Technology

Related News

Anthropic Launches Claude: AI Chatbot for Higher Education

  • None
  • Published date: 2025-08-30 00:00:00

None

<p>Anthropic has launched <a href="https://www.anthropic.com/news/introducing-claude-for-education">Claude for Education</a>, a specialized version of its AI assistant tailored for colleges and universities. This initiative aims to support students, faculty, and administrators with secure and responsible AI integration across academic and campus operations. Claude for Education introduces a new Learning mode designed to promote critical thinking, engaging students in Socratic dialogues rather than providing direct answers. <img decoding="async" src="https://cdn.pseo.one/67b62b766899109fe72fb789/687e6cccf6fe799d28851ea0/anthropic-launches-claude-ai-chatbot-for-higher-education/108124111-17435120651743512063-ff8ec568.jpg" alt="Claude for Education"> <em>Image courtesy of CNBC</em> The Learning mode encourages independent problem-solving and reinforces deeper understanding through guided reasoning. Claude for Education is already deployed at institutions such as Northeastern University and the London School of Economics, facilitating various use cases like thesis drafting and automating administrative workflows. Anthropic is also collaborating with <a href="https://internet2.edu/">Internet2</a> and <a href="https://www.instructure.com/">Instructure</a> to integrate Claude into existing educational infrastructures, positioning it among the <a href="https://hyperwriteai.com/blog/best-ai-tools-for-students">best AI tools for students</a> who want to enhance their academic productivity</p><h2>Features and Institutional Offerings</h2><p>Claude for Education offers numerous capabilities:</p><ul> <li>Students can draft literature reviews with proper citations, receive feedback on thesis statements, and work through complex calculus problems.</li> <li>Faculty can efficiently create rubrics aligned with learning outcomes and provide individualized feedback on student essays.</li> <li>Administrative staff can analyze enrollment trends, automate repetitive email responses, and convert dense policy documents into accessible FAQs.</li> </ul><p>The initiative also includes two student programs: the <a href="https://www.anthropic.com/contact-sales/claude-campus-ambassadors">Claude Campus Ambassadors</a>, where students partner with Anthropic to lead AI initiatives on their campuses, and <a href="https://www.anthropic.com/contact-sales/for-student-builders">Claude for Student Builders</a>, which offers API credits for student-led projects using Claude.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><h2>Partnerships and Future Innovations</h2><p>Northeastern University has partnered with Anthropic to co-design a roadmap for AI integration in higher education. This collaboration aims to build best practices for responsible AI adoption and create new AI-powered tools. Anthropic’s president, Daniela Amodei, stated, “We believe AI will have a profound impact on all facets of education…” The partnership will pilot innovations using Anthropic’s AI technology, transforming teaching, research, and business operations across Northeastern’s campuses. Faculty members are already incorporating Claude into their curriculum to enhance learning and foster innovation. For more details on Claude for Education, visit <a href="https://www.anthropic.com/education">Anthropic’s website</a>.</p><h2>Competition in the Education AI Space</h2><p>Anthropic's rollout of Claude for Education coincides with <a href="https://www.cnbc.com/2024/05/14/openai-cnbc-disruptor-50.html">OpenAI’s announcement</a> of making ChatGPT Plus free for college students in the U.S. and Canada. This competition aims to capture the education market by establishing partnerships with universities and converting students into users. Claude for Education's Learning mode guides students' reasoning and aims to deepen understanding rather than simply provide answers. As AI becomes more prevalent in education, the integration of tools like Claude and ChatGPT continues to evolve. In a similar way that educators compare messaging platforms for their suitability—often exploring <a href="https://www.droxy.ai/blog/manychat-alternative"><strong>manychat alternatives</strong></a> for communication and automation—institutions are now evaluating AI tools for educational alignment and effectiveness. However, concerns remain regarding the potential impact of AI on critical thinking skills</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="e91a28544cf8c19635d3336a-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="e91a28544cf8c19635d3336a-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><h2>Exploring Passwordless Authentication Solutions</h2><p>In parallel with the advancement of AI in educational settings, secure access and authentication solutions are crucial. Solutions such as <a href="https://mojoauth.com/">passwordless authentication</a> can seamlessly integrate into educational and other institutions, providing a smooth, secure login experience. Implementing tools like passkeys, phone OTP, and email OTP can enhance security while minimizing the need for traditional passwords. Organizations aiming to improve their security infrastructure should consider adopting passwordless solutions for a better user experience. Explore more about how <a href="https://mojoauth.com/">MojoAuth</a> can help your institution integrate passwordless authentication into your systems.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/anthropic-launches-claude-ai-chatbot-for-higher-education-2/" data-a2a-title="Anthropic Launches Claude: AI Chatbot for Higher Education"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fanthropic-launches-claude-ai-chatbot-for-higher-education-2%2F&amp;linkname=Anthropic%20Launches%20Claude%3A%20AI%20Chatbot%20for%20Higher%20Education" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fanthropic-launches-claude-ai-chatbot-for-higher-education-2%2F&amp;linkname=Anthropic%20Launches%20Claude%3A%20AI%20Chatbot%20for%20Higher%20Education" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fanthropic-launches-claude-ai-chatbot-for-higher-education-2%2F&amp;linkname=Anthropic%20Launches%20Claude%3A%20AI%20Chatbot%20for%20Higher%20Education" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fanthropic-launches-claude-ai-chatbot-for-higher-education-2%2F&amp;linkname=Anthropic%20Launches%20Claude%3A%20AI%20Chatbot%20for%20Higher%20Education" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fanthropic-launches-claude-ai-chatbot-for-higher-education-2%2F&amp;linkname=Anthropic%20Launches%20Claude%3A%20AI%20Chatbot%20for%20Higher%20Education" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://mojoauth.com/blog">MojoAuth - Advanced Authentication &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by MojoAuth - Advanced Authentication &amp; Identity Solutions">MojoAuth - Advanced Authentication &amp; Identity Solutions</a>. Read the original post at: <a href="https://mojoauth.com/blog/anthropic-launches-claude-ai-chatbot-for-higher-education">https://mojoauth.com/blog/anthropic-launches-claude-ai-chatbot-for-higher-education</a> </p>

Feel Relieved with Advanced Secrets Scanning

  • None
  • Published date: 2025-08-29 00:00:00

None

<h2>Why are Secrets Scanning and NHI Management Crucial in Cybersecurity?</h2><p>With an escalating magnitude of security threats plaguing digital, have you ever pondered over the significance of secrets scanning and Non-Human Identities (NHIs) management in cybersecurity? I can assure you that integrating these elements into your security strategy can proactively mitigate risks, streamline processes, and ensure robust data protection.</p><h3>Understanding the Essence of Non-Human Identities (NHIs)</h3><p>Often overlooked, NHIs are machine identities used in cybersecurity. They are analogous to a unique tourist equipped with his passport (a secret) and visa (permissions granted by the server). NHIs play a pivotal role, filling security gaps often created due to a disconnect between security and Research &amp; Development (R&amp;D) teams. This is especially crucial for professionals in sectors like financial services, healthcare, and travel, where data security takes center stage.</p><h3>The Art of Secrets Scanning and NHI Management</h3><p>The challenge lies not only in creating NHIs but also in managing these identities and their secrets. This is where secrets scanning comes into play. The methodology for NHI management involves a holistic approach that encompasses all stages of the lifecycle, from discovery and classification to threat detection and remediation. Unlike conventional point solutions that offer limited protection, a comprehensive secrets scanning strategy provides insights into ownership, permissions, usage patterns, thereby enabling context-aware security.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><h3>Reported Benefits of Effective NHI and Secrets Management</h3><ul> <li><strong>Reduced Risks: </strong> By proactively identifying and neutralizing security risks, effective NHI and secrets management decreases the chances of breaches and data leaks.</li> <li><strong>Improved Compliance: </strong> It aids organizations in meeting regulatory requirements by enforcing policies and providing audit trails.</li> <li><strong>Enhanced Efficiency: </strong> By automating the management of NHIs and secrets, it allows security teams to concentrate on strategic initiatives.</li> <li><strong>Increased Visibility and Control: </strong> It provides a centralized view for access management and governance.</li> <li><strong>Cost-Efficiency: </strong> Automation of secrets rotation and NHI decommissioning can lead to substantial operational cost savings.</li> </ul><p>According to a <a href="https://www.lexology.com/library/detail.aspx?g=d1c65e23-01f4-42d6-a5f4-728584a2cb49" rel="noopener">report</a>, Non-Human Identities (NHIs) are becoming increasingly important in cybersecurity. This draws attention to the urgent need for a comprehensive approach to NHI and secrets management.</p><h3>Applying NHI and Secrets Management in Practical Scenarios</h3><p>Imagine a healthcare organization responsible for safeguarding its patients’ sensitive data. By implementing advanced secrets scanning and NHI management, the organization can ensure robust data protection, improve compliance with healthcare regulations, and enhance their cybersecurity assurance.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="0ef42b8ee1813bba6fd6b59c-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="0ef42b8ee1813bba6fd6b59c-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p>For instance, a financial analyst with data pertaining to hundreds of clients can take advantage of secrets scanning to safeguard this sensitive information. This aligns with the essential skills required in this role.</p><p>Moreover, the process is not just confined to these sectors. Teams working in DevOps and SOC can leverage NHI management and secrets scanning to enhance their security posture, irrespective of their industry.</p><p>Indeed, understanding and implementing secrets scanning and Non-Human Identities (NHIs) management is no longer optional, but an imperative for cyber-secure operations. Find out more about NHI security in the healthcare industry in this <a href="https://entro.security/blog/non-human-identities-security-in-healthcare/">article</a> or learn about how a leading company integrates these concepts in their strategy <a href="https://entro.security/blog/entro-wiz-integration/">here</a>.</p><p>To ensure your organization’s cybersecurity assurance, consider making the necessary reforms. Embrace the future of cybersecurity with NHI and secrets management.</p><h3>The Rising Importance of NHI and Secrets Management</h3><p>Is your organization harnessing the power of NHI and Secrets Management effectively? With cybercriminal activities continue to multiply, surpassing seismic scales, the implications of weak security infrastructures can be disastrous. Leaving gaps unshielded can lead to inadvertent breaches, causing not only financial implications but also irreparable damage to reputation. Therefore, understanding the soaring necessity of Non-Human Identities (NHIs) and secrets management for a resilient security framework is crucial.</p><p>An eye-opening <a href="https://www.ssl.com/how-to/automate-esigner-ev-code-signing/" rel="noopener">study</a> reveals a growing trend toward implementing NHIs and Secrets Management. According to the study, organizations that strategically integrate NHIs management and secrets scanning drastically reduce their vulnerability to cyberattacks. Moreover, it also helps them stay ahead of the curve in digital characterized by increasingly sophisticated cyber threats.</p><h3>Challenges Faced in Implementing NHI and Secrets Management</h3><p>Despite the clear benefits, organizations often grapple with various challenges while implementing NHI management and secrets scanning. Key among them is the lack of adequate user awareness and insufficient technical expertise.</p><p>Moreover, the rapidly changing cyber threats also presents another significant hurdle. While organizations strive to enhance their security posture, cybercriminals are coming up with increasingly complex and refined attack strategies. Therefore, the resistance to change and lack of a proactive mindset often serve as stumbling blocks in embracing innovative, value-adding methodologies like NHI management and secrets scanning.</p><p>The third main challenge lies in the varying industry specificities. The security needs – and the corresponding challenges – of a healthcare institution differ markedly from those in financial or travel sectors. Therefore, the one-size-fits-all approach doesn’t apply here. Each industry needs to tailor their NHI management and Secrets Management protocols according to their unique requirements.</p><h3>Overcoming Obstacles and Implementing Effective NHI and Secrets Management</h3><p>To successfully implement NHI management and secrets scanning, organizations need an in-depth understanding of dynamic cybersecurity. This involves staying abreast of cutting-edge techniques and technologies that can enhance their cyber-resilience.</p><p>Secondly, considering the unique needs of the respective industry is vital. A tailor-made approach to NHIs and Secrets Management can help businesses effectively ward off challenges and meet regulatory requirements. For instance, a healthcare organization with voluminous patient data needs stronger data protection measures, while a financial institution may require more rigorous NHIs management for transactional security.</p><p>Equally important is building a security-conscious organizational culture. Training programs to sensitise employees about the importance of NHI Management and secrets scanning, along with advanced training for IT personnel, can go a long way in cementing a culture of cybersecurity.</p><p>A crucial aspect is investing in automated systems for NHI and Secrets Management. Leveraging innovations like machine learning can help more quickly identify and neutralize threats.</p><p>Finally, maintaining constant vigilance with regular monitoring, periodic audits, and occasional drills can ensure effective implementation and management of NHIs and secrets. This also helps in validating the effectiveness of implemented measures and pinpoints the areas of improvement.</p><h3>Stepping into the Future of Cybersecurity</h3><p>Staying a step ahead in cybersecurity has become non-negotiable. Adoption of advanced tools and methodologies like NHI management and secrets scanning helps organizations stay resilient in cyber threats. With businesses continue to amass data and digitize their operations, the role of NHIs and Secrets Management will only grow in importance.</p><p>Remember, effective cybersecurity isn’t merely about installing firewalls or encryption. It’s about a holistic approach that ensures end-to-end protection. Encompassing each node of access and every data flow channel, enterprise-level security primarily hinges on effective NHI and Secrets Management. Therefore, transforming your cybersecurity strategy to include these critical elements isn’t just a wise choice but a calculatingly strategical one.</p><p>Find out more on how implementing the NHI and Secrets Management methodology can impact an incident response plan in this <a href="https://entro.security/blog/best-practices-for-building-an-incident-response-plan/">article</a> and how a partnership with Torq empowers NHI security on this<a href="https://entro.security/blog/entro-partners-with-torq-for-nhi-security/"> page</a>. Embrace the future of cybersecurity now and steer your organization towards cyber resilence.</p><p>The post <a href="https://entro.security/feel-relieved-with-advanced-secrets-scanning/">Feel Relieved with Advanced Secrets Scanning</a> appeared first on <a href="https://entro.security/">Entro</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/feel-relieved-with-advanced-secrets-scanning/" data-a2a-title="Feel Relieved with Advanced Secrets Scanning"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ffeel-relieved-with-advanced-secrets-scanning%2F&amp;linkname=Feel%20Relieved%20with%20Advanced%20Secrets%20Scanning" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ffeel-relieved-with-advanced-secrets-scanning%2F&amp;linkname=Feel%20Relieved%20with%20Advanced%20Secrets%20Scanning" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ffeel-relieved-with-advanced-secrets-scanning%2F&amp;linkname=Feel%20Relieved%20with%20Advanced%20Secrets%20Scanning" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ffeel-relieved-with-advanced-secrets-scanning%2F&amp;linkname=Feel%20Relieved%20with%20Advanced%20Secrets%20Scanning" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ffeel-relieved-with-advanced-secrets-scanning%2F&amp;linkname=Feel%20Relieved%20with%20Advanced%20Secrets%20Scanning" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://entro.security/">Entro</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Alison Mack">Alison Mack</a>. Read the original post at: <a href="https://entro.security/feel-relieved-with-advanced-secrets-scanning/">https://entro.security/feel-relieved-with-advanced-secrets-scanning/</a> </p>

