Assumptions are being exploited

CybersecurityHQ weekly analysis

Welcome reader to your CybersecurityHQ report

Brought to you by:

👉 Cypago – Cyber governance, risk management, and continuous control monitoring in a single platform

🏄‍♀️ Upwind Security – Real-time cloud security that connects runtime to build-time to stop threats and boost DevSecOps productivity

🤖 Akeyless – The unified secrets and non-human identity platform built for scale, automation, and zero-trust security

🧠 Ridge Security – The AI-powered offensive security validation platform

Forwarded this email? Join 70,000 weekly readers by signing up now.

#OpenToWork? Try our AI Resume Builder to boost your chances of getting hired!

Get lifetime access to our deep dives, weekly cyber intel podcast report, premium content, AI Resume Builder, and more — all for just $799. Corporate plans are now available too.

This Week in Cybersecurity: Insider Betrayals, State-Backed Exploits, and AI’s Fragile Defenses

The past week exposed cracks in our cybersecurity foundations: insider trust, supply chain integrity, and cryptographic safeguards. These were not isolated incidents but symptoms of a deeper shift. Adversaries are exploiting institutional assumptions, not just technical flaws. CISOs must redefine trust boundaries and rebuild resilience in a post-assumption era.

Three Defining Threats

Coinbase Insider Breach

Rogue contractors were bribed to leak customer data, triggering a $20M extortion attempt. Coinbase refused to pay, but losses may reach $400M. This wasn’t a perimeter breach; it was an internal collapse. Insider threats are now a primary vector, fueled by the commercialization of access in high-value environments.

Action: Shift to zero-standing privilege and continuous behavioral monitoring for all third-party access.

Chinese APTs Target Drone Supply Chains

Chinese hackers compromised drone vendors via firmware and component backdoors, establishing persistent access. This is geopolitical, not criminal: state actors are weaponizing commercial IoT for reconnaissance and control. Any high-density IoT sector is next.

Action: Mandate SBOM audits and source verification for all supply chain components.

OpenPGP.js Vulnerability

A critical flaw in OpenPGP.js allowed attackers to spoof encrypted messages, undermining trust in open-source cryptography. Enterprises relying on PGP for secure communications are exposed.

Action: Audit cryptographic dependencies and enforce reproducible builds.

Incident Distribution

This chart categorizes the week’s incidents by type, highlighting the dominance of state-backed and zero-day threats.

Major Security Incidents

Nucor Steel Ransomware: OT systems disrupted, highlighting ransomware’s economic impact on industrial uptime.

Relevance: OT environments remain soft targets due to weak segmentation.

Canadian Utility and Cellcom Breaches: Customer data stolen from a Canadian electric utility; Cellcom faced prolonged outages.

Relevance: Critical infrastructure lags in detection, with high attacker dwell times.

SK Telecom’s Three-Year Breach: Malware compromised 27M phone numbers over three years.

Relevance: Normalized persistence signals a cultural failure in telco security.

Chrome 136 Vulnerability: A flaw with an exploit in the wild targeted enterprises, patched May 16.

Relevance: Browser vulnerabilities demand rapid patch deployment.

Ivanti Exploits: Wiz reported ongoing exploitation of Ivanti vulnerabilities, impacting thousands of endpoints.

Relevance: SaaS platforms are critical attack surfaces requiring urgent patching.

SAP NetWeaver Flaws: Ransomware groups and Chinese APTs exploited vulnerabilities to deploy trojans.

Relevance: Legacy systems remain a weak link in enterprise security.

VMware ESXi/SharePoint Zero-Days: Exploited at Pwn2Own, exposing virtualization and collaboration platforms.

Relevance: Zero-days in enterprise software demand layered defenses.

Windows Zero-Day: CISA confirmed exploitation in the wild, impacting government agencies.

Relevance: Critical OS vulnerabilities require immediate response.

Strategic Investments

Proofpoint Acquires Hornetsecurity ($1B): Bolsters email and cloud security for SMBs via Hornetsecurity’s MSP network.

Relevance: Signals market consolidation toward integrated security platforms.

Palo Alto Networks Acquires ProtectAI: Enhances AI/ML security offerings.

Relevance: AI is a growing attack surface, requiring specialized defenses.

BreachRx Secures $15M Series A: Led by Ballistic Ventures, with Kevin Mandia joining the board.

Relevance: Incident response automation is critical as breach complexity rises.

AI Risk Brief: Phishing Kits Flood Dark Web

AI-powered phishing kits are proliferating on dark web forums, enabling low-skill attackers to launch sophisticated campaigns. These kits leverage AI to craft convincing emails, bypassing traditional filters.

Relevance: Enterprises must deploy advanced email security with real-time behavioral analysis.

Geopolitical Risk Brief

China’s Supply Chain Strategy: Drone sector attacks are part of a long-term access strategy. China’s new AI data center regulations signal tech sovereignty, complicating global collaboration.

South Korea-ASEAN Alliance: Enhanced AI cybersecurity cooperation counters North Korean threats, reflecting regional escalation.

G7 AI Supply Chain Focus: Updated frameworks urge vendor risk assessments to mitigate nation-state attacks.

