Cyber Weekly Digest #1
Cyber Vigilance
Security for an intelligent future... Protecting organisations through technical excellence and disruptive technology.
?? Welcome to the 1st edition Cyber Weekly Digest?of 2025
First things first...
?? NEW WEBSITE ALERT
You may have noticed a few changes over at CV HQ recently...
New Logo...
New Branding...
And now a new website!
We may look a bit different, but we are committed to continually provide our customers with the ?????????? service they deserve
Check out the new website here: www.cybervigilance.uk
?? Big start to the year for Cyber Vigilance as we announce our latest team member and Account Manager extraordinaire Ellie O'Shea
Having spent the last 7 years in Cyber recruitment, we are super excited to have Ellie's vast understanding of tech and the tech world. When Ellie isn't being an absolute boss at work she loves a bit of karaoke (quelle suprise for a member of the CV gang), cooking and hanging out with her dog. Welcome to the team Ellie!
?? Join team Cyber Vigilance and Censys in Glasgow on February the 6th for a Threat Hunting Workshop!
On the day we'll be covering:
?
New?and noteworthy?from our Technology Community this week:
??
?? Don't let limited software visibility impact your IT and security posture. With Axonius get a clear, credible and comprehensive inventory of all your software assets in a single, unified view on cloud, physical or virtual devices. Software Management, streamlined
?? In the latest edition of #AlwaysAhead at Arctic Wolf Chief Product and Services Officer Daniel Schiappa shares insight into why human risk persists as a major vulnerability and how advancements in #GenAI are set to shift the threat landscape in 2025.
Watch to learn:
?? What are the key strategies organisations can use to mitigate human risk from the C-suite to entry-level employees?
?? How does their cloud-native security operations platform assist organisations in building their cyber resilience to internal and external threats? ?
?
?? Join Immersive Labs on January 22nd 3pm for an exclusive webinar featuring IL experts and special guest Duncan Hayes Head of Cyber Defence for Hargreaves Lansdown.
They'll dive into the hottest topics in cybersecurity for 2025 and beyond, including:
?? Emerging threats: What challenges will cyber leaders face in 2025 and beyond?
?? The GenAI effect: How will GenAI impact cyber risk across the workforce?
? Hype vs. reality: What threats are overhyped, and what should your organisation focus on instead?
?
?? “Despite all of the new tools with new software, automation, and AI, things are continuing to become more complex in almost every dimension." Tom Atkins, Censys Sales AVP East
As attackers scale operations using AI, defenders must act faster. Balancing innovation with ethical standards will be a key focus in 2025.
Hear from their experts about what’s next in cybersecurity, including predictions on:
? AI adoption and misuse
? Evolving tools for talent accessibility
? The role of predictive threat hunting
?
?? Veracode announced they’ve acquired malicious package analysis, detection, and mitigation technology from Phylum, Inc. This acquisition enhances their ability to help customers protect against software supply chain risks like never before.
Through the integration of Phylum’s innovative technology, including a package management firewall and an unmatched malicious package database, they’ll easily identify and block malicious packages and vulnerabilities in real time. This means they can mitigate emerging software threats well before they impact customers.
Last?but not least... ?
?
?? Could your tenants be in jeopardy? Don’t become another statistic: Secure your Microsoft 365 for Free
CoreView recognise the complexities and challenges that come with securing and governing Microsoft 365 environments. That's why they offer a collection of FREE tools designed to empower your organisation against cyber threats and governance pitfalls:
1. Entra Security Scanner for App Registrations: In the aftermath of the Midnight Blizzard cyberattack, the security vulnerabilities associated with custom apps have become glaringly evident. Protect your Microsoft 365 from potential internal threats by identifying elevated custom app permissions with our specialised tool, developed by the renowned 9-time MVP Vasil Michev and our CTO, Ivan Fioravanti.
2. Microsoft 365 Governance Starter Kit: Considering that 58% of sensitive cloud data is stored within Teams and Microsoft 365, implementing robust governance is indispensable. Our Starter Kit offers essential assessment checklists and adaptable plan templates to help you swiftly pinpoint and address governance gaps, enabling a secure and efficient collaborative environment.
3. Admin Permissions Scanner for Microsoft 365: This free PowerShell tool, developed by Microsoft MVP Vasil Michev and CTO Ivan Fioravanti using advanced AI, swiftly analyses your admin roles. In just minutes, you'll receive a tailored report with actionable steps to remove unnecessary admin roles and secure your Microsoft 365 environment.
Don't let your organisation be vulnerable to cyber threats and governance challenges. Utilise CoreView’s free tools to strengthen your security posture and governance plans.
Now, let's take a look at our top Cyber Security News picks of the week
?
?
2024 had its fair share of high-profile cyber attacks, with companies as big as Dell and TicketMaster falling victim to data breaches and other infrastructure compromises. In 2025, this trend will continue. So, to be prepared for any kind of malware attack, every organization needs to know its cyber enemy in advance. Here are 5 common malware families that you can start preparing to counter right now...
?
?
Palo Alto Networks has released software patches to address several security flaws in its Expedition migration tool, including a high-severity bug that an authenticated attacker could exploit to access sensitive data. "Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and delete arbitrary files on the Expedition system," the company said in an advisory. "These files include information such as usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software."
?
?
Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. "Once thought dormant after its source code leak in late 2024, this new iteration introduces advanced string encryption inspired by Apple's XProtect," Check Point Research said in a new analysis shared with The Hacker News. "This development allows it to bypass antivirus systems, posing a significant risk to over 100 million macOS users globally." The cybersecurity company said it detected the new version in late September 2024, with the malware distributed using phishing websites and fake GitHub repositories under the guise of popular software such as Google Chrome, Telegram, and TradingView.
?
?
CrowdStrike is warning that a phishing campaign is impersonating the cybersecurity company in fake job offer emails to trick targets into infecting themselves with a Monero cryptocurrency miner (XMRig). The company discovered the malicious campaign on January 7, 2025, and based on the phishing email's content, it likely didn't start much earlier. The attack starts with a phishing email sent to job seekers, supposedly from a CrowdStrike employment agent, thanking them for applying for a developer position at the company.
?
?
BayMark Health Services, North America's largest provider of substance use disorder (SUD) treatment and recovery services, is notifying an undisclosed number of patients that attackers stole their personal and health information in a September 2024 breach. The Texas-based organization provides medication-assisted treatment (MAT) services targeting both substance use and mental health disorders to more than 75,000 patients daily in over 400 service sites across 35 U.S. states and three Canadian provinces. In data breach notification letters mailed to affected individuals, BayMark revealed that it learned of the breach on October 11, 2024, following an IT systems disruption. A follow-up investigation revealed that the attackers accessed BayMark's systems between September 24 and October 14.
?
That's it for this weeks tasty morsels...
?It's good to be back
?
Much ?? Stay Safe
The CV Team
?
Security for an intelligent future...
Partner Manager EMEA
1 个月new website looks great!
Account Manager at Cyber Vigilance / Podcast host for The Cyber Vigilance Podcast
1 个月New year new me!