When Salesforce Becomes a De Facto Credential Repository: Lessons from the Drift OAuth Breach

  • None
  • Published date: 2025-08-29 00:00:00

None

<div data-elementor-type="wp-post" data-elementor-id="43480" class="elementor elementor-43480" data-elementor-post-type="post"> <div class="elementor-element elementor-element-024fa2f ccustom_blogdetail_topsec e-flex e-con-boxed e-con e-parent" data-id="024fa2f" data-element_type="container" data-settings='{"background_background":"classic"}'> <div class="e-con-inner"> <div class="elementor-element elementor-element-988554d elementor-widget elementor-widget-text-editor" data-id="988554d" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p><em>TL;DR: The recently disclosed Salesforce data-theft attacks highlight two distinct non-human identity failures. First, Drift’s handling of OAuth tokens broke down, leading to credential compromise at scale. Second, Salesforce had become a warehouser of sensitive credentials even though it was never intended to function as a secrets custodian. These two weaknesses combined to create the conditions the threat group behind the attacks exploited.</em></p> <p>Breaches that involve Salesforce are not just another entry in the cyber incident tally list.</p> <p>When attackers compromise instances of the SaaS CRM giant, they are accessing the central functions of an enterprise. The widely deployed platform typically holds customer records, sales data, and a web of integrations that extend deep into the business operations for tens of thousands of worldwide customers.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div> <p>That is what made the <a href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift" rel="noopener">recent disclosure</a> by Google and Mandiant so significant. The adversaries, identified as hacker group UNC6395, stole Salesforce <a href="https://aembit.io/blog/tag/oauth/" rel="noopener">OAuth</a> tokens and used them to impersonate a trusted integration with Drift, a sales automation application that connects directly to Salesforce. With that access, they systematically queried Salesforce objects and exfiltrated data.</p> <p>The attackers did not break into Salesforce directly. They relied on stolen Salesforce OAuth tokens provisioned through Drift, which allowed them to act as a legitimate application. That trust enabled large-scale data exports, including embedded credentials hidden in Salesforce records. By chaining together weak token management and poor credential hygiene, they converted access to a CRM system into access to cloud infrastructure. To minimize detection, they deleted the query jobs once complete, though log traces remained.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="218543656a72b23c7909d2b9-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="218543656a72b23c7909d2b9-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div> <p>What they were after, however, went beyond contact lists and pipeline information. In many Salesforce instances, sensitive credentials such as AWS keys, Snowflake tokens, and service passwords end up stored within records. This effectively turned Salesforce into a de facto credential repository and gave attackers the opportunity to move far beyond CRM data. Once uncovered, these secrets can be leveraged to reach far beyond Salesforce itself to conduct other, potentially more damaging, attacks.</p> <p>Still, it is tempting to treat this as a narrow incident affecting only those who installed Salesloft Drift. That would be a mistake. The real story is not Drift itself, but the structural reality of how enterprises extend trust. </p> <p>New findings late Thursday from Google’s Threat Intelligence Group and Mandiant <a href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift" rel="noopener">show that </a>UNC6395’s activity was not confined to Salesforce. Attackers also abused OAuth tokens tied to the Drift Email integration, which in some cases exposed connected Google Workspace accounts. This reinforces that token abuse is not an isolated Salesforce-related incident but part of the broader challenge of how workloads and services exchange and honor OAuth tokens across platforms.</p> <p>Connected applications receive broad permissions, and the tokens that represent them are often long-lived. Security teams often lack visibility into how these non-human identities are being used, or even how many of them exist. Human-focused identity protections do nothing to stop this type of misuse, although their principles can be extended to the non-human identity realm with <a href="https://aembit.io/blog/the-what-where-and-why-of-workload-identity-and-access-management/" rel="noopener">workload IAM</a>.</p> <h4>Recommended Actions</h4> <p>Salesforce and Salesloft have already revoked the affected tokens and removed Drift from the AppExchange, but organizations should not treat the matter as contained. The compromise underscores structural issues around non-human identity management and secrets sprawl. </p> <p>Firstly, from an incident response perspective, organizations should:</p> <ul> <li aria-level="1">Rotate any API keys, tokens, and passwords that may have been stored in Salesforce objects, assuming exposure. (<a href="https://aembit.io/resources/aembits-guide-to-successful-credential-rotation-projects/" rel="noopener">Here’s a helpful guide</a>.) </li> <li aria-level="1">Conduct a thorough review of <a href="https://help.salesforce.com/s/articleView?id=sf.real_time_event_monitoring_overview.htm&amp;language=en_US&amp;type=5" rel="noopener">Salesforce Event Monitoring</a> logs to identify suspicious query patterns, especially those linked to Drift or other integrations. </li> <li aria-level="1">Revisit connected application permissions and reduce them to the minimum scopes required for operation. </li> <li aria-level="1">Establish and maintain an inventory of non-human identities and their associated credentials, including OAuth tokens and service accounts, so that trust relationships are visible and accountable. </li> <li aria-level="1">Enforce IP restrictions and login ranges for connected applications to limit their operational surface area.</li> </ul> <p>This incident also highlights a structural weakness that quick remediation cannot fix. Long-lived tokens and accumulated secrets create fragile trust boundaries, and those boundaries will only become more strained as <a href="https://aembit.io/blog/the-emerging-identity-imperatives-of-agentic-ai/" rel="noopener">agentic AI</a> and other autonomous services <a href="https://aembit.io/blog/a-catch-up-guide-to-authentication-for-agentic-ai/" rel="noopener">increase the number</a> of non-human identities moving between SaaS platforms. </p> <p>Integrations between SaaS platforms often rely on long-lived tokens passed back and forth with little oversight. What is missing is a way to mediate that trust – an identity-aware, policy-based proxy <a href="https://aembit.io/blog/introducing-one-security-token-service-for-all-your-clouds/" rel="noopener">that can handle</a> token exchanges securely, limit scope, and provide visibility across applications. In other contexts, such proxy models already exist. Extending that same approach to SaaS-to-SaaS connections may be one of the few ways to prevent a single compromised token from cascading into a wider breach.</p> <p>The lesson is not to manage secrets more aggressively, but to manage access directly. Tokens live too long, secrets sprawl into platforms not designed to hold them, and third-party integrations receive more trust than they should. Until organizations <a href="https://aembit.io/blog/there-is-no-mfa-for-machines-do-this-instead/" rel="noopener">apply the same rigor</a> to non-human identities as they do to human accounts incidents like the Salesforce–Drift compromise will remain inevitable.</p> <p>For more information how Aembit can help, visit <a href="http://aembit.io/" rel="noopener">aembit.io</a>.</p> </div> </div> </div> </div> </div><p>The post <a href="https://aembit.io/blog/when-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach/">When Salesforce Becomes a De Facto Credential Repository: Lessons from the Drift OAuth Breach</a> appeared first on <a href="https://aembit.io/">Aembit</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/when-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach/" data-a2a-title="When Salesforce Becomes a De Facto Credential Repository: Lessons from the Drift OAuth Breach"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhen-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach%2F&amp;linkname=When%20Salesforce%20Becomes%20a%20De%20Facto%20Credential%20Repository%3A%20Lessons%20from%20the%20Drift%20OAuth%20Breach" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhen-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach%2F&amp;linkname=When%20Salesforce%20Becomes%20a%20De%20Facto%20Credential%20Repository%3A%20Lessons%20from%20the%20Drift%20OAuth%20Breach" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhen-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach%2F&amp;linkname=When%20Salesforce%20Becomes%20a%20De%20Facto%20Credential%20Repository%3A%20Lessons%20from%20the%20Drift%20OAuth%20Breach" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhen-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach%2F&amp;linkname=When%20Salesforce%20Becomes%20a%20De%20Facto%20Credential%20Repository%3A%20Lessons%20from%20the%20Drift%20OAuth%20Breach" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwhen-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach%2F&amp;linkname=When%20Salesforce%20Becomes%20a%20De%20Facto%20Credential%20Repository%3A%20Lessons%20from%20the%20Drift%20OAuth%20Breach" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://aembit.io/">Aembit</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Dan Kaplan">Dan Kaplan</a>. Read the original post at: <a href="https://aembit.io/blog/when-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach/">https://aembit.io/blog/when-salesforce-becomes-a-de-facto-credential-repository-lessons-from-the-drift-oauth-breach/</a> </p>

Randall Munroe’s XKCD ‘Thread Meeting’

  • None
  • Published date: 2025-08-29 00:00:00

None

<figure class=" sqs-block-image-figure intrinsic "> <p> <script src="/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js" data-cf-settings="e50e563dc208b74772ee667e-|49"></script><img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png" data-image-dimensions="399x425" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=1000w" width="399" height="425" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/6278bcb3-2d14-4922-a41a-379cd3c87c78/thread_meeting.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"><figcaption class="image-caption-wrapper"> <p class="">via the comic artistry and dry wit of Randall Munroe, creator of XKCD</p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2025/8/28/randall-munroes-xkcd-thread-meeting">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/randall-munroes-xkcd-thread-meeting/" data-a2a-title="Randall Munroe’s XKCD ‘Thread Meeting’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-thread-meeting%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Thread%20Meeting%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-thread-meeting%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Thread%20Meeting%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-thread-meeting%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Thread%20Meeting%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-thread-meeting%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Thread%20Meeting%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-thread-meeting%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Thread%20Meeting%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3128/">https://xkcd.com/3128/</a> </p>

