AI dominates forty percent attacks

CybersecurityHQ weekly analysis

Welcome reader to your CybersecurityHQ report

Brought to you by:

👣 Smallstep Secures Wi-Fi, VPNs, ZTNA, SaaS and APIs with hardware-bound credentials powered by ACME Device Attestation

🏄‍♀️ Upwind Security – Real-time cloud security that connects runtime to build-time to stop threats and boost DevSecOps productivity

 📊 LockThreat – AI-powered GRC that replaces legacy tools and unifies compliance, risk, audit and vendor management in one platform

Forwarded this email? Join 70,000 weekly readers by signing up now.

Get annual access to our deep dives, weekly cyber intel podcast report, premium content, AI Resume Builder, and more — all for just $299. Corporate plans are now available too.

Introducing the CISO Access Plan Unlock premium CybersecurityHQ insights at no cost, exclusively for CISOs. Reach out to me to claim your access.

CISO Weekly Tactical Brief: AI Supply Chain Weaponized, Zero-Day Avalanche, Quantum Unicorns Rise

The cybersecurity landscape witnesses unprecedented convergence of threats as the first AI-weaponized supply chain attack infects 4M+ systems via NX Build Platform while 40% of all cyberattacks now leverage AI capabilities. Zero-days cascade across critical infrastructure: WhatsApp, iOS/macOS, SharePoint, Ivanti, FreePBX, and Android (120 vulnerabilities, 2 actively exploited) demanding emergency patching.

Quantum computing achieves commercial escape velocity with IQM's $320M unicorn round and 1000-qubit processors, compressing PQC timelines to 24 months. Supply chain compromises via Salesloft Drift hit Palo Alto Networks, Zscaler, and Cloudflare while npm packages target crypto developers. Geopolitical alignments crystallize as Xi-Putin-Modi summit signals coordinated campaigns, with 13 nations issuing joint warnings on Chinese infrastructure targeting. Meanwhile, crypto ecosystem faces $2.2B in annual thefts despite MITRE's new AADAPT defensive framework and SEC/CFTC regulatory approvals.

Strategic Reality

Traditional security models collapse under triple convergence: AI achieving offensive autonomy (NX Build Platform, 40% attack prevalence), zero-days proliferating faster than patches can deploy (6+ critical exploits this week alone), and quantum computing transitioning from theoretical to commercial threat ($320M funding, 1000-qubit reality).

The Salesloft supply chain breach demonstrates credential-based lateral movement at scale while state actors coordinate through formal summits. Enterprise AI deployments hemorrhage value (Salesforce 4,000 cuts) while criminals monetize immediately ($81K single-victim deepfakes). The 24-month quantum window demands immediate cryptographic inventory as geopolitical fractures drive sophisticated state campaigns.

Key Developments This Week

Zero-Day Avalanche

  • Microsoft SharePoint: Mass exploitation of on-premise servers globally; emergency patches deployed

  • WhatsApp/iOS/macOS: CVE-2025-55177 combo exploited in suspected spyware campaigns targeting Apple users

  • Android Emergency: 120 vulnerabilities patched including 2 under active exploitation

  • Ivanti Products: Zero-day exploitation in suspected nation-state attacks across multiple products

  • FreePBX Compromise: Emergency fix after servers hacked via undisclosed vulnerability

  • Fortinet FortiManager: CVE-2024-47575 under active zero-day exploitation

AI Weaponization & Metrics

  • NX Build Platform: First confirmed AI-weaponized supply chain attack; 4M+ weekly downloads infected

  • 40% AI-Driven Attacks: Industry data confirms AI now powers nearly half of all cyberattacks

  • Grok Weaponization: Threat actors hide malicious links in X's Grok video metadata

  • Multi-Agent Vulnerabilities: Data breaches, prompt injections proliferate in enterprise AI systems

  • Deepfake Sophistication: "General Hospital" impersonation extracts $81,000 from single victim

  • Claude Defense: Anthropic prevents weaponization attempts for automated cybercrime

Supply Chain Catastrophe

  • Salesloft Drift: Compromises Palo Alto Networks, Zscaler, Cloudflare; credentials used in active campaigns

