Weekly cyber intel: Top security insights from podcasts

CybersecurityHQ Report - Pro Members

Welcome reader to your CybersecurityHQ report

-

Brought to you by:

👣 Smallstep – Secures Wi-Fi, VPNs, ZTNA, SaaS, and APIs with hardware-bound credentials powered by ACME Device Attestation

🏄‍♀️ Upwind Security – Real-time cloud security that connects runtime to build-time to stop threats and boost DevSecOps productivity

🔧 Endor Labs – App security from legacy C++ to Bazel monorepos, with reachability-based risk detection and fix suggestions across the SDLC

 📊 LockThreat – AI-powered GRC that replaces legacy tools and unifies compliance, risk, audit and vendor management in one platform

🧠 Ridge Security – The AI-powered offensive security validation platform

Forwarded this email? Join 70,000 weekly readers by signing up now.

#OpenToWork? Try our AI Resume Builder to boost your chances of getting hired!

Get lifetime access to our deep dives, weekly cyber intel podcast report, premium content, AI Resume Builder, and more — all for just $799. Corporate plans are now available too.

Critical Cybersecurity Intelligence Roundup

June 19–25, 2025
This week, cyber threats intensified at the intersection of geopolitics, AI misuse, and identity compromise. Iranian-aligned retaliation campaigns, AI-powered fraud, and systemic credential exposures tested the limits of enterprise resilience. As CISOs brace for AI-enabled adversaries and state-driven disruptions, foundational controls, AI governance, and public exposure management take center stage.

Nation-State Retaliation escalates targeting of OT and ICS systems amid geopolitical fallout
16B Credential Leak floods attack surfaces despite dataset duplication and credential reuse
Deepfake Vishing tactics evolve, cloning executive voices to trigger high-risk wire fraud
Shadow AI Proliferation bypasses governance, risking IP leakage and compliance violations
ASUS Router Exploits reveal silent botnet persistence in unmanaged edge devices
Broker-Fueled Targeting turns public data into real-world threats to executive safety


👇 Unlock the full report to see what top CISOs are doing about it.

Subscribe to CybersecurityHQ Newsletter to unlock the rest.

Become a paying subscriber of CybersecurityHQ Newsletter to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In.

A subscription gets you:

  • • Access to Deep Dives and Premium Content
  • • Access to AI Resume Builder
  • • Access to the Archives

Reply

or to participate.