Top 7 Data Breaches in August 2025 That Made Headlines

  • None
  • Published date: 2025-08-29 00:00:00

None

<p>August 2025 witnessed a series of data breaches across industries, exposing sensitive information and shaking customer trust. From global technology giants to airlines, credit bureaus, and staffing companies, no sector was spared. These incidents highlight how attackers are refining their methods and exploiting weak links in third-party systems, supply chains, and enterprise software.<br> Below is a detailed breakdown of top 7 data breaches in August 2025 which were disclosed in August 2025.</p><h2><b><img fetchpriority="high" decoding="async" class="aligncenter wp-image-10968 size-full" src="https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1.jpg" alt="Data Breaches in August 2025" width="1080" height="1350" srcset="https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1.jpg 1080w, https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1-240x300.jpg 240w, https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1-819x1024.jpg 819w, https://strobes.co/wp-content/uploads/2025/08/Aug-Data-Breaches-min-1080x1350-1-768x960.jpg 768w" sizes="(max-width: 1080px) 100vw, 1080px"></b></h2><h2><b>1. Google’s Salesforce Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">In August, Google confirmed that its </span><b>Salesforce-hosted customer database</b><span style="font-weight: 400;"> had been breached by the well-known hacking group </span><b>ShinyHunters</b><span style="font-weight: 400;">. Investigators later revealed the campaign began in </span><b>June 2025</b><span style="font-weight: 400;"> but went undetected for weeks. The breach was part of a larger attack wave targeting Salesforce CRM environments across multiple enterprises.</span></p><h3><b>What Data Was Exposed</b></h3><p><span style="font-weight: 400;">The stolen information mainly comprised business contact records, and they included:</span></p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Email addresses</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Phone numbers</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">Financial data and credentials were not included in the disclosure, but even contact information (e.g. contact details) can be used in phishing, impersonation, and social engineering attacks.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">Google has not published exact numbers, but reports estimate </span><b>millions of contacts</b><span style="font-weight: 400;"> were exposed.</span></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="d51aef63e83f5252b4c551c9-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="d51aef63e83f5252b4c551c9-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">The hack called into question the safety of SaaS ecosystems and risks of cloud dependency. In the case of a company of this magnitude as Google, the image of weak vendor controls can affect the business relationship and regulatory oversight.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">In early August, Google started to alert affected business customers and collaborated with Salesforce to limit the exposure. The company wrote that it is improving SaaS monitoring and strengthening vendor-specific security checks.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Even highly resourced enterprises are not immune when </span><b>third-party SaaS platforms are compromised</b><span style="font-weight: 400;">. Stronger vendor governance, continuous monitoring, and proactive breach detection are crucial in today’s interconnected environments.</span></p><p><span style="font-weight: 400;"> Sources:</span><a href="https://www.brightdefense.com/resources/recent-data-breaches/" rel="nofollow noopener"> <span style="font-weight: 400;">BrightDefense</span></a><span style="font-weight: 400;">,</span><a href="https://news.trendmicro.com/2025/08/26/google-data-breach-gmail/" rel="nofollow noopener"> <span style="font-weight: 400;">TrendMicro</span></a><span style="font-weight: 400;">,</span><a href="https://economictimes.indiatimes.com/news/international/global-trends/us-news-2-5-billion-gmail-accounts-warned-scammers-using-us-650-area-code-to-trick-millions-what-should-you-do/articleshow/123473376.cms" rel="nofollow noopener"> <span style="font-weight: 400;">Economic Times</span></a></p><h2><b>2. Air France and KLM Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On August 7, 2025, Air France and KLM announced a data breach that was associated with a third-party customer support system. The attackers used the vendor system to gain access to passenger records and information in the loyalty program.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Passenger names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Contact information (emails, phone numbers)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Flying Blue loyalty numbers</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">While no payment card or passport data was reported, loyalty points are frequently targeted by fraud rings and sold in underground markets.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The airlines have not disclosed exact numbers, but industry reports suggest the breach could cover </span><b>hundreds of thousands of travelers</b><span style="font-weight: 400;">.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">For airlines, breaches create </span><b>operational disruption</b><span style="font-weight: 400;"> and </span><b>reputational damage</b><span style="font-weight: 400;">. Customer trust is especially fragile in travel, where personal details are closely linked to identity verification, booking, and financial accounts.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Both airlines assured customers that they had locked down the affected vendor system and initiated an investigation. They also rolled out alerts to help customers track suspicious account activity.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Airlines rely heavily on third-party systems for ticketing, loyalty programs, and customer service. Without rigorous vendor risk management, these integrations can become entry points for attackers.</span></p><p><span style="font-weight: 400;"> Source:</span> <a href="https://www.forbes.com/sites/suzannerowankelleher/2025/08/08/5-airlines-hacked-air-france-klm-latest-victims/" rel="nofollow noopener"><span style="font-weight: 400;">Forbes</span></a></p><h2><b>3. Workday Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><b>Workday</b><span style="font-weight: 400;">, a global provider of HR and finance software, announced on </span><b>August 18, 2025</b><span style="font-weight: 400;"> that it too was targeted in the </span><b>Salesforce exploitation campaign</b><span style="font-weight: 400;">. Attackers leveraged weaknesses in Salesforce integrations to extract data.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Email addresses</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Business phone numbers of Workday contacts</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">While this breach did not involve employee HR records, exposing professional contact information puts enterprises at risk of </span><b>targeted spear-phishing</b><span style="font-weight: 400;"> attacks.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The company has not revealed specific numbers, but analysts suggest the exposure is significant given Workday’s global customer base.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">As an HR SaaS leader, Workday faces heightened scrutiny when its own systems or integrations are exploited. The incident risks undermining confidence in cloud-based HR solutions.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Workday confirmed the breach but emphasized that no payroll or HR data was impacted. The company said it is strengthening its monitoring of third-party integrations and expanding threat detection.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">This incident reinforces the </span><b>domino effect of SaaS supply chain risks</b><span style="font-weight: 400;">. When a platform as widely used as Salesforce is compromised, it cascades across numerous organizations.</span></p><p><span style="font-weight: 400;"> Sources:</span> <a href="https://www.websiteplanet.com/news/workday-data-breach-2025/" rel="nofollow noopener"><span style="font-weight: 400;">Website Planet</span></a></p><h2><b>4. TransUnion Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On </span><b>August 28, 2025</b><span style="font-weight: 400;">, credit reporting agency </span><b>TransUnion</b><span style="font-weight: 400;"> revealed a breach that started in July and was traced to a </span><b>third-party application compromise</b><span style="font-weight: 400;">. The attackers accessed highly sensitive personal records of millions of individuals.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Full names</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Personally identifiable information (PII)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Social Security Numbers</span><span style="font-weight: 400;"><br> </span></li> </ul><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The breach impacted </span><b>4.4 million people</b><span style="font-weight: 400;">, making it one of the largest exposures of August.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">Credit bureaus hold vast databases of identity information used for financial verification, loans, and credit checks. A breach of this nature can lead to </span><b>identity theft, fraud, and regulatory investigations</b><span style="font-weight: 400;">, significantly harming brand credibility.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">TransUnion confirmed the breach and is working with regulators, offering credit monitoring and identity theft protection services to affected individuals.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Organizations that store critical identity data must maintain </span><b>continuous third-party risk assessments</b><span style="font-weight: 400;">, </span><b>robust encryption</b><span style="font-weight: 400;">, and </span><b>real-time exposure monitoring</b><span style="font-weight: 400;">.</span></p><p><span style="font-weight: 400;"> Source:</span><a href="https://therecord.media/transunion-data-breach-4-million" rel="nofollow noopener"> <span style="font-weight: 400;">The Record</span></a></p><h2><b>5. Connex Credit Union Data Breach</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On </span><b>August 11, 2025</b><span style="font-weight: 400;">, </span><b>Connex Credit Union</b><span style="font-weight: 400;"> in Connecticut disclosed a breach that impacted approximately </span><b>172,000 customers</b><span style="font-weight: 400;">.</span></p><h3><b>What Data Was Exposed</b></h3><p><span style="font-weight: 400;">The bank confirmed that </span><b>customer personal data</b><span style="font-weight: 400;"> was exposed, though details on the exact categories (financial vs. PII) remain under review.</span></p><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">About </span><b>172,000 customers</b><span style="font-weight: 400;"> were impacted.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">Smaller financial institutions often lack the depth of cybersecurity resources available to large banks. As a result, breaches of this scale can create </span><b>outsized reputational and compliance challenges</b><span style="font-weight: 400;">, particularly around </span><b>FDIC and state banking regulations</b><span style="font-weight: 400;">.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Connex confirmed the breach to regulators and began notifying customers. An internal review and security upgrades are underway.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Even regional banks are attractive targets. Investment in </span><b>continuous vulnerability management, penetration testing, and customer notification planning</b><span style="font-weight: 400;"> is essential.</span></p><p><span style="font-weight: 400;"> Source:</span> <a href="https://www.bleepingcomputer.com/news/security/connex-credit-union-discloses-data-breach-impacting-172-000-people/" rel="nofollow noopener"><span style="font-weight: 400;">Bleepingcomputer</span></a></p><h2><b>6. Manpower RansomHub Attack</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">On </span><b>August 12, 2025</b><span style="font-weight: 400;">, staffing giant </span><b>Manpower</b><span style="font-weight: 400;"> confirmed it was attacked by the </span><b>RansomHub ransomware group</b><span style="font-weight: 400;">. The attackers exfiltrated a massive </span><b>500GB of data</b><span style="font-weight: 400;"> before demanding a ransom.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Corporate files</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Employee and candidate records</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Sensitive personal information</span><span style="font-weight: 400;"><br> </span></li> </ul><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">The breach impacted </span><b>144,189 individuals</b><span style="font-weight: 400;">.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">The attack disrupted </span><b>talent management operations</b><span style="font-weight: 400;"> and raised concerns among corporate clients who depend on Manpower for staffing services. Beyond financial loss, the reputational hit may affect long-term client confidence.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Manpower confirmed the attack, engaged incident response teams, and is working with regulators. However, leaked data on the dark web suggests that extortion attempts may continue.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">The case demonstrates the </span><b>evolution of ransomware</b><span style="font-weight: 400;"> toward double-extortion tactics, where both encryption and data leaks maximize pressure on victims.</span></p><p><span style="font-weight: 400;">Source:</span> <a href="https://www.bleepingcomputer.com/news/security/manpower-staffing-agency-discloses-data-breach-after-attack-claimed-by-ransomhub/" rel="nofollow noopener"><span style="font-weight: 400;">Bleepingcomputer</span></a></p><h2><b>7. Orange SA Data Leak</b></h2><h3><b>Incident Overview</b></h3><p><span style="font-weight: 400;">French telecom provider </span><b>Orange SA</b><span style="font-weight: 400;"> was hacked in early August by the ransomware group </span><b>Warlock</b><span style="font-weight: 400;">. Attackers stole around </span><b>4GB of sensitive business data</b><span style="font-weight: 400;"> and published it on the dark web.</span></p><h3><b>What Data Was Exposed</b></h3><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Confidential business user information</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Internal corporate documents</span><span style="font-weight: 400;"><br> </span></li> </ul><h3><b>Number of Affected Individuals</b></h3><p><span style="font-weight: 400;">Exact counts remain unclear, but leaked datasets suggest significant exposure among Orange’s </span><b>enterprise clients</b><span style="font-weight: 400;">.</span></p><h3><b>Business Impact</b></h3><p><span style="font-weight: 400;">Telecom providers are high-value targets due to their role in </span><b>critical infrastructure</b><span style="font-weight: 400;">. Public leaks of corporate data can harm relationships with business customers, create compliance issues, and erode trust.</span></p><h3><b>Company Response</b></h3><p><span style="font-weight: 400;">Orange confirmed the incident and said it is cooperating with French authorities. The company also initiated additional monitoring to identify misuse of leaked data.</span></p><h3><b>Key Lesson</b></h3><p><span style="font-weight: 400;">Telecom firms must prioritize </span><b>ransomware resilience, vendor oversight, and rapid incident disclosure</b><span style="font-weight: 400;"> to protect business users and maintain trust.</span></p><p><span style="font-weight: 400;"> Source:</span><a href="https://timesofindia.indiatimes.com/technology/tech-news/orange-sa-hacked-user-data-released-on-dark-web-what-one-of-worlds-leading-telecom-companies-has-to-say/articleshow/123482151.cms" rel="nofollow noopener"> <span style="font-weight: 400;">Times of India</span></a></p><h2><b>Bottomline</b></h2><p><span style="font-weight: 400;">The </span><b>August 2025 data breaches</b><span style="font-weight: 400;"> confirm recurring security challenges:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><b>Supply chain compromises</b><span style="font-weight: 400;"> (Google, Workday, Air France/KLM)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><b>Critical data theft at scale</b><span style="font-weight: 400;"> (TransUnion, Connex Credit Union)</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><b>Ransomware with public leaks</b><span style="font-weight: 400;"> (Manpower, Orange SA)</span><span style="font-weight: 400;"><br> </span></li> </ul><p><span style="font-weight: 400;">Organizations must move from reactive security to </span><b>continuous threat exposure management (CTEM)</b><span style="font-weight: 400;">, supported by </span><b>risk-based vulnerability management (RBVM)</b><span style="font-weight: 400;">. </span><b>Strobes Security</b><span style="font-weight: 400;"> enables enterprises to:</span></p><ul> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Continuously identify exposures across SaaS, cloud, and on-prem environments</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prioritize based on business risk, not just CVSS scores</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Automate workflows for faster remediation</span><span style="font-weight: 400;"><br> </span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Validate exposures through </span><b>Pentesting as a Service (PTaaS)</b><b><br> </b></li> </ul><p><a href="https://strobes.co/get-started/"><span style="font-weight: 400;"> </span><span style="font-weight: 400;">Schedule a demo with Strobes</span></a><span style="font-weight: 400;"> to see how our unified platform can reduce your breach risk.</span></p><p>The post <a rel="nofollow" href="https://strobes.co/blog/top-7-data-breaches-in-august-2025-that-made-headlines/">Top 7 Data Breaches in August 2025 That Made Headlines</a> appeared first on <a rel="nofollow" href="https://strobes.co/">Strobes Security</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/top-7-data-breaches-in-august-2025-that-made-headlines/" data-a2a-title="Top 7 Data Breaches in August 2025 That Made Headlines"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftop-7-data-breaches-in-august-2025-that-made-headlines%2F&amp;linkname=Top%207%20Data%20Breaches%20in%20August%202025%20That%20Made%20Headlines" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://strobes.co">Strobes Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Likhil Chekuri">Likhil Chekuri</a>. Read the original post at: <a href="https://strobes.co/blog/top-7-data-breaches-in-august-2025-that-made-headlines/">https://strobes.co/blog/top-7-data-breaches-in-august-2025-that-made-headlines/</a> </p>

Cutting Through AppSec Noise in the Age of GenAI

  • Alan Shimel
  • Published date: 2025-08-29 00:00:00

None

<div style="padding: 56.25% 0 0 0; position: relative;"><iframe style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;" title="SBOM: The Second Act in a Five-Act Play with Neatsun Ziv" src="https://player.vimeo.com/video/1111692439?badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479" frameborder="0"></iframe></div><p><script src="https://player.vimeo.com/api/player.js" type="37a93ae7b36f42ef2feff6fc-text/javascript"></script></p><p data-start="526" data-end="795">The way organizations think about application security is shifting—fast. OX Security Co-Founder and CEO Neatsun Ziv talks about why the old playbook of “scan, list, and hand over to developers” has run its course.</p><p data-start="797" data-end="1304">Ziv explains how the flood of vulnerabilities—now averaging close to 100 new disclosures daily—collides with today’s resource-strapped security teams. Add to that the surge of GenAI-generated code, much of it riddled with flaws, and the burden on developers and AppSec engineers is heavier than ever. A static list of issues is no longer enough; developers need evidence, prioritization, and guidance they can act on without stalling innovation.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p data-start="1306" data-end="1778">He highlights a sobering truth: Not all vulnerabilities matter equally. Research shows that a relatively small subset of flaws drives the majority of breaches. The challenge is separating the noise from the real risks and then proving those decisions to auditors and boards. Ziv outlines how OX Security is trying to reframe the conversation—helping teams zero in on the critical 5% of issues and even providing suggested fixes through agentic remediation.</p><p data-start="1780" data-end="2099">It’s a model built around trust and practicality: Give developers context and confidence, give auditors evidence, and give security leaders a way to stay ahead of an accelerating threat curve. With AI changing how code is written, reviewed, and exploited, the industry needs tools and approaches that match that pace.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="37a93ae7b36f42ef2feff6fc-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="37a93ae7b36f42ef2feff6fc-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p data-start="2101" data-end="2299">For practitioners, the takeaway is clear: AppSec can’t just be about detection. It has to be about focus, collaboration, and enabling secure software delivery—even as the ground shifts beneath us.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/cutting-through-appsec-noise-in-the-age-of-genai/" data-a2a-title="Cutting Through AppSec Noise in the Age of GenAI"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcutting-through-appsec-noise-in-the-age-of-genai%2F&amp;linkname=Cutting%20Through%20AppSec%20Noise%20in%20the%20Age%20of%20GenAI" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcutting-through-appsec-noise-in-the-age-of-genai%2F&amp;linkname=Cutting%20Through%20AppSec%20Noise%20in%20the%20Age%20of%20GenAI" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcutting-through-appsec-noise-in-the-age-of-genai%2F&amp;linkname=Cutting%20Through%20AppSec%20Noise%20in%20the%20Age%20of%20GenAI" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcutting-through-appsec-noise-in-the-age-of-genai%2F&amp;linkname=Cutting%20Through%20AppSec%20Noise%20in%20the%20Age%20of%20GenAI" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcutting-through-appsec-noise-in-the-age-of-genai%2F&amp;linkname=Cutting%20Through%20AppSec%20Noise%20in%20the%20Age%20of%20GenAI" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Microsoft and IRONSCALES Crack Down on the Direct Send Exploit

