Cyber Weekly Digest #8
Cyber Vigilance
Security for an intelligent future... Protecting organisations through technical excellence and disruptive technology.
?? Welcome to the 8th edition Cyber Weekly Digest?of 2025
?? This week Maxted & Butler braved the weather in the beautiful cities of Edinburgh and Glasgow.
Have been reliably informed that it was a wonderful trip, visiting some of our favourite customers, attending I-Confidential Cyber Connect and trying haggis for the first time.
Speaking of Scotland, we are now just a month away from Scot-Secure 2025 in Edinburgh. The event is fully booked and we can't wait to see you all there!
Back in the Stables we were graced with the presence of Team Imperva. Always an absolute pleasure to see the gang and talk about all things cloud & WAF
Some mass-debates going on in the office too this week. The ultimate culinary question... salad cream on crumpets... Yay or Nay?
Right then, enough waffle (would also smash with Salad Cream), let's crack on with what you've all been waiting for...
?
New?and noteworthy?from our Technology Community this week
?
?? Did you know Axonius are at the Gartner Identity & Access Management Summit in London on March 24-25th?
Join Amir Ofek, CEO of AxoniusX & ángel Uru?uela, Global CISO at Fluidra as they dive into:
? The biggest challenges in identity management today
? How Asset Intelligence meets Identity to drive security and efficiency
? A new approach to consolidated identity operations
Don't miss this game-changing session - see you there!
?? Register here
You can also join this Axonius webinar on March 13th as they dive deep into #CTEM and uncover:
? What is CTEM? They'll explain how it's changing cybersecurity.
? CTEM & #ZeroTrust: Learn how they work together to improve your security.
? Zero Trust Lessons: They'll share what worked (and what didn't) with Zero Trust to help you implement CTEM effectively.
? Actionable Strategies: Get practical steps to integrate CTEM and boost your security.
? CTEM Reality Check: They'll give you a realistic view of CTEM's strengths and weaknesses.
The future of cybersecurity is here... and it's called Continuous Threat Exposure Management (CTEM)
?? Register now and discover how CTEM can transform your cybersecurity strategy
?
?? Want to know more about Axonius? Click here
??
?? Veracode have been cooking up something BIG… the State of Software Security (SoSS) 2025 report (volume 15)
The report covers:
? Why organisations have more security debt (flaws that remain unfixed for over a year), despite having more tools
?? 5 key metrics for measuring maturity and where the most and least mature organisations stand
?? A new way of thinking about prioritisation and AI that could have a significant impact on your backlog
Hungry for a snippet?
?? Since 2020, the average time to fix security flaws has increased by 47%. Teams can’t keep up with the scale of flaws being created.
?? Half of organisations have critical security debt, meaning they have unresolved, high-exploitability vulnerabilities lingering for years and that they keep accumulating.
?? 70% of this critical security debt stems from third-party code and the software supply chain. Even if your developers aren’t using AI to generate code, the libraries they use likely are.
?? The report introduces a fresh perspective on maturity. Why a new view of maturity? Find out their perspective and the data behind it when you download your copy now!
?
?? Want a Veracode demo? Click here
?
?
?? Been watching 'Zero Day' on Netflix? Hell yeah!
Immersive's Kevin Breen shares his hot takes on the show in this InformationWeek article:
”They say that a zero day typically targets a single operating system, a single platform. This targeted multiple… we didn't think that was possible, I like that they call that out really early on.'”
It sets the big question - What is your organisation doing to be ready and resilient in the face of sophisticated cyber attacks?
Running regular cyber drills across your workforce with Immersive is the best way to practice, learn and prepare to handle the real thing.
These exercises help you:
? Develop rapid response capabilities
? Demonstrate regulatory compliance
? Boost employee skills and judgment
You can read more about how implementing cyber drills can strengthen your organisation's security posture, improve your ability to respond to and recover from cyberattacks, and protect your business from harm in this recent blog
?
?? Want to know more about Immersive? Click here
?
?? $3,000 every 4 hours!
That’s how much one company was losing to SMS pumping attacks before Cequence shut it down with ML-driven detection.
Attackers are abusing APIs that send SMS messages - costing businesses millions.
Learn how these attacks work and how to stop them before they drain your budget.
?? Watch the full fireside chat featuring William Glazier and Varun Kohli
That's not all... More traffic. More orders. No extra infrastructure. That’s the power of real API security.
Leveraging Cequence, a leading athletic-inspired fashion retailer is thriving in a competitive market - growing its e-commerce presence without increasing platform costs or risking security gaps. They’ve gained:
? Complete API visibility – Detecting risks before they become threats
? Seamless protection – No latency, no downtime, no disruptions
? Stronger security posture – Stopping bot attacks & API abuse before they impact revenue
?? Read all about it here
?
