ecosystem powering Russian ransomware operations. We examine *Scattered Spider, LAPSUS$, and Shiny Hunters*, and how social engineering, SIM swapping, MFA bypass, and AI-driven voice spoofing are breaching Fortune 100 companies — without zero-days. Learn how access brokers commoditize breaches, why help desks are prime targets, and what this shift means for CISOs and security teams.

Sensitive Enterprise Data Is Flowing Into AI Tools at Scale

AI has no-so-quietly shifted from a single interface used by a small group of specialists into a mainstream capability embedded across enterprise infrastructure. Employees are now operationalizing AI for core business functions across departments. This shift fundamentally changes how organizations must think about data security.

FortiOS VPN Auth Bypass Flaw (CVE-2026-22153) Exposes Remote Access

LDAP is commonly used as a centralized authentication backend for VPN gateways. In a typical setup, users submit credentials to the VPN service, which forwards them to the LDAP server for validation. The VPN gateway then grants or denies access based on the response it receives. CVE-2026-22153 does not rely on malformed packets or memory corruption. Instead, it stems from flawed authentication logic, where certain LDAP response states can be misinterpreted under specific configurations.

What is Credential Stuffing? A Complete Prevention Guide for Enterprises

Credential stuffing attacks have become one of the most common, yet underestimated, cybersecurity threats facing businesses today. Even with strong firewalls and the latest endpoint protection, organizations still lose millions every year to stolen login credentials reused across accounts. What’s worse, these attacks often stay undetected until real damage occurs, which includes data breaches, customer account takeovers, and regulatory penalties.

6 Steps for Effective Data Exfiltration Incident Response

Data exfiltration incidents are some of the hardest cases to handle in DFIR. There’s no malware signature, no ransom demand, and usually, no clear intrusion point. You just get a vague alert (or worse, a tip from legal), and suddenly, you’re under pressure to figure out what data was taken, how it happened, and whether any evidence still exists. Miss one key detail, and you risk losing the trail. Or in some cases, corrupting evidence that legal teams or regulators will need later.

Lookout Expands Protection Following Google's Disruption of the IPIDEA Proxy Network

Last week, Google’s Threat Intelligence Group announced the disruption of IPIDEA, one of the largest and most abused residential proxy networks observed in the wild. IPIDEA quietly turned millions of consumer devices into proxy exit nodes, enabling cybercrime, espionage, and botnet activity—while putting users and enterprises at risk. At Lookout, we acted immediately.

Introducing the Keeper Security Slack App

The Keeper Security Slack App brings zero standing privilege and streamlined credential workflows directly into Slack – the platform your team already uses every day. This powerful integration connects your Keeper Vault with Slack, enabling secure credential access requests and approvals without ever leaving your workspace.

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

Cyber Resilience: The New Standard for Trust in UK Law Firms

In the legal profession, trust has always been the foundation of the client-firm relationship. Today, that trust is no longer granted by default; it must be continuously earned and, more importantly, proven. For law firms across the UK, cyber resilience has evolved from a back-office IT issue into a critical component of client due diligence. Clients do not just expect you to protect their data—they require you to demonstrate your capability to do so under any circumstance.