  • None
  • Published date: 2025-08-29 00:00:00

None

<p>Back in <a href="https://ironscales.com/blog/inside-job-attackers-are-spoofing-emails-with-m365s-direct-send">Part 1</a>, we walked through how attackers are using <span style="font-weight: bold;">Microsoft 365’s Direct Send</span> feature to spoof internal emails, making those messages look like they’re coming from a trusted domain.</p><p>Now, Microsoft is tightening the screws with <em>new controls and clearer guidance</em> on how to shut that door before someone walks through it.</p><p>This post breaks down what’s changed, what you need to do, and how to keep legitimate mail flowing while keeping the bad actors out.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><h2 style="font-size: 24px;"><strong>What’s New from Microsoft?</strong></h2><ol> <li><strong> New ‘RejectDirectSend’ Feature</strong></li> </ol><p>Microsoft has released a new tenant-wide control (in public preview) called <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace;">RejectDirectSend</span>. When enabled, it blocks unauthenticated emails from your own accepted domains—emails that don’t flow through a trusted connector.</p><p>This is a big deal. Previously, attackers could spoof your domain and send messages straight to Exchange Online using port 25, bypassing SPF, DKIM, and other checks. Now, Exchange will reject that traffic automatically.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="21b6c18c15b7683a4bd4789c-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="21b6c18c15b7683a4bd4789c-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p>You can turn it on with a single PowerShell command:</p><p style="font-size: 18px;"><span style="background-color: #eeeeee; font-family: 'Courier New', Courier, monospace;">Set-OrganizationConfig -RejectDirectSend $true</span></p><p>Once enabled, Exchange will block unauthenticated internal spoof attempts and return this error to the sender:</p><p style="font-size: 14px;"><span style="background-color: #eeeeee; font-family: 'Courier New', Courier, monospace;"><span style="font-size: 18px; color: #ff9902; background-color: #eeeeee;">550 5.7.68</span> <span style="font-size: 18px; background-color: #eeeeee;">TenantInboundAttribution; Direct Send <span style="color: #9a00ff;">not</span> allowed <span style="color: #9a00ff;">for this</span> organization <span style="color: #9a00ff;">from</span> unauthorized sources</span></span></p><ol start="2"> <li><strong> Connector-Based Exceptions</strong></li> </ol><p>If you have printers, scanners, line-of-business apps, or external services sending mail on your behalf, you’ll need to make sure those senders are authenticated. Microsoft recommends using an <strong>inbound partner connector</strong> with either IP or certificate-based authentication.</p><ol start="3"> <li><strong> SPF &amp; DMARC Still Matter</strong></li> </ol><p>Even with the new feature, Microsoft emphasizes continuing to enforce <strong>SPF, DKIM, and DMARC</strong> correctly. Use <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">~all<span style="background-color: #ffffff;"> </span></span>(soft fail) in your SPF policy if you need flexibility for legitimate third-party senders. Misconfigurations still cause both false positives and missed threats.</p><ol start="4"> <li><strong> Better Logging and Visibility</strong></li> </ol><p>For now, Microsoft’s <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">RejectDirectSend</span> control doesn’t show up in standard logs unless you’re looking. You’ll need to inspect traffic using Audit Logs or advanced queries (filtering by sender domain, authentication status, etc.). Make sure you have eyes on the metrics so you don’t accidentally block something important.</p><h2><span style="font-size: 24px; font-family: Arial, Helvetica, sans-serif;">What IRONSCALES Has Done to Protect Our Clients</span></h2><p><span style="font-family: Arial, Helvetica, sans-serif;">While Microsoft has tightened Direct Send controls, our team has already deployed targeted updates to protect customers against these attacks and the techniques threat actors rely on to sneak past basic authentication checks.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">Here’s what’s new in your IRONSCALES environment:</span></p><ul> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>New Detection Logic Deployed</strong> – Covers “Direct Send” impersonation attempts, where attackers bypass traditional relay checks and pose as trusted internal users.</span></li> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>Enhanced Attachment Scanning</strong> – Added specific rules for prominent extensions <em>including but not limited</em> to SVG and HTML payloads, which are frequently used to hide phishing links or embedded malicious code.</span></li> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>Improved Cross-Module Consistency</strong> – Detection modules now share results more effectively, reducing situations where one module spotted suspicious activity but the verdict wasn’t reflected in the final classification.</span></li> <li><span style="font-family: Arial, Helvetica, sans-serif;"><strong>Ongoing Tuning</strong> – Our Security Research team continuously fine-tunes detection logic to maximize catch rates while keeping false positives low.</span></li> </ul><p><span style="font-family: Arial, Helvetica, sans-serif;"><strong>What this means in practice:</strong></span><br><span style="font-family: Arial, Helvetica, sans-serif;">These updates allow us to automatically detect and remediate emails that previously had a higher chance of slipping through — including <em>internal impersonation attacks via Direct Send</em> and phishing attempts hidden in less common attachment types like SVG or HTML.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">You don’t need to take any action — these protections are already live and active across your mailboxes.</span></p><h2 style="font-size: 24px;"><strong>Action Items: What You Should Do Today <p></p></strong></h2><table style="border-collapse: collapse; table-layout: fixed; margin-left: auto; margin-right: auto; border: 1px solid #99acc2; width: 100%; height: 482px;"> <tbody> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px; background-color: #004491;"> </td> <td style="border: 1pt solid windowtext; width: 92.0229%; height: 49px; background-color: #004491; vertical-align: bottom; text-align: center;"><span style="font-family: Arial, Helvetica, sans-serif;"><strong><span style="color: #ffffff;">Steps To Take</span></strong></span></td> </tr> <tr style="height: 77px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 77px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">1</span></p> </td> <td style="width: 92.0229%; height: 77px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Inventory all systems or apps using Direct Send (like printers, email alerts, Azure Comm Services, etc.)</span></p> </td> </tr> <tr style="height: 79px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">2</span></p> </td> <td style="width: 92.0229%; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Update your SPF record with the IPs of legitimate senders; use soft fail</span> (<span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">~all</span>) <span style="font-family: Arial, Helvetica, sans-serif;">to avoid bouncebacks</span></p> </td> </tr> <tr style="height: 79px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">3</span></p> </td> <td style="width: 92.0229%; height: 79px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Enable</span> <span style="background-color: #cccccc; font-size: 18px; font-family: 'Courier New', Courier, monospace;"><span style="background-color: #eeeeee;">RejectDirectSend</span><span style="background-color: #fafafa;">: </span><span style="background-color: #eeeeee;">Set-OrganizationConfig -RejectDirectSend $true</span></span></p> </td> </tr> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">4</span></p> </td> <td style="width: 92.0229%; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Create inbound connectors for authenticated traffic using IP or certificate validation</span></p> </td> </tr> <tr style="height: 51px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 51px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">5</span></p> </td> <td style="width: 92.0229%; height: 51px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Monitor rejected mail for the</span> <span style="font-size: 18px; background-color: #eeeeee; font-family: 'Courier New', Courier, monospace;">550 5.7.68</span> <span style="font-family: Arial, Helvetica, sans-serif;">error to catch misconfigured systems</span></p> </td> </tr> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">6</span></p> </td> <td style="width: 92.0229%; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Coordinate with <span style="font-weight: bold;">app/device owners</span> to migrate away from anonymous port 25</span></p> </td> </tr> <tr style="height: 49px;"> <td style="border: 1pt solid windowtext; width: 7.97709%; text-align: center; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">7</span></p> </td> <td style="width: 92.0229%; height: 49px;"> <p><span style="font-family: Arial, Helvetica, sans-serif;">Stay ready — Microsoft will eventually enable this control by default for all new tenants</span></p> </td> </tr> </tbody> </table><p style="text-align: left;"><strong style="color: #101828; font-size: 24px; background-color: transparent;"><br>Q&amp;A: What You Need to Know</strong></p><p><strong>Q: What happens if a printer or line-of-business app sends mail after I enable RejectDirectSend?</strong><br><strong>A:</strong> If that traffic isn’t authenticated through a connector, Exchange will block it with the <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">550 5.7.68</span> error. This means the sender is trying to impersonate your domain without permission. The fix is simple: set up an inbound connector that validates via IP or certificate. You get to define who’s allowed to speak for your domain.</p><p><strong>Q: Is Direct Send the same as regular email delivery?</strong><br><strong>A:</strong> Not quite. Direct Send means sending email <em>from your accepted domain</em> to Microsoft 365 <em>without authentication</em>. Microsoft has clarified that not all unauthenticated mail is Direct Send—but when it comes from your domain, it should be protected. Otherwise, it’s a spoof waiting to happen.</p><p><strong>Q: Can SPF or DMARC catch this kind of spoofing without the new control?</strong><br><strong>A:</strong> Sometimes—but not always. SPF only works if the receiving server checks it <em>and</em> the sending IP is on your allowlist. DMARC depends on SPF/DKIM passing and domain alignment. If an attacker sends mail directly via port 25 with a forged header, SPF and DKIM checks often aren’t enforced. That’s why Microsoft introduced RejectDirectSend—to cut this loophole off entirely.</p><p><strong>Q: I’m not sure what’s using Direct Send in our environment. How do I avoid breaking things?</strong><br><strong>A:</strong> Start with monitoring. Look for emails coming from your domain without authentication or connector attribution. Microsoft recommends auditing sender traffic by IP and filtering on the <span style="font-size: 18px; font-family: 'Courier New', Courier, monospace; background-color: #eeeeee;">SenderMailFromAddress</span> field. Once you’ve identified your legit sources, build connectors and test before flipping the switch.</p><h2 style="font-size: 24px;"><strong>Final Thoughts</strong></h2><p><span style="font-family: Arial, Helvetica, sans-serif;">Microsoft’s new <strong>RejectDirectSend</strong> feature is an important step toward closing a loophole that attackers have exploited for years. But it’s only part of the picture. Threat actors move fast, and no single control — whether SPF, DMARC, or tenant-wide settings — is enough to keep pace on its own.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">That’s why IRONSCALES has already gone further. With new detection logic, enhanced attachment scanning, and continuous tuning from our security research team, we’re making sure these same tactics are detected and remediated automatically at the inbox level. You don’t need to wait for policies to roll out either. This protection is already live and active.</span></p><p><span style="font-family: Arial, Helvetica, sans-serif;">We’re here to help if you want to talk through how these changes impact your environment, or if you’d like a deeper look at how IRONSCALES complements Microsoft 365 to shut down advanced impersonation and phishing techniques before they reach your users.</span></p><p><img decoding="async" src="https://track.hubspot.com/__ptq.gif?a=20641927&amp;k=14&amp;r=https%3A%2F%2Fironscales.com%2Fblog%2Fpart-2-microsoft-cracks-down-on-direct-send-spoofing&amp;bu=https%253A%252F%252Fironscales.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/microsoft-and-ironscales-crack-down-on-the-direct-send-exploit/" data-a2a-title="Microsoft and IRONSCALES Crack Down on the Direct Send Exploit"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&amp;linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&amp;linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&amp;linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&amp;linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fmicrosoft-and-ironscales-crack-down-on-the-direct-send-exploit%2F&amp;linkname=Microsoft%20and%20IRONSCALES%20Crack%20Down%20on%20the%20Direct%20Send%20Exploit" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ironscales.com/blog">Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by James Savard">James Savard</a>. Read the original post at: <a href="https://ironscales.com/blog/part-2-microsoft-cracks-down-on-direct-send-spoofing">https://ironscales.com/blog/part-2-microsoft-cracks-down-on-direct-send-spoofing</a> </p>