  • npm Crypto Campaign: Malicious packages target Solana SDK and Ethereum smart contract developers

  • Python/NPM Attacks: New supply chain campaigns targeting Windows/Linux developers

  • Cyberhaven Extension: Browser extension compromise via phishing in supply chain attack

  • TransUnion Breach: 4.4 million records exposed in credit bureau incident

Quantum & Crypto Evolution

  • IQM Unicorn: Finnish startup raises $320M at $1B+ valuation; Ten Eleven Ventures leads

  • 1000-Qubit Milestone: Scientists achieve stable processor; "biggest leap since transistor"

  • MITRE AADAPT: New cryptocurrency security framework launched

  • Crypto Theft Crisis: $2.2B stolen in 2024 with DPRK prominent

  • SEC/CFTC Approval: Spot crypto trading authorized on U.S. exchanges

  • FDIC Guidance: Clarifies bank engagement rules for crypto activities

Geopolitical Coordination

  • Xi-Putin-Modi Summit: Strategic alignment signals coordinated cyber campaigns

  • 13-Nation Advisory: Joint warning on Chinese targeting of telecom/critical infrastructure

  • Iranian Embassy Campaign: 100+ diplomatic email accounts compromised globally

  • ODNI 2025 Assessment: Elevated threats from Russia, China, Iran, North Korea

  • Ukrainian FDN3: Massive brute-force against SSL VPN and RDP devices

  • Russian Hybrid Ops: Suspected attacks on EU infrastructure alongside ransomware campaigns

1-Minute Board/CEO Brief

Critical Metrics

  • 6+ zero-days actively exploited this week across core infrastructure

  • 40% of all attacks now AI-driven; first autonomous supply chain breach (4M+ infected)

  • $2.2B crypto thefts annually; quantum computing reaches commercial viability

  • 13 nations warn of Chinese infrastructure targeting; Xi-Putin-Modi alignment confirmed

  • Major vendors compromised: Palo Alto Networks, Zscaler, Cloudflare via Salesloft

Immediate Impacts

  • Emergency patching required across mobile, cloud, and network infrastructure

  • AI offensive capabilities outpacing defensive deployments by 18-24 months

  • 24-month window for quantum-resistant cryptography migration

  • Supply chain trust model fundamentally broken

  • Geopolitical cyber doctrine shifting from espionage to active disruption

Board Actions Required

  1. Emergency patching surge for 6+ critical zero-days

  2. AI security framework with offensive capability assumptions

  3. Quantum cryptography migration (24-month deadline)

  4. Third-party risk reassessment for all critical vendors

  5. Geopolitical threat modeling for technology supply chain

30-Day Action Plan

72 Hours (By September 6)

  • Patch SharePoint, WhatsApp, Android, Ivanti, FreePBX, Fortinet immediately

  • Scan for NX Build Platform and malicious npm/Python packages

  • Review Salesloft configurations and rotate affected credentials

  • Implement AI attack detection for 40% threat coverage

Week 1 (By September 10)

  • Complete zero-day patch verification across all systems

  • Deploy MITRE AADAPT framework for crypto operations

  • Audit all AI tools for multi-agent vulnerabilities

  • Review diplomatic/government communication security

Weeks 2-4 (By October 1)

  • Launch 24-month quantum migration program

  • Implement supply chain integrity verification (SBOM mandatory)

  • Deploy behavioral analysis for AI-generated attacks

  • Complete geopolitical vendor risk assessment

  • Establish deepfake detection protocols

Risk Assessment

Domain

State

Evidence

Response

Zero-Day Crisis

🔴 Critical

6+ active exploits, SharePoint mass attacks

Emergency patching, assume breach

AI Weaponization

🔴 Critical

40% attacks AI-driven, NX Build 4M infections

Behavioral analysis, AI governance

Quantum Timeline

🔴 Critical

$320M rounds, 1000-qubit live, 24 months

Immediate crypto inventory

Supply Chain

🔴 Critical

Salesloft major vendors, npm campaigns

Zero-trust, runtime protection

Geopolitical

🟠 High

Xi-Putin summit, 13-nation warning

Vendor diversification

Crypto Security

🟠 High

$2.2B thefts, DPRK activity

AADAPT framework deployment

This Week's Critical Incidents

  • NX Build Platform: 4M+ infected via AI supply chain (August 28-ongoing)

