loader from loading.io

Week in Review: Disabling Microsoft Defender, corrupted power inverters, bipartisan training bill

Cyber Security Headlines

Release Date: 05/23/2025

Russian bomber maker popped, vishing targets Salesforce, MS helps out governments show art Russian bomber maker popped, vishing targets Salesforce, MS helps out governments

Cyber Security Headlines

Ukraine claims cyberattack on Russian bomber maker Vishing campaign targets Salesforce Microsoft lends a hand to European governments Huge thanks to our sponsor, Conveyor Ever wish you had a teammate that could handle the most annoying parts of customer security reviews? You know, chasing down SMEs for answers, updating systems, coordinating across teams—all the grunt work nobody wants to do.  Plus, having to finish the dang questionnaire itself.  Well. That teammate exists—Conveyor just launched Sue, the first AI Agent for Customer Trust. Sue really is the dream teammate. She...

info_outline
Meta, Yandex take heat on browsing identifiers, Acreed malware makes gains, HPE warns of critical auth bypass show art Meta, Yandex take heat on browsing identifiers, Acreed malware makes gains, HPE warns of critical auth bypass

Cyber Security Headlines

Meta and Yandex are de-anonymizing Android users’ web browsing identifiers LummaC2 fractures as Acreed malware becomes top dog Hewlett Packard Enterprise warns of critical StoreOnce auth bypass Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires?  Your team probably spends hours daily juggling the back and forth of completing these security requests. That's why Conveyor created Sue, the first AI Agent for Customer Trust. Sue doesn't just handle completing security questionnaires and sending SOC 2 to prospects – she manages all the...

info_outline
MS and CrowdStrike partner, Qualcomm bugs exploited, new CISA cut details show art MS and CrowdStrike partner, Qualcomm bugs exploited, new CISA cut details

Cyber Security Headlines

Microsoft and CrowdStrike partner to link threat actor names Qualcomm sees Adreno bugs under active exploitation New details on proposed CISA cuts Huge thanks to our sponsor, Conveyor Does trying to get the security questionnaire done and back to your customer ever feel like you’re herding cats? It’s not answering questions - most of you have automation software for that. It’s all of the manual back and forth that becomes a slog like communicating between teams, tracking people down to get their review, updating sources and updating systems. Conveyor just launched an AI agent, Sue, to...

info_outline
Cisco IOS XE exploit, Senators’ CSRB request, Australia ransomware law show art Cisco IOS XE exploit, Senators’ CSRB request, Australia ransomware law

Cyber Security Headlines

Exploit for maximum severity Cisco IOS XE flaw now public Senators as for reinstatement of cyber review board to work on Salt Typhoon investigation Australian ransomware victims now must report their payments Huge thanks to our sponsor, Conveyor launched the first AI Agent for Customer Trust. So wtf does that mean? It means the AI agent goes beyond just sharing NDA-gated documents like a SOC 2 with customers or answering security questionnaires. Conveyor’s AI Agent, Sue, handles the entire security review process from start to finish.  She answers every customer request from sales,...

info_outline
Week in Review: Chrome password replacer, Luna Moth exploits, ChatGPT declines shutdown command show art Week in Review: Chrome password replacer, Luna Moth exploits, ChatGPT declines shutdown command

Cyber Security Headlines

Link to This week’s Cyber Security Headlines – Week in Review is hosted by with guest , former CISO, Hyundai Capital America Thanks to our show sponsor, ThreatLocker ® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . All links and the video of this episode can be found on    

info_outline
Windows startup failures, Victoria’s Secret cyberattack, stolen cookie threat show art Windows startup failures, Victoria’s Secret cyberattack, stolen cookie threat

Cyber Security Headlines

Windows 11 might fail to start after installing KB5058405, says Microsoft Victoria’s Secret website goes offline following cyberattack Billions of stolen cookies available, worrying security experts Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . Find the stories behind...

info_outline
Microsoft updates Update, LexisNexis leak, cyber insurance premiums show art Microsoft updates Update, LexisNexis leak, cyber insurance premiums

Cyber Security Headlines

Microsoft wants to update all the things LexisNexis breach impacts 364,000 people Cyber insurance premium volume expected to double Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit .

info_outline
MathWorks confirms ransomware attack, Adidas has data breach, Dutch intelligence warns of cyberattack show art MathWorks confirms ransomware attack, Adidas has data breach, Dutch intelligence warns of cyberattack

Cyber Security Headlines

MathWorks, Creator of MATLAB, Confirms Ransomware Attack Adidas warns of data breach after customer service provider hack Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit .

info_outline
Malicious npm codes, Nova Scotia cyberattack, ChatGPT refuses shutdown command show art Malicious npm codes, Nova Scotia cyberattack, ChatGPT refuses shutdown command

Cyber Security Headlines

Malicious npm and VS Code packages stealing data Nova Scotia Power confirms ransomware attack Researchers claim ChatGPT o3 bypassed shutdown in controlled test Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . Find the stories behind the headlines at .  

info_outline
CISA’s Commvault warning, updated Killnet returns, fake VPN malware show art CISA’s Commvault warning, updated Killnet returns, fake VPN malware

Cyber Security Headlines

CISA warns Commvault clients of campaign targeting cloud applications Russian hacker group Killnet returns with slightly adjusted mandate Fake VPN and browser NSIS installers used to deliver Winos 4.0 malware Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit . Find the...

info_outline
 
More Episodes

Link to episode page

This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest George Finney, CISO, The University of Texas System – check out George’s new book plus all his other achievements at his website, WellAwareSecurity.

Thanks to our show sponsor, Conveyor

Conveyor

Still spending hours maintaining a massive spreadsheet of Q&A pairs or using RFP tools to answer security questionnaires? Conveyor’s AI doesn’t need hand-holding and gets you accurate answers every time with limited knowledge base maintenance. It reads directly from your connected sources—documents, wikis, websites, Confluence, Google drive, and even your Conveyor trust center. You don’t maintain a knowledge base. You connect to one. And our AI does the rest for you. See what real auto-fill magic looks like at www.conveyor.com

All links and the video of this episode can be found on CISO Series.com