Tonic.ai product updates: August 2025

  • None
  • Published date: 2025-08-29 00:00:00

None

<div class="u-rich-text u-overflow-clip w-richtext" morss_own_score="5.219666931007137" morss_score="106.12954378475479"> <p>We’re excited to share the latest updates and announcements designed to improve your experience with our products. This month’s issue includes:</p> <ul> <li>Introducing Tonic Structural’s Data Vending Machine </li> <li>Streamlining Structural with schema caching </li> <li>Structural’s Document View now available for PostgreSQL </li> <li>Object and Array generators for JSON and XML data in Fabricate </li> <li>LLM synthesis strengthened with built-in models in Textual </li> <li>Textual pipelines unified with datasets workflow </li> <li>and our new Audio Redaction and Synthesis playbook </li> </ul> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/68b0c04560aceaa4faff8815_Structural%20banner%20for%20PUE.png"></figure> <h2>Introducing Structural’s Data Vending Machine</h2> <p><strong>Bring the power of Tonic Structural directly into your CI/CD pipeline and into the hands of your developers with the Data Vending Machine, our up-and-coming offering currently in preview.</strong> With this new feature built specifically for data end-users, Structural automates the creation of ephemeral, ticket-specific databases, ordered directly by your developers to eliminate data bottlenecks and accelerate your entire development cycle. <a href="https://www.tonic.ai/book-a-demo">Connect with our team today</a> to schedule a private preview and help direct the future of the product.</p> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/68b0ba202f56de7858bb8ce3_Data%2520Vending%2520Machine%2520-%2520cropped.jpeg"></figure> <h2>Streamlining Structural with schema caching</h2> <p>For those of you with sizeable schemas, we’ve released <strong>an exciting performance improvement in Structural: a new </strong><a href="https://martinfowler.com/bliki/TwoHardThings.html"><strong>caching</strong></a><strong> option for schemas</strong>. This will significantly speed up UI loading times where fetching a schema has previously lagged, to get you generating and refreshing your data faster.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div> <p>Find complete instructions on how to use the capability in our <a href="https://docs.tonic.ai/app/workspace/managing-workspaces/workspace-configuration-settings/schema-management-settings#schema-cache-config">product docs</a>. As always, we welcome your feedback and any performance questions you may have—or if you just want to talk cool engineering problems, this was a fun one to solve!</p> <h2>Document View now available for PostgreSQL</h2> <p>JSON data in Structural is more manageable than ever, thanks to expanded functionality of our UI for semi-structured data: <a href="https://docs.tonic.ai/app/generation/working-with-document-based-data/json-document-view"><strong>Document View</strong></a><strong> now supports PostgreSQL databases, giving you a clear, visual way to explore your JSON content</strong>.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="a2c7de23a15866d6b973e2d3-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="a2c7de23a15866d6b973e2d3-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/68b0ba202f56de7858bb8cda_Structural%2520-%2520Doc%2520View%2520expression%2520paths%2520-%2520with%2520glow.png"></figure> <p>This update also brings the power of <a href="https://docs.tonic.ai/app/generation/working-with-document-based-data/document-path-expressions">assigning generators to path expressions</a> to PostgreSQL users, a feature that allows you to create bulk rules to automatically protect sensitive fields that match configured path expressions. This simplifies generator configuration, expanding on our existing capabilities for supported JSON data sources, like MongoDB and Files, to equip you to manage large datasets quickly and easily. <a href="https://www.tonic.ai/book-a-demo">Connect with our team</a> and check out our <a href="https://docs.tonic.ai/app/generation/working-with-document-based-data">product docs</a> to get started.</p> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/68b0c0228c93119a73a33573_Fabricate%20banner%20for%20PUE.png"></figure> <h2>Object and Array generators for JSON and XML data in Fabricate</h2> <p>Generate synthetic columns of JSON and XML data in Fabricate for a variety of use cases with two newly released and highly customizable generators: <a href="https://docs.tonic.ai/fabricate/table-columns/generator-reference/data-type-and-specific-values#object">Object</a> and <a href="https://docs.tonic.ai/fabricate/table-columns/generator-reference/data-type-and-specific-values#array">Array</a>. <strong>These generators significantly broaden the types of data that Fabricate can spin up, unlocking the ability to model the JSON columns in your target database schema or generate XML data within database columns</strong> or as a collection of XML documents.</p> <p>Already a Fabricate power user? Try the SQL generator within Objects to reference other properties within the same object or any ancestor using “{parent(n)}” or columns on the root table using “{root_table}” to simulate realistic data interdependencies. Or leverage Array to create an array of events with a timestamp property that uses the Datetime generator with type: Series to simulate events between (min) and (max) seconds apart.</p> <p>Support for complex, nested data types means more flexibility and more possibilities in crafting the data you need. Get started with a <a href="https://fabricate.tonic.ai/">free account of Fabricate</a> today.</p> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/68b0ba202f56de7858bb8cf3_Fabricate%2520-%2520Object%2520generator.png"></figure> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/68b0c091ef9abea1ae9ddc69_Textual%20banner%20for%20PUE.png"></figure> <h2>LLM synthesis strengthened with built-in models in Textual</h2> <p><a href="https://docs.tonic.ai/textual/textual-playground#home-page-enable-llm-synthesis">LLM synthesis</a> in Textual, formerly reliant on OpenAI, has been upgraded to run on<strong> built-in Gemma-based models with custom LoRA adapters, making it faster, more affordable, and fully self-contained</strong> within the Tonic platform. This upgrade also brings a notable improvement in Textual’s ability to link entities: the system recognizes variations such as “Sarah,” “S-A-R-A-H,” and “Sarah Smith,” groups them logically, picks a canonical form, and applies consistent replacements.</p> <p>Format preservation during data synthesis—maintaining the original text’s style, spacing, and capitalization—was already supported and continues to ensure smooth, realistic synthetic results. LLM synthesis can be invoked through the SDK or in the Textual playground UI on the homepage. Haven’t created an account yet? <a href="https://textual.tonic.ai/signup">Sign up for free</a>.</p> <h2>Textual pipelines unified with datasets workflow</h2> <p>In Textual, <strong>all pipeline functionality is now available directly within the </strong><a href="https://docs.tonic.ai/textual/datasets-create-manage/datasets-flows"><strong>datasets workflow</strong></a><strong>, giving you a single place to manage end-to-end processing</strong> without relying on separate Pipelines workflows. With a datasets workflow, you can connect to data in your cloud services (Amazon S3, Azure, or Sharepoint) and generate data in the JSON Output format for easier downstream integration. Both cloud-based and local file workflows now run seamlessly in datasets, unifying pipeline functionality into a more streamlined and flexible experience that simplifies setup and keeps your workflows future-proof.</p> <p>Since all pipeline functionality is now supported through datasets, the Pipelines feature in Textual is now deprecated. <strong>We recommend </strong><a href="https://docs.tonic.ai/textual/textual-playground#home-page-enable-llm-synthesis"><strong>migrating your existing pipelines</strong></a><strong> as soon as possible to avoid disruption.</strong> The Pipelines feature in Textual will be sunset on October 1, 2025.</p> <figure><img decoding="async" src="https://cdn.prod.website-files.com/62e28cf08913e80aefba2c44/68b0ba202f56de7858bb8cea_Textual%2520-%2520pipelines%2520in%2520datasets%2520-%2520with%2520glow.png"></figure> <h2>Audio Redaction and Synthesis playbook</h2> <p>Working with sensitive audio data? <strong>Our latest playbook equips you to operationalize audio data for AI development, while still protecting privacy</strong> and adhering to compliance restrictions regarding the governance of PII. The <a href="https://www.tonic.ai/playbooks/audio-redaction-and-synthesis"><strong>Audio Redaction and Synthesis playbook</strong></a> includes step-by-step guidance for taking audio files and recordings and transforming them into sanitized transcripts that are ready for downstream usage including model training and development.</p> <p>With <a href="https://docs.tonic.ai/textual/tonic-textual-api/datasets-redaction/redact-audio-file">Tonic Textual’s audio capabilities</a>, teams can redact sensitive entities within these files or replace them with synthetic but true-to-life alternatives that preserve context and allow for complete and realistic datasets. Check out the playbook to: </p> <ul> <li>View a video walkthrough of the audio redaction and synthesis use case </li> <li>Access to a pre-built Jupyter notebook to try for yourself </li> <li>Download a sample audio file for experimentation</li> </ul> <p>Sign up for a <a href="https://textual.tonic.ai/signup">free trial</a> of Textual to get started today.</p> <h2>Small updates; big impacts</h2> <p>Often it’s the little things that matter most. Here’s a round up of our smaller releases.</p> <h3><strong>Tonic Structural</strong></h3> <ul> <li>Structural now offers <strong>performance visualization on the </strong><a href="https://docs.tonic.ai/app/workspace/jobs#job-gantt-visualization"><strong>jobs page</strong></a> to help you identify and mitigate bottlenecks in your data generation runs. Because who doesn’t love a little performance optimization?</li> <li>We’ve <strong>improved file connector performance</strong> in Structural by adding a <a href="https://docs.tonic.ai/app/workflows/performance">file read parallelism setting</a> configurable at a workspace level—a significant optimization for customers with lots of files in a single file group.</li> </ul> <h3>Tonic Fabricate</h3> <ul> <li>When you create a database or add a table, a new <a href="https://docs.tonic.ai/fabricate/tables-and-columns/database-tables/database-table-add#table-create-new"><strong>AI Hints</strong></a> field allows you to provide an additional prompt to help further define the database or table. For example, you might indicate specific generators to use or specify limits on column values.</li> <li>The new <a href="https://docs.tonic.ai/fabricate/table-columns/generator-reference/calculated-or-related-values#markov-chain"><strong>Markov Chain generator</strong></a> equips you to simulate a realistic flow through different states in your structured data, including allowing you to define the probability of transitioning from any given state to another. How’s that for triggering a flow state. </li> <li>Self-hosted customers can now use <a href="https://docs.tonic.ai/fabricate/self-hosted-fabricate/setting-up-the-fabricate-components#ollama"><strong>Ollama</strong></a> as their LLM provider. One more option in the BYO LLM menu.</li> </ul> <p>As always, we’d love to hear your feedback on our products. What do you need? What do you love? What could be better? Send us a note at <a href="/cdn-cgi/l/email-protection#4f272a2323200f3b2021262c612e26"><strong><span class="__cf_email__" data-cfemail="ec8489808083ac988382858fc28d85">[email protected]</span></strong></a> or <a href="https://www.tonic.ai/book-a-demo">book time directly with our team</a>. And for all the latest updates, be sure to check out our complete release notes.</p> </div><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/tonic-ai-product-updates-august-2025/" data-a2a-title="Tonic.ai product updates: August 2025"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftonic-ai-product-updates-august-2025%2F&amp;linkname=Tonic.ai%20product%20updates%3A%20August%202025" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftonic-ai-product-updates-august-2025%2F&amp;linkname=Tonic.ai%20product%20updates%3A%20August%202025" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftonic-ai-product-updates-august-2025%2F&amp;linkname=Tonic.ai%20product%20updates%3A%20August%202025" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftonic-ai-product-updates-august-2025%2F&amp;linkname=Tonic.ai%20product%20updates%3A%20August%202025" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Ftonic-ai-product-updates-august-2025%2F&amp;linkname=Tonic.ai%20product%20updates%3A%20August%202025" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.tonic.ai">Expert Insights on Synthetic Data from the Tonic.ai Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Expert Insights on Synthetic Data from the Tonic.ai Blog">Expert Insights on Synthetic Data from the Tonic.ai Blog</a>. Read the original post at: <a href="https://www.tonic.ai/blog/tonic-ai-product-updates-august-2025">https://www.tonic.ai/blog/tonic-ai-product-updates-august-2025</a> </p>