  • SharePoint Attacks: Global exploitation of on-premise servers (August 29-ongoing)

  • TransUnion: 4.4M records exposed (August 29)

  • Salesloft Breach: Palo Alto, Zscaler, Cloudflare compromised (August 30)

  • Embassy Campaign: 100+ diplomatic accounts (August 27-ongoing)

  • PayPal Claims: 16M credentials allegedly stolen (August 30)

  • DeepSeek AI: 1M+ sensitive logs exposed (August 31)

Market Dynamics This Week

Acquisitions & Funding

  • IQM Quantum: $320M Series B (largest quantum round)

  • Cato Networks → Aim Security ($350-400M negotiations)

  • CrowdStrike → Onum ($290M SIEM enhancement)

  • August total: $439M across 14 cybersecurity vendors

  • Crypto security valuations surge post-SEC approval

Regulatory Shifts

  • SEC/CFTC: Spot crypto trading approved

  • FDIC: Bank crypto engagement guidelines

  • MITRE: AADAPT framework release

  • UK: Ransomware payment ban proposal

Defensive Developments

  • Emergency Patches: Microsoft, Google, Apple, WhatsApp, Fortinet

  • Frameworks: MITRE AADAPT for cryptocurrency security

  • Industry: Quantum-safe migration consortiums forming

  • CISA: Expanded KEV catalog, SharePoint emergency directive

  • International: 13-nation joint advisory on Chinese threats

Critical Insights

AI Saturation Point: With 40% of attacks now AI-driven and the NX Build Platform proving autonomous weaponization viable, we've crossed from AI-assisted to AI-dominated threat landscape. Defense lags 18-24 months behind offensive innovation.

Zero-Day Velocity: Six critical exploits in one week signals either discovery acceleration or stockpile release. The SharePoint mass exploitation while patches exist suggests attackers move faster than enterprise patch cycles.

Quantum Commercial Reality: IQM's $320M round at $1B+ valuation transforms quantum from research curiosity to venture-backed threat. The 24-month PQC migration window is optimistic; assume 18 months.

Supply Chain Trust Collapse: Salesloft compromising Palo Alto Networks, Zscaler, and Cloudflare demonstrates that security vendors aren't immune. When security companies can't secure themselves, traditional vendor trust models become obsolete.

Geopolitical Crystallization: The Xi-Putin-Modi summit and 13-nation advisory mark formal acknowledgment of cyber warfare as primary conflict domain. Expect coordinated campaigns timed with diplomatic meetings.

Action Imperative: Organizations have 72 hours to patch six zero-days, 30 days to implement AI defenses for 40% of attacks, and 24 months for quantum preparation. Traditional quarterly planning is dead; only continuous adaptation survives.

Top Targeted Sectors & Attack Trends

Week-over-Week Comparison (Aug 21–27 vs Aug 28–Sep 3)

Sector

Change

Key Drivers

Other

↑ +300%

Broader mix of smaller incidents across emerging SaaS and startups.

Education

↑ +50%

Start of academic year saw ransomware and phishing spikes.

Government/Public

↑ +28%

Escalation of state-sponsored campaigns; geopolitical tensions raised targeting.

Healthcare

↑ +11%

Ransomware campaigns hit hospitals and clinics globally.

Technology & Cloud

↑ +6%

Continued targeting of SaaS, cloud APIs, and ACME-based attacks.

Industrial/OT

↓ –6%

Attacks shifted toward healthcare and education sectors.

Retail & Consumer

↓ –17%

Lower incident count; seasonal lull post-summer sales.

Financial Services

↓ –50%

Drop in major breaches reported; fraud stayed steady.

Utilities & Energy

→ 0%

No major shifts; steady baseline probing.

Attack Type

Change

Key Drivers

Other

↑ +50%

Mix of misconfigurations and unclassified incidents.

Ransomware

↑ +25%

High-profile cases (Jaguar Land Rover, Toyota India) drove volume.