?? How does a global luxury conglomerate with 1,200+ stores protect its prestigious brands online?
By partnering with ZeroFox for comprehensive #EASM, of course!
In their latest case study, learn how this multinational luxury goods company consolidated their security tools and achieved:
?? Enhanced visibility across their digital portfolio
?? Faster vulnerability detection with AI-powered recommendations
?? Streamlined remediation processes
?? Improved #BrandProtection against counterfeits and impersonation
?
Sticking with the Fox's... Want exclusive insights into 2025's cyber threat landscape?
Join the 30-minute power briefing with ZeroFox's top #ThreatIntelligence experts on March 6th.
Get ahead of emerging threats with actionable insights on:
?? Emerging ransomware collectives and their evolving tactics
?? How generative AI is transforming cyber threats
?? Geopolitical factors reshaping the threat landscape Includes a live Q&A with their analysts!
?? Don't miss this opportunity to strengthen your security posture for 2025. Register here
?
?? Want to understand how we can help protect your brand with ZeroFox? Click here for a demo
?
Last?but not least...
?
?? Bringing women in #cybersecurity to the table
Join Bugcrowd on March 11 for a powerful discussion with female leaders like #Bugcrowd CMO - Emily Ferdinando, Lusha CISO - Einat Shimoni, Ethical Hacker - Katie Paxton-Fear and Least Authority CEO - Liz Steininger on breaking barriers and building careers in cyber. Whether you’re in the field or looking to break in, this one’s for you.
?? You can sign up here ?
?? Want to learn more about Bugcrowd? Click here
?
?
Now, let's take a look at our top Cyber Security News picks of the week
?
?
Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their business plans, or both. To drive informed decision-making and effective planning, the availability of hard data is essential—yet such data remains surprisingly scarce.
?
The “Enterprise GenAI Data Security Report 2025” by LayerX delivers unprecedented insights into the practical application of AI tools in the workplace, while highlighting critical vulnerabilities. Drawing on real-world telemetry from LayerX’s enterprise clients, this report is one of the few reliable sources that details actual employee use of GenAI.
?
For instance, it reveals that nearly 90% of enterprise AI usage occurs outside the visibility of IT, exposing organizations to significant risks such as data leakage and unauthorized access.
?
?
The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns and refining their attack methods.
?
This article is an overview of five notable malware families, accompanied by analyses conducted in controlled environments.
?
?
Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity.
?
This concise report makes a clear business case for why CTEM's comprehensive approach is the best overall strategy for shoring up a business's cyber defenses in the face of evolving attacks. It also presents a real-world scenario that illustrates how the business would fare against a formjacking attack under three security frameworks - Vulnerability Management (VM), Attack Surface Management (ASM), and CTEM. With VM, the attack might go unnoticed for weeks. With CTEM, simulated attacks detect and neutralize it before it starts.
?
Reassuringly, it also explains that CTEM builds on a business's current VM and ASM solutions rather than requiring them to jettison anything they currently use.
?
?
Cryptocurrency exchange Bybit on Friday revealed that a "sophisticated" attack led to the theft of over $1.5 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history.
?
"The incident occurred when our ETH multisig cold wallet executed a transfer to our warm wallet. Unfortunately, this transaction was manipulated through a sophisticated attack that masked the signing interface, displaying the correct address while altering the underlying smart contract logic," Bybit said in a post on X.
?
"As a result, the attacker was able to gain control of the affected ETH cold wallet and transfer its holdings to an unidentified address."
?
?
A new variant of the Vo1d malware botnet has grown to 1,590,299 infected Android TV devices across 226 countries, recruiting devices as part of anonymous proxy server networks.
?
This is according to an investigation by Xlab, which has been tracking the new campaign since last November, reporting that the botnet peaked on January 14, 2025, and currently has 800,000 active bots.
?
In September 2024, Dr. Web antivirus researchers found 1.3 million devices across 200 countries compromised by Vo1d malware via an unknown infection vector.
?
That's it for this weeks tasty morsels...
?
Much ?? Stay Safe
Team CV
?
Security for an intelligent future...
Account Manager - Cyber Security Advisor
22 小时前No excuse for salad cream on crumpets. Unacceptable behaviour on a par with Pineapple on pizza
EMEA & APJ Regional Marketing Manager at Bugcrowd
23 小时前My Friday favourite, thank you Cyber Vigilance for featuring our webinar for International Women's Day ??
Chief Revenue Officer (CRO) - Cyber Vigilance Ltd
1 天前Crumpets - Always loads of butter, with Bovril is my thing. Wonderful digest, thanks as always, Hayley W! x
Account Manager at Cyber Vigilance / Podcast host for The Cyber Vigilance Podcast
1 天前Salad Cream has no business on crumpets!!