One unexpected challenge organizations face while implementing SOC 2

  • None
  • Published date: 2025-08-29 00:00:00

None

<div data-elementor-type="wp-post" data-elementor-id="20219" class="elementor elementor-20219" data-elementor-post-type="post"> <div class="elementor-element elementor-element-3027e049 e-flex e-con-boxed e-con e-parent" data-id="3027e049" data-element_type="container"> <div class="e-con-inner"> <div class="elementor-element elementor-element-55374070 elementor-widget elementor-widget-text-editor" data-id="55374070" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <blockquote> <p><b>One Unexpected SOC 2 Challenge: </b><b>Overcoming Cultural Resistance to Security-First Thinking</b></p> <p><span style="font-weight: 400;">When companies start their <a href="https://www.trustcloud.ai/soc2/" rel="noopener">SOC 2</a> journey, most expect the technical checklist: configure access controls, deploy logging, and gather evidence. But what we’ve consistently seen with our customers is that the toughest part isn’t the technology. It’s the culture.</span></p> </blockquote> <p><span style="font-weight: 400;">SOC 2 compliance is often framed as a technical or operational milestone. But after guiding multiple organizations through the SOC 2 implementation process, I can confidently say that one of the most unexpected and arguably most complex challenges is cultural: shifting an entire organization’s mindset to embrace a “security-first” ethos.</span></p> <p><span style="font-weight: 400;">While technical controls, documentation, and third-party audits are crucial, they are not the steepest hills to climb. What most organizations fail to anticipate is how deeply human behavior, organizational habits, and departmental silos can obstruct progress. Security is not a siloed function; it must be integrated into daily workflows, decision-making, and company values. And changing behavior at scale is never easy.</span></p> <p>Read the “<a class="title" href="https://community.trustcloud.ai/docs/grc-launchpad/grc-101/compliance/which-soc-2-trust-service-criteria-are-applicable-to-my-organization/" rel="noopener"><span class="doc-section">Confidently choose your SOC 2 trust service criteria</span></a>” article to learn more!</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div> <p><span style="font-weight: 400;">This article explores that unexpected challenge in detail, offering insights, lessons learned, and tactical strategies for any team preparing for their own SOC 2 journey.</span></p> <blockquote> <p><span style="font-weight: 400;">Key takeaway</span></p> <p><span style="font-weight: 400;">What we’ve learned is simple: Tools make compliance easier. Culture makes it real. The companies that succeed don’t just pass the audit; they build a foundation where every team owns a piece of security. That’s the part no checklist prepares you for. And that’s the part that makes all the difference.</span></p> </blockquote> <h2 data-start="114" data-end="192">Beyond the checklist, why SOC 2 is harder than it looks</h2> <p data-start="194" data-end="670">At first glance, SOC 2 seems straightforward: gather evidence, document policies, and adopt the right tools to meet the Trust Services Criteria. Many leadership teams start here, treating compliance like a technical to-do list. But anyone who’s gone through a readiness project knows the reality is far more complicated. SOC 2 isn’t just about servers, logs, or access controls; it’s about how people work, make decisions, and interact with security in their day-to-day roles.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="6119e7497c4cc9fc9760284e-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="6119e7497c4cc9fc9760284e-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div> <p data-start="672" data-end="1082">The hardest part of SOC 2 isn’t the frameworks or the auditors; it’s the cultural shift it demands. Engineers may resist extra steps that slow down velocity, sales teams may see security reviews as blockers, and managers may underestimate the importance of documentation. Left unchecked, these cultural gaps can derail timelines, create inconsistent evidence, and leave your company scrambling during audits.</p> </div> </div> <div class="elementor-element elementor-element-b25115e elementor-widget elementor-widget-image" data-id="b25115e" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img fetchpriority="high" decoding="async" width="800" height="444" src="https://www.trustcloud.ai/wp-content/uploads/2025/08/One-unexpected-challenge-organizations-face-while-implementing-SOC-2-1.jpg" class="attachment-large size-large wp-image-20225" alt="SOC 2" srcset="https://www.trustcloud.ai/wp-content/uploads/2025/08/One-unexpected-challenge-organizations-face-while-implementing-SOC-2-1.jpg 900w, https://www.trustcloud.ai/wp-content/uploads/2025/08/One-unexpected-challenge-organizations-face-while-implementing-SOC-2-1-300x167.jpg 300w, https://www.trustcloud.ai/wp-content/uploads/2025/08/One-unexpected-challenge-organizations-face-while-implementing-SOC-2-1-768x427.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" title="SOC 2"> </div> </div> <div class="elementor-element elementor-element-ac701ff elementor-widget elementor-widget-text-editor" data-id="ac701ff" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p data-start="1084" data-end="1355">The following guide shares what we learned navigating SOC 2 from the inside. You’ll see why treating compliance as “just a technical exercise” is the first and most dangerous, miscalculation, and how building a security-first culture is the real foundation for long-term success.</p> <h2><span style="font-weight: 400;">Part 1: The illusion of a purely technical problem</span></h2> <p><span style="font-weight: 400;">When leadership teams kick off their SOC 2 preparation, there’s usually an initial focus on systems and processes:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What evidence do we need to collect?</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What policies must be documented?</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What tools should we implement for logging, monitoring, or access control?</span></li> </ol> <p><span style="font-weight: 400;">These are all valid questions, but they imply that SOC 2 is a </span><i><span style="font-weight: 400;">technical</span></i><span style="font-weight: 400;"> exercise. That’s the first major miscalculation.</span></p> <p><span style="font-weight: 400;">SOC 2 isn’t just a test of your infrastructure. It’s an evaluation of how securely your </span><i><span style="font-weight: 400;">organization</span></i><span style="font-weight: 400;"> operates, and that includes people. According to a report by Verizon, 74% of data breaches involve the human element, whether it’s error, misuse, or social engineering. 【source: Verizon 2023 Data Breach Investigations Report】. SOC 2 recognizes this, which is why the Trust Services Criteria include not just system operations, but also risk management, personnel onboarding, and access governance.</span></p> <h3>The Cultural Gap</h3> <p><span style="font-weight: 400;">Despite these requirements, companies often overlook the degree to which their team culture may clash with SOC 2 principles:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Engineers are focused on velocity, not documentation.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Product teams prioritize user experience, not secure defaults.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Customer-facing roles may perceive security reviews as bottlenecks to sales.</span></li> </ol> <p><span style="font-weight: 400;">The outcome? Even with the right tools and frameworks in place, friction emerges when people don’t understand </span><i><span style="font-weight: 400;">why</span></i><span style="font-weight: 400;"> security matters or </span><i><span style="font-weight: 400;">how</span></i><span style="font-weight: 400;"> it should be integrated into their work. This friction can delay audits, create inconsistent evidence, and lead to non-conformities during assessments.</span></p> <h2><span style="font-weight: 400;">Part 2: Key cultural pain points (and how we navigated them)</span></h2> <h3><span style="font-weight: 400;">Lack of cross-functional alignment</span></h3> <p><span style="font-weight: 400;">In our first SOC 2 readiness project, we made the mistake of keeping the initiative “within security and compliance.” The result? Weeks of delays waiting for evidence from engineering, stale documentation, and confusion around responsibilities.</span></p> <p><b>What we learned</b><span style="font-weight: 400;">: Every department plays a role in SOC 2. Success required creating a </span><b>RACI matrix</b><span style="font-weight: 400;"> (Responsible, Accountable, Consulted, Informed) that clearly outlined ownership for every control.</span></p> <p><b>What we did</b><span style="font-weight: 400;">:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Created department-specific training for product, HR, engineering, and sales.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Held monthly cross-functional syncs to track progress and unblock dependencies.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Used collaborative tooling like TrustCloud to assign tasks and collect audit-ready evidence automatically.</span></li> </ol> <h3><span style="font-weight: 400;">Engineering pushback on “Security debt”</span></h3> <p><span style="font-weight: 400;">Engineers, by nature, thrive in systems that reward speed, iteration, and problem-solving. SOC 2, by contrast, rewards consistency, auditability, and control.</span></p> <p><span style="font-weight: 400;">Initially, when we asked teams to implement controls like</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">MFA enforcement across all accounts</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Logging changes in GitHub</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Access reviews every quarter</span></li> </ol> <p><span style="font-weight: 400;">…we were met with resistance. “This slows us down,” or “We’ll do it later” became common refrains.</span></p> <p><b>Our turning point</b><span style="font-weight: 400;"> came when we reframed SOC 2 not as a restriction, but as </span><b>an enabler of trust </b><span style="font-weight: 400;">with customers, with partners, and even with regulators. We also brought engineers into the design of the control implementation so they could choose </span><i><span style="font-weight: 400;">how</span></i><span style="font-weight: 400;"> to meet the requirements, giving them autonomy within constraints.</span></p> <h3><span style="font-weight: 400;">Documentation apathy</span></h3> <p><span style="font-weight: 400;">SOC 2 demands policies, dozens of them. Everything from onboarding checklists to incident response plans to change management procedures. But getting people to </span><i><span style="font-weight: 400;">follow</span></i><span style="font-weight: 400;"> and </span><i><span style="font-weight: 400;">update</span></i><span style="font-weight: 400;"> these documents regularly? That’s the real challenge.</span></p> <p><span style="font-weight: 400;">In one company, we found that only 30% of managers had reviewed the acceptable use policy with their teams, even though they had “acknowledged” it in a system like Confluence.</span></p> <p><span style="font-weight: 400;">To address this, we:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Integrated policy reviews into onboarding and quarterly refreshers.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Used simple quizzes post-review to ensure comprehension.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Adopted document management tools that tracked not just acknowledgments but engagement.</span></li> </ol></div> </div> <div class="elementor-element elementor-element-3e70b79 elementor-widget elementor-widget-shortcode" data-id="3e70b79" data-element_type="widget" data-widget_type="shortcode.default"> <div class="elementor-widget-container"> <div class="elementor-shortcode"> <div class="tc-sched getto"> <div class="left-box"><img decoding="async" src="https://www.trustcloud.ai/wp-content/uploads/2025/05/TrustOps-icon-1.svg" alt="TrustCloud" title="TrustCloud"></div> <div class="right-box"><img decoding="async" src="https://www.trustcloud.ai/wp-content/uploads/2025/05/TrustOps-icon-1.svg" alt="TrustCloud" class="mImg" title="TrustCloud"> <p>Looking for automated, always-on IT control assurance?</p> <p>TrustCloud keeps your compliance audit-ready so you never miss a beat.</p> <p><a class="elementor-button" href="https://www.trustcloud.ai/learn-more?utm_source=TCArticle&amp;utm_medium=TCArticle&amp;utm_campaign=TCCTA">Learn More</a></p></div> </div> </div></div> </div> </div> </div> <div class="elementor-element elementor-element-3fd192a e-flex e-con-boxed e-con e-parent" data-id="3fd192a" data-element_type="container"> <div class="e-con-inner"> <div class="elementor-element elementor-element-cd5e0aa elementor-widget elementor-widget-text-editor" data-id="cd5e0aa" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <h2><span style="font-weight: 400;">Part 3: The role of leadership in culture change</span></h2> <p><span style="font-weight: 400;">One of the biggest success factors in our journey was </span><b>executive sponsorship</b><span style="font-weight: 400;">. When the CEO and CTO started including “security updates” in company all-hands, it signaled that this wasn’t just a checkbox; it was part of our DNA.</span></p> <p><span style="font-weight: 400;">Leaders can accelerate culture change by:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Publicly recognizing teams who implement good security practices.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Holding directors accountable for their role in control effectiveness.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Being transparent about security incidents or audit gaps (in appropriate forums).</span></li> </ol> <p><span style="font-weight: 400;">This top-down advocacy helped transform security from “someone else’s problem” to “everyone’s job.”</span></p> <h2><span style="font-weight: 400;">Part 4: Tools help, But don’t replace culture</span></h2> <p><span style="font-weight: 400;">Tools like TrustCloud, Drata, Vanta, or Secureframe automate evidence collection, policy management, and risk registers. They are incredibly helpful in maintaining continuous compliance. But </span><b>tools cannot enforce a security culture</b><span style="font-weight: 400;">.</span></p> <p><span style="font-weight: 400;">We saw this firsthand when a team toggled off a critical logging feature; technically, it wasn’t caught until the next quarterly check. The lesson? You need </span><i><span style="font-weight: 400;">both</span></i><span style="font-weight: 400;"> automation and awareness.</span></p> <p><span style="font-weight: 400;">To strengthen the human element, we:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Built a lightweight “Security Champions” program where each team nominated one person to stay in sync with security policies and updates.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ran phishing simulations and gamified results (e.g., prizes for teams with the fewest click-throughs).</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conducted “brown bag” sessions on real-world security breaches and what we could learn from them.</span></li> </ol> <h2><span style="font-weight: 400;">Part 5: Final audit day isn’t the finish line</span></h2> <p><span style="font-weight: 400;">Another unexpected challenge was the </span><b>post-certification complacency</b><span style="font-weight: 400;">. After months of effort, when we finally got the SOC 2 Type II report, teams assumed the hard part was over.</span></p> <p><span style="font-weight: 400;">In reality, SOC 2 requires </span><b>ongoing</b><span style="font-weight: 400;"> evidence collection. Many controls must be repeated periodically (e.g., quarterly access reviews, annual risk assessments). If your culture hasn’t internalized this, the next audit period becomes a fire drill all over again.</span></p> <p><span style="font-weight: 400;">To prevent that:</span></p> <ol> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">We embedded control check-ins into regular team workflows.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Used TrustCloud to maintain a “control calendar” and send reminders.</span></li> <li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Measured maturity over time, e.g., how quickly teams closed security tickets, updated access, or logged incidents.</span></li> </ol> <p><span style="font-weight: 400;">The goal wasn’t just to pass the audit but to operate like a SOC 2-compliant company </span><i><span style="font-weight: 400;">every single day</span></i><span style="font-weight: 400;">.</span></p> <h2><span style="font-weight: 400;">Summary: What to expect and how to prepare</span></h2> <p><span style="font-weight: 400;">Here are the main takeaways for any organization preparing for SOC 2:</span></p> <h4><span style="font-weight: 400;"><img decoding="async" src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;"> Don’t treat SOC 2 as just a technical exercise.</span></h4> <p><span style="font-weight: 400;">Security is as much about people as it is about systems. The audit evaluates how your company operates, not just your codebase.</span></p> <h4><span style="font-weight: 400;"><img decoding="async" src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;"> Expect resistance from teams not used to security rigor.</span></h4> <p><span style="font-weight: 400;">Engineers, product managers, and even executives may view compliance as a burden unless you show how it builds customer trust.</span></p> <h4><span style="font-weight: 400;"><img decoding="async" src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;"> Get cross-functional alignment early.</span></h4> <p><span style="font-weight: 400;">Establish responsibilities, timelines, and training plans that include every relevant department; security can’t do it alone.</span></p> <h4><span style="font-weight: 400;"><img decoding="async" src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;"> Automate where possible, but reinforce with culture.</span></h4> <p><span style="font-weight: 400;">Tools reduce human error, but you still need champions, education, and feedback loops to keep the culture alive.</span></p> <h4><span style="font-weight: 400;"><img decoding="async" src="https://s.w.org/images/core/emoji/16.0.1/72x72/2705.png" alt="✅" class="wp-smiley" style="height: 1em; max-height: 1em;"> Treat your first SOC 2 report as the beginning, not the end.</span></h4> <p><span style="font-weight: 400;">Build systems for continuous compliance so your teams are never caught off guard during the next audit period.</span></p> <p><span style="font-weight: 400;">The unexpected challenge of SOC 2 isn’t technology; it’s transformation. Shifting your organization’s culture to prioritize security in every decision is hard, messy, and rarely discussed. But once that shift happens, something remarkable follows: security becomes a strength, not a speed bump. Customers notice, teams take pride, and your company becomes not just compliant but trusted.</span></p> <p><span style="font-weight: 400;">And that, ultimately, is the true goal of SOC 2.</span></p> <h2>FAQs</h2> </div> </div> </div> </div> <div class="elementor-element elementor-element-c433227 e-flex e-con-boxed e-con e-parent" data-id="c433227" data-element_type="container"> <div class="e-con-inner"> <div class="elementor-element elementor-element-d2969c5 elementor-widget elementor-widget-n-accordion" data-id="d2969c5" data-element_type="widget" data-settings='{"default_state":"expanded","max_items_expended":"one","n_accordion_animation_duration":{"unit":"ms","size":400,"sizes":[]}}' data-widget_type="nested-accordion.default"> <div class="elementor-widget-container"> <div class="e-n-accordion" aria-label="Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys"> <details id="e-n-accordion-item-2200" class="e-n-accordion-item" open> <summary class="e-n-accordion-item-title" data-accordion-index="1" tabindex="0" aria-expanded="true" aria-controls="e-n-accordion-item-2200"> <span class="e-n-accordion-item-title-header"> <div class="e-n-accordion-item-title-text"> What’s the most unexpected challenge organizations face when implementing SOC 2? </div> <p></p></span><br> <span class="e-n-accordion-item-title-icon"><br> <span class="e-opened"><svg aria-hidden="true" class="e-font-icon-svg e-fas-minus" viewbox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span><br> <span class="e-closed"><svg aria-hidden="true" class="e-font-icon-svg e-fas-plus" viewbox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span><br> </span> </summary> <div role="region" aria-labelledby="e-n-accordion-item-2200" class="elementor-element elementor-element-f5e7efc e-con-full e-flex e-con e-child" data-id="f5e7efc" data-element_type="container"> <div class="elementor-element elementor-element-fb69b28 elementor-widget elementor-widget-text-editor" data-id="fb69b28" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>One surprising hurdle that many organizations encounter is <strong data-start="364" data-end="379">mis-scoping</strong> the <a href="https://www.trustcloud.ai/soc2/" rel="noopener">SOC 2</a> audit, from over-scoping to under-scoping. Striking the right balance is tougher than it looks. Go too narrow, and you risk omitting critical systems or data paths tied to customer commitments; too broad, and you burden your team with unnecessary work and audit noise. Misjudging scope can result in misallocated resources, extended timelines, and even audit failure. The key is to carefully map every system touching customer data and then validate that inventory with stakeholders and your auditor. That way, scope becomes strategic, not an afterthought.</p> </div> </div> </div> </details> <details id="e-n-accordion-item-2201" class="e-n-accordion-item"> <summary class="e-n-accordion-item-title" data-accordion-index="2" tabindex="-1" aria-expanded="false" aria-controls="e-n-accordion-item-2201"> <span class="e-n-accordion-item-title-header"> <div class="e-n-accordion-item-title-text"> Why is managing third-party and vendor risk so difficult during SOC 2 readiness? </div> <p></p></span><br> <span class="e-n-accordion-item-title-icon"><br> <span class="e-opened"><svg aria-hidden="true" class="e-font-icon-svg e-fas-minus" viewbox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span><br> <span class="e-closed"><svg aria-hidden="true" class="e-font-icon-svg e-fas-plus" viewbox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span><br> </span> </summary> <div role="region" aria-labelledby="e-n-accordion-item-2201" class="elementor-element elementor-element-9288f76 e-con-full e-flex e-con e-child" data-id="9288f76" data-element_type="container"> <div class="elementor-element elementor-element-d1854b3 elementor-widget elementor-widget-text-editor" data-id="d1854b3" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Many organizations don’t anticipate how intertwined their systems are with vendors, service providers, and partners, yet every external connection introduces a potential compliance blind spot. The real challenge is not only identifying which vendors matter for SOC 2 but also collecting up-to-date assurance from them and continuously tracking their security posture. If one vendor isn’t compliant or fails to manage risk properly, it could ripple into your own audit. The solution is creating a structured vendor assessment pipeline: assess, document, monitor and loop in remediation where needed to shore up the weakest links.</p> </div> </div> </div> </details> <details id="e-n-accordion-item-2202" class="e-n-accordion-item"> <summary class="e-n-accordion-item-title" data-accordion-index="3" tabindex="-1" aria-expanded="false" aria-controls="e-n-accordion-item-2202"> <span class="e-n-accordion-item-title-header"> <div class="e-n-accordion-item-title-text"> Why does evidence collection and organization often become a compliance breaking point? </div> <p></p></span><br> <span class="e-n-accordion-item-title-icon"><br> <span class="e-opened"><svg aria-hidden="true" class="e-font-icon-svg e-fas-minus" viewbox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span><br> <span class="e-closed"><svg aria-hidden="true" class="e-font-icon-svg e-fas-plus" viewbox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z"></path></svg></span><br> </span> </summary> <div role="region" aria-labelledby="e-n-accordion-item-2202" class="elementor-element elementor-element-bb6137b e-con-full e-flex e-con e-child" data-id="bb6137b" data-element_type="container"> <div class="elementor-element elementor-element-38814ca elementor-widget elementor-widget-text-editor" data-id="38814ca" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Evidence is the lifeblood of SOC 2 audits and yet it’s often the most chaotic, overlooked component. Auditors want proof of more than just policies; they expect logs, monitoring dashboards, access reviews, incident histories, and more, all formatted clearly and paired with control objectives. When evidence is scattered across emails, spreadsheets, or local drives, you lose credibility fast. Manual collection eats time and invites mistakes. The smarter route is to centralize documentation early, use automated tools where possible, and align evidence directly with control mappings. That way, you build audit readiness into your daily operations, not just scramble when the audit window opens.</p> </div> </div> </div> </details></div> </div> </div> </div> </div> </div><p>The post <a rel="nofollow" href="https://www.trustcloud.ai/soc-2/one-unexpected-challenge-organizations-face-while-implementing-soc-2/">One unexpected challenge organizations face while implementing SOC 2</a> first appeared on <a rel="nofollow" href="https://www.trustcloud.ai/">TrustCloud</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/one-unexpected-challenge-organizations-face-while-implementing-soc-2/" data-a2a-title="One unexpected challenge organizations face while implementing SOC 2"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fone-unexpected-challenge-organizations-face-while-implementing-soc-2%2F&amp;linkname=One%20unexpected%20challenge%20organizations%20face%20while%20implementing%20SOC%202" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fone-unexpected-challenge-organizations-face-while-implementing-soc-2%2F&amp;linkname=One%20unexpected%20challenge%20organizations%20face%20while%20implementing%20SOC%202" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fone-unexpected-challenge-organizations-face-while-implementing-soc-2%2F&amp;linkname=One%20unexpected%20challenge%20organizations%20face%20while%20implementing%20SOC%202" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fone-unexpected-challenge-organizations-face-while-implementing-soc-2%2F&amp;linkname=One%20unexpected%20challenge%20organizations%20face%20while%20implementing%20SOC%202" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fone-unexpected-challenge-organizations-face-while-implementing-soc-2%2F&amp;linkname=One%20unexpected%20challenge%20organizations%20face%20while%20implementing%20SOC%202" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.trustcloud.ai">TrustCloud</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Shweta Dhole">Shweta Dhole</a>. Read the original post at: <a href="https://www.trustcloud.ai/soc-2/one-unexpected-challenge-organizations-face-while-implementing-soc-2/">https://www.trustcloud.ai/soc-2/one-unexpected-challenge-organizations-face-while-implementing-soc-2/</a> </p>