State-Sponsored Espionage

↑ +20%

Chinese APT campaigns against government and defense contractors.

Malware/Infostealers

↑ +12%

Info-stealer variants (RedLine, Lumma) spread via phishing lures.

Vulnerabilities & Exploits

↑ +10%

Surge in zero-day disclosures and rapid exploit adoption.

Phishing/Social Engineering

↑ +8%

Start of school year drove student- and staff-targeted phishing.

Data Breach

↓ –9%

Fewer large-scale leaks disclosed; ongoing investigations continued.

Insider Threat

↓ –20%

No major new insider cases reported this week.

Denial-of-Service (DoS/DDoS)

→ 0%

Remained steady with no major new botnet activity.

Resource Alert

Immediate Resource Shifts Required:

  • Zero-Day Surge: 6+ active exploits require doubling patch team capacity for next 30 days

  • AI Defense Acceleration: 40% attack prevalence mandates immediate tool procurement (bypass normal RFP)

  • Quantum Timeline Compression: Previous 36-month plans must compress to 24 months

Budget Delta from Last Week:

  • Add $200-400K for emergency patching surge

  • Accelerate AI platform spending by 2 quarters

  • Double quantum consulting hours for Q4

Regulatory Radar

Immediate Action Required

Regulation

Deadline

Impact

Readiness Actions

NIST Cyber/Privacy Drafts

Sept 4, 2025

Volumes A and C standards

1 DAY - Submit today

NIST Ransomware IR 8374

Sept 11, 2025

Risk management revision

8 days remaining

NIST AI Standards

Sept 12, 2025

Zero drafts shape AI security

9 days - critical input

CISA SBOM Minimum Elements

Oct 3, 2025

Supply chain mandate

Draft comments now

EU AI Act Phase 2

Oct 15, 2025

High-risk AI audits

Classification urgent

Compliance Updates

Regulation

Deadline

Impact

Readiness Actions

CMMC Level 3

Nov 30, 2025

DoD eligibility (DFARS rule cleared OIRA)

Align with phased rollout

UK Ransomware Ban

Jan 1, 2026

Payment prohibition + SME checklists

Update IR, prep SME readiness

SEC Cyber Rules

Ongoing

4-day disclosure (Item 1.05 Form 8-K)

Rehearse with SharePoint incident

New This Week - Crypto Regulatory Shift

Immediate Effect

  • SEC/CFTC: Spot crypto trading approved on U.S. exchanges

  • FDIC Guidance: Bank crypto engagement rules clarified

  • MITRE AADAPT: Crypto security framework launched

Emerging Requirements

Expected Within 60 Days

  • AI Supply Chain Security mandate (post-NX Build incident)

  • Enhanced third-party risk requirements (Salesloft fallout)

  • Accelerated quantum-safe timelines

Draft Standards - Comments Critical

  • Quantum-Safe Standards: Oct 1 (28 days)

  • 13-Nation China tech vendor guidance: Implementation Q4

The Sept 4 NIST deadline requires immediate attention. The clustering of NIST deadlines (Sept 4, 11, 12) suggests coordinated regulatory push on AI and cyber standards.

CybersecurityHQ: This Week’s Reports Based on Technical Research and Academic Papers

→ Free

  1. Rebuilding trust in enterprise credential infrastructure 👉 Read the report

→ Pro subscriber-only

  1. Securing webhook integrations & call-back flows: A CISO's strategic guide 👉 Read the report

  2. Vulnerability fatigue: balancing awareness and noise 👉 Read the report

  3. Defining a defensible cybersecurity baseline: A board-level playbook for CISOs 👉 Read the report

And more inside - check out the full list here.

Cybersecurity Stocks

Market Intelligence

The cybersecurity market this week reinforced a widening divide: cloud-native leaders like Cloudflare (+91% YTD), Zscaler (+50%), and CyberArk (+37%) continue to command premiums, driven by investor confidence in zero-trust and identity-first security, while endpoint and detection vendors such as Rapid7 (-49%), SentinelOne (-19%), and Tenable (-22%) remain under pressure, reflecting doubts about their ability to counter AI-driven threats.

