Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS | Google Cloud Blog

Mandiant describes an expansion of ShinyHunters-branded extortion operations that leverage vishing and victim-branded credential harvesting to compromise single sign‑on (SSO) credentials and enroll unauthorized devices into victim MFA, enabling access to cloud SaaS environments. Immediate containment (revoke sessions, pause MFA registration, restrict password resets) plus long‑term hardening (phishing‑resistant MFA, IdP/SaaS logging and detections) are recommended to stop exfiltration and persistence. #ShinyHunters #Okta

Read More
TRM Global Crypto Policy Review Outlook 2025

TRM Labs’ Global Crypto Policy Review & Outlook 2025/26 surveys policy developments across 30 jurisdictions, showing stablecoins at the center of regulatory efforts, rising institutional adoption, and clearer rules reducing illicit activity among regulated VASPs. The report highlights critical incidents and coordination gaps—most notably North Korea’s $1.5 billion hack of Bybit—and calls for consistent cross-jurisdictional standards and real-time information sharing to limit exploitation of unregulated infrastructure. #Bybit #NorthKorea

Read More
Ransom! Beacon Mutual Insurance (JAN-2026)

Beacon Mutual Insurance Company, based in Warwick, RI and serving Rhode Island with operations in MA and CT, suffered a major data leak attributed to threat actor incransom, exposing approximately 275 GB of internal data. The leaked archive includes internal corporate documents, complete financial statements (2018–2025), full employee lists with personal details, confidential agreements, NDAs, vendor contracts, detailed workers’ compensation claims data, and PII of employees and claimants #UnitedStates

Read More
The Cyber Express Weekly Roundup: Threats, Regulations, and Digital Security Trends

This weekly roundup covers major global cyber incidents, emerging threats in AI and ad fraud, critical zero-day patches, and growing regulatory scrutiny affecting public and private sectors. Highlights include the disruptive attack on Russian security firm Delta, the discovery of the ShadowHS Linux post-exploitation framework, Ivanti emergency fixes for CVE-2026-1281 and…

Read More
CNIL Fine on France Travail After Hack Exposes 20 Years of Job Seekers’ Personal Data

On January 22, 2026, France’s data protection authority, the CNIL, imposed a €5 million fine on France Travail for failing to properly secure the personal data of job seekers following a major 2024 breach. Investigators found that social engineering against CAP EMPLOI adviser accounts, weak authentication, overly broad permissions and poor…

Read More
Ad Fraud Is Exploding — Dhiraj Gupta of mFilterIt Explains How Brands Can Respond

Ad fraud has escalated into a systemic threat to the digital economy, with mobile fraud rising 21% in 2024 and programmatic ad fraud costing the industry nearly $50 billion. During Data Privacy Week 2026, experts like Dhiraj Gupta of mFilterIt emphasize that independent verification, real-time data-flow audits, and continuous partner accountability…

Read More
Cybersecurity News | Daily Recap [29 Jan 2026]

Daily Recap, The day’s cybersecurity news shows ongoing exploitation of the WinRAR CVE-2025-8088 to drop silent payloads into Windows Startup folders by nation-state and criminal groups. It also highlights high-severity flaws such as Grist Core RCE in Pyodide, React2Shell deserialization, Fortinet FortiOS SSO bypass, and other attacks, underscoring urgent patching and proactive defense. #WinRAR #React2Shell

Read More
Marquis blames ransomware breach on SonicWall cloud backup hack

Marquis Software Solutions says the August 2025 ransomware attack that affected dozens of U.S. banks and credit unions was enabled by firewall configuration data stolen from SonicWall’s MySonicWall cloud backup rather than by exploiting an unpatched firewall. SonicWall later confirmed all cloud backup customers were impacted, Mandiant linked the breach to state-sponsored actors, and Marquis is evaluating options to seek recoupment for response costs. #MarquisSoftwareSolutions #SonicWall

Read More
Cyber Insights 2026: Zero Trust and Following the Path

SecurityWeek’s Cyber Insights 2026 aggregates dozens of expert perspectives that frame zero trust as an ongoing, identity-first journey complicated by AI, non-human identities, OT/IT convergence, and legacy perimeters. Experts emphasize continuous verification, microsegmentation, and measured incremental progress—while warning that AI, regulation, and insurance will both accelerate adoption and introduce new risks….

Read More
PwC and Google Cloud Ink 0 Million Deal to Scale AI-Powered Defense

PwC and Google Cloud are expanding their strategic alliance with a $400 million, three-year commitment to build AI-powered security operations. The partnership will integrate Google’s threat intelligence and security technologies with PwC’s transformation and managed services to create a proactive, AI-driven security platform for hybrid and multi-cloud environments. #PwC #GoogleCloud…

Read More
TRM Global Crypto Policy Review Outlook 2025

Black Duck’s “The Global State of DevSecOps: Balancing AI Usage and Risk in 2025” finds that organizations have achieved high deployment velocity but are accumulating security debt because of manual processes, tool sprawl, and overwhelming false positives that slow development. The report also describes AI as a double-edged sword—widely adopted and improving secure coding for many, yet introducing new risks and shadow-AI governance gaps that demand developer-centric workflow integration and formal AI governance. #BlackDuck #GitHubCopilot

Read More
Cyber Insights 2026: Offensive Security; Where It is and Where Its Going

Offensive security and red teaming are shifting from periodic exercises to continuous, AI-augmented programs that combine automation, threat intelligence, and human expertise to find and fix vulnerabilities faster. This evolution includes hybrid in-house and external models, greater collaboration with blue teams, and an urgent focus on combating AI-enhanced social engineering. #Bugcrowd…

Read More