Generative AI: Boon or Bane? Unveiling Security Risks & Possibilities

  • None
  • Published date: 2025-08-29 00:00:00

None

<p>The rapid advancement of Generative AI models like ChatGPT, DALL-E, and others is transforming how we create, interact with content, and even perceive the line between human-generated and machine-produced output. Yet, beneath the surface of these exciting possibilities lurk serious security risks. From sophisticated phishing attacks and the spread of disinformation to the erosion of trust in online information, the misuse of these AI models necessitates a re-examination of security practices. Passwordless authentication emerges as a vital piece of the security puzzle, offering a robust defense mechanism in a world where Generative AI adds new complexities. This in-depth article dissects the unique security challenges associated with Generative AI. It will explore why traditional password-based security falls short in this landscape and how passwordless solutions offer a more robust safeguard for users.</p><h2>The Double-Edged Sword of Generative AI</h2><p>The capabilities of Generative AI are undoubtedly impressive, with potential benefits ranging from accelerated content creation to the personalization of products and services:</p><ul> <li><strong>Hyper-Realistic Text Generation:</strong> Creating deceptively authentic emails, social media posts, or even news articles, facilitating a new level of targeted and convincing phishing campaigns.</li> <li><strong>Image and Video Manipulation:</strong> Generating deepfakes with unprecedented ease, amplifying the potential for impersonation, fraud, and the spread of disinformation.</li> <li><strong>Code Generation and Vulnerability Discovery:</strong> Potential for malicious actors to leverage AI for more efficient bug hunting in target systems, discovering and exploiting security flaws with greater speed.</li> <li><strong>Bias and Misinformation Amplification:</strong> As AI models are trained on massive datasets, inherent bias in the source data can be replicated and amplified in generated output, perpetuating harmful stereotypes or fueling false narratives.</li> </ul><h2>Why Passwords Aren't Enough Anymore</h2><p>Generative AI significantly widens the attack surface and changes the rules of engagement for cybercriminals:</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><ul> <li><strong>Hyper-Personalized Phishing Attacks:</strong> AI-crafted phishing emails, tailored to the victim's writing style, interests, and even social connections can significantly bypass traditional spam filters and trick even security-conscious individuals into revealing their login credentials.</li> <li><strong>Social Engineering at Scale:</strong> AI-generated social media posts, comments, or direct messages can mimic real people convincingly, manipulating emotions and building trust to extract sensitive information or trick victims into performing actions detrimental to their security.</li> <li><strong>Account Takeover Automation:</strong> Credential stuffing attacks become even more potent when attackers can use AI to generate an extensive array of password variations or tailor them to specific targets based on leaked personal data.</li> <li><strong>Synthetic Identity Fraud:</strong> Generating seemingly legitimate fake identities with AI-created documents, images, or even voices opens the door for a new level of online fraud and impersonation.</li> </ul><h2>The Passwordless Advantage in a World with Generative AI</h2><p>Passwordless authentication, with its focus on biometrics, hardware keys, or device-based verification, offers several crucial defenses against these heightened threats:</p><h3>Inherent Resistance to Phishing and Social Engineering:</h3><ul> <li>Passwordless methods are not susceptible to trickery. Biometric authentication can't be coaxed out of a user, and FIDO security keys offer un-phishable protection.</li> <li>AI-generated deepfakes, while visually convincing, won't fool biometric systems or hardware-based authentication checks.</li> </ul><h3>Reduced Reliance on Human Judgment:</h3><p>Eliminates the need for users to constantly judge the legitimacy of emails, texts, or social media content, where even the most vigilant can be deceived by highly targeted and personalized content generated using AI.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="008f32876bb695d9abddf223-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="008f32876bb695d9abddf223-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><h3>Stronger Defense Against Credential Stuffing:</h3><p>Stolen passwords become less valuable to attackers when accounts are protected with passwordless authentication methods.</p><h3>Synthetic Identity Mitigation:</h3><p>Advanced biometric authentication systems and multi-layered verification checks make it significantly harder to establish fraudulent synthetic identities on a large scale.</p><h2>Real-World Examples: MojoAuth in Action Against AI-Powered Threats</h2><p>Let's imagine how MojoAuth solutions mitigate the risks posed by Generative AI:</p><h3>Scenario 1: Financial Services Platform</h3><p>A financial institution deploys MojoAuth for customer account access. Biometric or FIDO key-based authentication becomes the primary login method. An AI-powered phishing campaign targeting customers with highly personalized content fails to gain traction as accounts are immune to traditional password-based attacks.</p><h3>Scenario 2: Online Marketplace</h3><p>An online marketplace integrates MojoAuth for both buyers and sellers. Social logins and magic links streamline onboarding. The platform becomes less susceptible to fraudulent accounts created using AI-generated synthetic identities due to integrated robust verification processes.</p><h3>Scenario 3: News and Information Website</h3><p>A news website adopts MojoAuth for their comment sections. Passwordless options and device-based verification significantly reduce the prevalence of AI-generated bot accounts spreading disinformation or inflammatory content within comment sections.</p><h2>Advanced MojoAuth Features for the Evolving Threat Landscape</h2><p>MojoAuth offers a suite of features particularly valuable in combating the security challenges amplified by Generative AI:</p><ul> <li><strong>Adaptive Authentication and Risk Analysis:</strong> MojoAuth's intelligent risk assessment engine can be trained to detect patterns or anomalies in behavior that might be indicative of AI-generated interactions or attempts to manipulate user behavior.</li> <li><strong>Behavioral Biometrics Integration:</strong> Going beyond static fingerprint or facial recognition, behavioral biometrics analyzes factors like typing cadence, mouse movements, and device usage patterns to provide an extra layer of protection that is significantly harder for AI to mimic.</li> <li><strong>Zero-Trust Principles:</strong> MojoAuth's philosophy aligns with a Zero-Trust approach, where every login attempt is evaluated based on multiple factors. This mindset is crucial in a world where even seemingly human-generated content could be AI-crafted.</li> </ul><h2>Strategic Considerations for Successful Passwordless Implementation</h2><p>Embracing passwordless authentication in response to the Generative AI revolution requires careful planning and a nuanced approach:</p><ul> <li><strong>Gradual Rollout and User Education:</strong> Introduce passwordless options seamlessly alongside passwords, providing clear guidance and support resources to help users adjust and understand the benefits.</li> <li><strong>Choice and Inclusivity:</strong> Offer a range of passwordless methods (biometrics, hardware keys, magic links) to cater to diverse user preferences and technical capabilities.</li> <li><strong>Strong Account Recovery Processes:</strong> Proactive planning for how users will regain access if they lose their device or biometric authentication is compromised is essential to avoid creating new security hurdles.</li> <li><strong>Data Privacy Considerations:</strong> Be transparent about the collection and storage of sensitive biometric data, addressing potential privacy concerns of users.</li> </ul><h2>Security Vigilance in the Era of Generative AI</h2><p>It's important to acknowledge that even passwordless authentication is not a silver bullet. It's crucial to maintain a multi-pronged security strategy in the face of evolving Generative AI-powered threats:</p><ul> <li><strong>Continuous Monitoring and Anomaly Detection:</strong> Analyze patterns in authentication attempts, login behavior, and user actions to identify potential signs of AI-driven abuse. Refine fraud detection models to adapt to new attack patterns.</li> <li><strong>User Education on Emerging Threats:</strong> Help users understand the risks of AI-generated content and the importance of critical thinking when evaluating online information, even if seemingly authentic at first glance. For instance, tools like an <a href="https://www.renderforest.com/ai-video-generator">AI video generator</a> can create highly realistic videos that may appear trustworthy, making awareness and skepticism more critical than ever.</li> <li><strong>Collaboration for Industry Standards:</strong> Proactive participation in shaping industry-wide security standards and responses to Generative AI misuse is crucial for keeping pace with rapidly evolving threats.</li> </ul><h2>The Future: Adapting Authentication in a World of Human-AI Blurring</h2><p>The field of authentication will inevitably evolve alongside the use and misuse of Generative AI. Here's a glimpse into potential future developments:</p><ul> <li><strong>Hybrid Authentication Models:</strong> Combining passwordless methods with continuous behavioral authentication could offer a robust defense where AI attempts to mimic genuine user interactions are thwarted by analysis of subtle patterns unique to humans.</li> <li><strong>Cross-Platform Content Verification:</strong> Collaboration between platforms to develop systems for detecting and flagging content with a high probability of being AI-generated, mitigating its spread and potentially reducing phishing efficacy.</li> <li><strong>Evolution of Regulations and Best Practices:</strong> As Generative AI and its security implications mature, anticipate a shift in regulations and industry-wide standards, potentially making robust passwordless solutions a regulatory compliance requirement.</li> </ul><h2>Conclusion</h2><p>The rise of Generative AI marks both a transformative and disruptive force in the digital landscape. While its potential for good is immense, the security threats it amplifies demand a re-evaluation of how we approach authentication. Passwordless solutions powered by providers like MojoAuth emerge as a cornerstone of this security evolution. By embracing a future where passwords play a diminishing role, businesses can proactively defend their systems, protect their users, and mitigate the risks associated with this powerful new technology. Are you ready to explore how MojoAuth can transform your authentication strategy and prepare your business for the challenges and possibilities of the Generative AI era?</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/generative-ai-boon-or-bane-unveiling-security-risks-possibilities/" data-a2a-title="Generative AI: Boon or Bane? Unveiling Security Risks &amp; Possibilities"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fgenerative-ai-boon-or-bane-unveiling-security-risks-possibilities%2F&amp;linkname=Generative%20AI%3A%20Boon%20or%20Bane%3F%20Unveiling%20Security%20Risks%20%26%20Possibilities" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fgenerative-ai-boon-or-bane-unveiling-security-risks-possibilities%2F&amp;linkname=Generative%20AI%3A%20Boon%20or%20Bane%3F%20Unveiling%20Security%20Risks%20%26%20Possibilities" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fgenerative-ai-boon-or-bane-unveiling-security-risks-possibilities%2F&amp;linkname=Generative%20AI%3A%20Boon%20or%20Bane%3F%20Unveiling%20Security%20Risks%20%26%20Possibilities" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fgenerative-ai-boon-or-bane-unveiling-security-risks-possibilities%2F&amp;linkname=Generative%20AI%3A%20Boon%20or%20Bane%3F%20Unveiling%20Security%20Risks%20%26%20Possibilities" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fgenerative-ai-boon-or-bane-unveiling-security-risks-possibilities%2F&amp;linkname=Generative%20AI%3A%20Boon%20or%20Bane%3F%20Unveiling%20Security%20Risks%20%26%20Possibilities" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://mojoauth.com/blog">MojoAuth - Advanced Authentication &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by MojoAuth - Advanced Authentication &amp; Identity Solutions">MojoAuth - Advanced Authentication &amp; Identity Solutions</a>. Read the original post at: <a href="https://mojoauth.com/blog/the-rise-of-generative-ai">https://mojoauth.com/blog/the-rise-of-generative-ai</a> </p>