Infrastructure-heavy incumbents including Fortinet (-19%) and Akamai (-19%) deteriorated further, underscoring challenges for legacy models. The clear signal is that platform scale and AI-native architectures are attracting capital and valuations, while lagging players face mounting pressure toward consolidation.

Cyber Intel Brief: Key Insights from Leading Security Podcasts

This is what you missed in this week’s Cyber Intel Report sourced from top cybersecurity podcasts and webinars, if you haven’t upgraded your membership: 

  • AI democratization enables threat actors achieving 15-minute exploit development at $1 while 95% enterprises see zero ROI

  • 200-millisecond response windows render human-loop security obsolete with 93% attacks exploiting human factors not technical vulnerabilities

  • MFA bypass triggers $5M insurance denials while 70% networks run misconfigured firewalls described as "thousand-dollar deadbolts left unlocked"

  • OAuth supply chains compromise Salesforce across Palo/Zscaler through tenant federation as Storm-0501 destroys cloud backups demanding data ransoms

  • Tool exhaustion from managing 15-20 products creates "dashboards of doom" while North Korean operators without coding skills maintain engineering positions via AI assistance

And more insights in this week’s full CISO briefing.

Interesting Read

North Carolina Governor Creates AI Council, State Accelerator

North Carolina Governor Launches AI Council to Shape Statewide AI Strategy North Carolina Gov. Josh Stein has signed an executive order establishing an AI Leadership Council and a state AI Accelerator to guide the ethical and innovative use of AI in government operations.

The council, co-chaired by the state's CIO and Commerce Secretary, includes 24 members from tech, education, and public sectors, tasked with developing an AI roadmap, policy recommendations, and governance frameworks by mid-2026. The Accelerator will focus on AI research, risk assessments, and training, emphasizing applications in areas like cybersecurity, fraud detection, and procurement to boost efficiency while safeguarding privacy and security. This move positions North Carolina as a leader in responsible AI adoption amid growing state-level initiatives.

CISO implications:

  • Track emerging state AI policies for potential alignment with federal cybersecurity standards and enterprise adoption

  • Explore AI integrations for defensive tools, such as real-time threat detection and vulnerability assessments

  • Anticipate new requirements around AI ethics, data privacy, and risk management in public-private partnerships

    → Read more at GovTech

Fresh From the Field: Security Resources You Can Use

Title

Publisher / Authors

Focus

Access Link

A Shared Vision of Software Bill of Materials (SBOM) for Cybersecurity

U.S. Department of Defense, CISA, NSA, FBI, and international partners

Outlines a joint vision for SBOM adoption to enhance cybersecurity by improving software supply chain transparency, reducing vulnerabilities, lowering costs, and strengthening overall security postures through widespread implementation.

Read the Report

Standards, Compliance, and Enforcement Bulletin

North American Electric Reliability Corporation (NERC)

Delivers key updates on standards development, compliance monitoring, enforcement actions, and system maintenance schedules for the Align system, aimed at supporting electric reliability organizations in maintaining regulatory adherence.

Read the Report

September 2025 Android Security Bulletin

Google

Details security patches addressing multiple vulnerabilities in Android devices, including two zero-days under active exploitation, with emphasis on core framework and vendor-specific fixes to mitigate risks in mobile ecosystems.

Read the Report

LLMHoney: A Real-Time SSH Honeypot with Large Language Model-Driven Dynamic Response Generation

I.D. Lutz, A.M. Hill, M.C. Valenti

Introduces an LLM-enhanced SSH honeypot that generates dynamic, context-aware responses to deceive attackers, improving detection of sophisticated intrusions while providing insights into adversary tactics for better network defense.

Read the Report

Augmented Shuffle Differential Privacy Protocols for Large-Domain Categorical and Key-Value Data

Hao Guo, Zhaoqian Liu, Liqiang Peng, Shuaishuai Li, Ximing Fu, Weiran Liu, Lin Qu

Proposes privacy-preserving protocols using augmented shuffling for handling large-domain data in categorical and key-value formats, ensuring differential privacy while maintaining utility in secure multi-party computations for data analysis.

Read the Report

Social Media Highlights

Stay safe, stay secure.

The CybersecurityHQ Team

Reply

or to participate.