CISO Watchlist: May 15-21, 2025

Event

Summary

Relevance

Coinbase Insider Breach

Insider data theft, $20M ransom refused

Third-party access is a primary breach vector

Chinese APTs Target Drones

Firmware supply chain attacks

State-level exploitation of commercial IoT

OpenPGP.js Vulnerability

Spoofing flaw in cryptographic library

Cryptographic trust is an active attack surface

Nucor Ransomware

OT systems disrupted

Industrial environments vulnerable to economic attacks

Ivanti Exploits

Thousands of endpoints compromised

SaaS platforms require urgent patching

Windows Zero-Day

Exploited in the wild, impacting agencies

Critical OS vulnerabilities demand rapid response

Strategic Guidance for CISOs

Insider Threat Overhaul: Implement zero-standing privilege and behavioral analytics for all vendors.

AI Defense Layering: Deploy external guardrails for LLMs, isolating inference from enterprise data.

Supply Chain Rigor: Use Dependency-Track or CycloneDX for SBOM validation. Segment telemetry from control systems.

Zero-Day Mitigation: Automate vulnerability scanning with tools like Tenable or Qualys. Prioritize critical patches within 48 hours.

Cryptographic Hygiene: Audit open-source crypto libraries and enforce reproducible builds.

OT Resilience: Conduct red-team exercises focused on dwell time. Shift budgets to active threat hunting over compliance.

Closing Signal

This week’s breaches exploited trust, not technology. Contractors betrayed, supply chains weaponized, and cryptography compromised: success came from our assumptions, not their innovation.

Rebuild systems to expect betrayal. Invest in insider threat programs, supply chain audits, and cryptographic rigor. The next wave of defense isn’t about stopping attacks; it’s about surviving them.

CybersecurityHQ: This Week's Reports Derived from Technical Research Papers and Briefings

🔒 Pro subscriber-only 🔒

  1. How federated cloud architectures support effective data sovereignty management in multinational organizations 👉 Read the report

  2. Key strategic considerations for developing effective multi-year cyber investment roadmaps in organizations 👉 Read the report

  3. Key security protocols enabling effective and trustworthy collaboration between human workers and AI systems in professional environments 👉 Read the report

  4. Optimizing recovery time objectives for cloud-native applications across diverse infrastructure failure scenarios 👉 Read the report

  5. Psychological operations in corporate settings: Impacts on employee morale, productivity, and organizational resilience 👉 Read the report

And more inside - check out the full list here.

Cyber Intel Brief: Key Insights from Leading Security Podcasts

This is what you missed in this week’s Cyber Intel Report sourced from top cybersecurity podcasts and webinars, if you haven’t upgraded your membership: critical insights, expert takes, and the latest threats unpacked. Don’t let this slip by—upgrade today to get the full scoop!

⤷ Microsoft Copilot used to exfiltrate secrets, no logs, no alerts
⤷ North Korean operatives using AI and deepfakes to bypass hiring gates
⤷ LockBit’s collapse sparks a wave of unpredictable ransomware spinoffs
⤷ ASUS installer exploit reminds us legacy tools are still liabilities
⤷ Voice cloning scams are hitting legal and finance teams across sectors

And more insights in this week’s full CISO briefing.

Interesting Read

D-Wave’s Quantum Leap: 4,400 Qubits Now Live in the Cloud

On May 20, 2025, D-Wave Quantum Inc. announced the general availability of Advantage2, a 4,400-qubit quantum system now accessible via its Leap cloud platform.

This marks a major step in bringing quantum computing to real-world use, enabling cloud-based solutions for complex challenges like supply chain optimization and cryptography testing.

CISO Insight: With quantum systems now live in production, preparing for post-quantum security is no longer optional.

Fresh From the Field: Security Resources You Can Use

Title & Source

Key Insights

Direct PDF/Link

Russian GRU Targeting Western Logistics Entities and Technology Companies
(CISA)

Details a GRU cyber campaign targeting Western tech and logistics firms linked to Ukraine support. Emphasizes TTPs used by Unit 26165 and provides detection/mitigation steps.

Download PDF

BBVA Big Data Geopolitics Monitor
(BBVA Research)

Analyzes geopolitical tension trends in Eastern Europe and the Middle East using big data. Focus on AI-powered disinformation and regional conflict escalation risks.

Download PDF

RedTeamLLM: An Agentic AI Framework for Offensive Security
(arXiv)

Introduces a novel framework for AI-driven offensive security using LLMs. RedTeamLLM autonomously performs pen-testing and uncovers zero-days pre-deployment.

Download PDF

Threat Actors Deploy LummaC2 Malware
(CISA)

Warns of active LummaC2 malware campaigns targeting corporate environments to exfiltrate sensitive data. Offers IOCs and defensive actions.

Download PDF

Cyber Considerations for 2025
(KPMG)

Forecasts strategic cyber trends for 2025, including AI policy risks, regulatory alignment challenges, and the rising role of boards in cyber oversight.

Download PDF

EY Geostrategic Analysis 2025
(EY)

Provides a real-time geopolitical risk dashboard covering 12+ global flashpoints. Focuses on how economic, technological, and conflict dynamics affect corporate geostrategy.

Read Report

How Is AI Changing the Geopolitical Landscape?
(Squire Patton Boggs)

A strategic dialogue on how AI is reshaping global power structures, including implications for diplomacy, military systems, and cyber warfare.

Watch Video

Social Media Highlights

Stay safe, stay secure.

The CybersecurityHQ Team

Reply

or to participate.