Help Wanted: Dark Web Job Recruitment is Up

  • Teri Robinson
  • Published date: 2025-08-29 00:00:00

None

<p><i><span style="font-weight: 400;">If you’re an industrious, persistent, English-speaking bad actor with a documented expertise in AI and a penchant for wreaking havoc on business, government and infrastructure, please apply within.</span></i></p><p><span style="font-weight: 400;">Or so it goes on the <a href="https://securityboulevard.com/2025/05/on-the-hunt-for-cyber-jihadists-on-the-dark-web-an-analysis/" target="_blank" rel="noopener">dark web</a>, where the “economy” is apparently booming and recruiters are pulling out all the stops to lure the best and brightest tech miscreants. In just seven months, the number of recruitment and self-promotion posts on cybercriminal forums like “Exploit” and “RAMP” has already reached last year’s number (which was already double the number recorded in 2023), according to </span><a href="https://reliaquest.com/blog/threat-spotlight-cybercrime-is-hiring-recruiting-ai-iot-and-cloud-experts/" target="_blank" rel="noopener"><span style="font-weight: 400;">research from Reliaquest</span></a><span style="font-weight: 400;">.</span></p><p><span style="font-weight: 400;">I think it is fair to say that the recruiters on the dark web are going just as hard as those on legit job boards. And the qualifications they are seeking are pretty specific and not surprising. </span></p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><span style="font-weight: 400;">“Our adversaries work in campaigns, and they’re incentivized to build an ecosystem and marketplace of specialized service providers and technical services — they clearly share and collaborate without the overhead and legal hurdles that defensive security teams do,” says Trey Ford, chief strategy and trust officer at Bugcrowd.</span></p><p><span style="font-weight: 400;">Among the most in-demand skills is English-speaking social engineering, with job posts more than doubling from 2024 to 2025,” say the Reliaquest Threat Research Team, who analyzed hundreds of dark-web job postings from January 1, 2023, to July 31, 2025. </span></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="f9282fe4347aaf264f79e04b-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="f9282fe4347aaf264f79e04b-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p><span style="font-weight: 400;">They note that recruiters make up 87% of the postings, “indicating strong demand, likely fueled by the success of groups like Scattered Spider in leveraging this skill for initial access attacks.” </span></p><p><span style="font-weight: 400;">While references to Scattered Spider “tend to garner a lot of attention, the real trendline to watch is the integration of AI into cyber adversaries’ toolsets to automate reconnaissance and create precision-targeted, customized attacks at scale,” says Dave Tyson, partner, intelligence operations, iCounter. </span></p><p><span style="font-weight: 400;">After a dip in 2024, recruits skilled in compromising IoT have become a hot role again, with r</span><span style="font-weight: 400;">ecruitment rebounding and on track by the end of 2025 to exceed activity in previous years. Not surprisingly, AI experts are in demand, as they have been since Q3 2024, to automate operations, which Reliaquest researchers say marks “a shift from using AI for isolated tasks — like leveraging LLMs to develop malware—to fully integrating AI into operational processes.”</span></p><p><span style="font-weight: 400;">It seems recruiters are finding “worthy” candidates who have already yielded results. </span><span style="font-weight: 400;">For instance, “recruitment of ClickFix experts to distribute malware triggered a 200 percent spike in ClickFix activity between March and April 2025.” </span></p><p><span style="font-weight: 400;">Taking the pulse of the dark-web job market can predict cybercrime’s future. “Understanding what skills attackers are recruiting for now can help organizations anticipate—and counter—their next moves,” the researchers said. </span></p><p><span style="font-weight: 400;">Cloud exploitation clearly remains a top goal of those job seekers who traverse the dark web — the researchers say mentions of Azure and Entra quadrupled from 2023 to mid-2025.</span></p><p><span style="font-weight: 400;">And of course, AI will dominate the future, with an emphasis on recruits who have deepfake capabilities that let attackers impersonate employees for more effective social engineering attacks.</span></p><p><span style="font-weight: 400;">The researchers believe that once adversaries can remove language barriers in real time (currently a technical challenge), deepfakes will be an even greater threat. “Attackers could target organizations across multiple languages, significantly expanding their reach,” they said, noting that with “recruitment for English-speaking social engineers already at an all-time high, real-time deepfake technology offers an alternative to traditional methods.”</span></p><p><span style="font-weight: 400;">They expect an uptick in social engineering attacks as a result. “Without robust security measures, organizations face significant risk from these increasingly deceptive tactics, which are expected to emerge in the long-term future beyond 12 months,” they said. </span></p><p><span style="font-weight: 400;">And successful attacks will continue to drive the dark web job market. </span><span style="font-weight: 400;">“The increase in AI functionality to rapidly increase forged criminal content used in social engineering attacks is a direct linkage to both the success of the attacks and the need for more personnel,” Tyson says, because as bad guys rack up more wins by using AI, it drives higher staffing needs and higher compensation for threat actors. </span></p><p><span style="font-weight: 400;">“Our adversaries work in campaigns, and they’re incentivized to build an ecosystem and marketplace of specialized service providers and technical services—they clearly share and collaborate without the overhead and legal hurdles that defensive security teams do,” says Trey Ford, chief strategy and trust officer at Bugcrowd.</span></p><p><span style="font-weight: 400;">Threat actors will be early adopters of tools like AI to streamline and find efficiency – this makes campaigns faster to set up, modify, adapt, and re-use over time.</span></p><p><span style="font-weight: 400;">Ford says it is more important than ever to aggressively monitor the new hire pipeline. “New accounts need to be closely monitored for baseline adoption, access and usage — identity proofing at new hire onboarding, and account access behaviors should be a focal point right now,” he says.</span></p><p><span style="font-weight: 400;">Experts expect a thriving dark economy in the months and years to come. Maybe the cybersecurity industry should start tracking jobs added each month, a la the U.S. government. And, who knows, perhaps recruits will start demanding more “job benefits.”</span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/help-wanted-dark-web-job-recruitment-is-up/" data-a2a-title="Help Wanted: Dark Web Job Recruitment is Up"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fhelp-wanted-dark-web-job-recruitment-is-up%2F&amp;linkname=Help%20Wanted%3A%20Dark%20Web%20Job%20Recruitment%20is%20Up" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fhelp-wanted-dark-web-job-recruitment-is-up%2F&amp;linkname=Help%20Wanted%3A%20Dark%20Web%20Job%20Recruitment%20is%20Up" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fhelp-wanted-dark-web-job-recruitment-is-up%2F&amp;linkname=Help%20Wanted%3A%20Dark%20Web%20Job%20Recruitment%20is%20Up" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fhelp-wanted-dark-web-job-recruitment-is-up%2F&amp;linkname=Help%20Wanted%3A%20Dark%20Web%20Job%20Recruitment%20is%20Up" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fhelp-wanted-dark-web-job-recruitment-is-up%2F&amp;linkname=Help%20Wanted%3A%20Dark%20Web%20Job%20Recruitment%20is%20Up" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Organized and Criminal, Ransomware Gangs Run Up Profits

  • Teri Robinson
  • Published date: 2025-08-29 00:00:00

None

<p><span data-contrast="none">Move over, Michael Corleone and Tony Soprano, there’s a new godfather or two — or 200 — in town. Ransomware is up by 49% this year in part because gangs are operating — and successfully so — like organized criminal enterprises, according to new data from NordStellar.</span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">The </span><a href="https://nordstellar.com/blog/ransomware-statistics-2025-q2/?articleOrCategory=ransomware-statistics-2025-Q2" target="_blank" rel="noopener"><span data-contrast="none">research points to</span></a><span data-contrast="none"> more than 200 ransomware groups, with 60 of those still active. Vakaris Noreika, a cybersecurity expert at NordStellar, says that defenders often make a big mistake thinking that ransomware operators are lone wolves. “Ransomware groups are organized crime, and it’s extremely dangerous to underestimate how equipped they are to carry out their attacks. They function like a corporation, with different individuals assigned to specific tasks so that the operation runs smoothly,” Noreika said in a release. “They also train their members, sharing knowledge and ensuring their expertise meets their requirements. Some even have insiders in the company they’re targeting, granting them easy access to sensitive resources.” </span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">And they recruit like HR departments on steroids, with Noreika explaining they’re by and large looking for top cybersecurity talent with “an experienced background in specific fields and a proven track record” and who are put through “a meticulous screening before they can join the group, minimizing the risk of their being compromised.” And they’re part of an exclusive pool of candidates who “can only be invited by already established individuals.”</span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><span data-contrast="none">Ransomware teams, “like every other criminal organization, are businesses. Ransoms are usually paid <a href="https://securityboulevard.com/2021/08/the-role-of-cryptocurrency-in-ransomware-attacks/" target="_blank" rel="noopener">via cryptocurrency</a>, and those values have been back on the rise since Q4 2023,” says Trey Ford, chief strategy and trust officer at Bugcrowd.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Their high organizational structure also accounts for the efficiency of their attacks. </span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="624d47afbe02e191e8e12555-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="624d47afbe02e191e8e12555-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p><span data-contrast="none">Offering their wares on a ransomware-as-a-service (RaaS) model, these groups lower the barrier to entry and help scale ransomware “even more exponentially.” With more bad actors launching attacks, the ransomware group’s profits are maximized. Some groups, Noreika explains, “even use RaaS themselves” to scale their operations “without the need for additional human resources.”</span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">The cybersecurity industry has “also seen ransomware tactics move away from traditional encryption-centric ransomware tactics towards more sophisticated and advanced extortion methods, says Nathaniel Jones, vice president, security and AI strategy, and field CISO at Darktrace. </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Rather than relying solely on encrypting a target’s data for ransom, Jones notes, “threat actors will increasingly employ double or even triple extortion strategies, encrypting sensitive data but also threatening to leak or sell stolen data unless their ransom demands are met.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Those trends clearly show that “attackers now have a more widely accessible toolbox that reduces their barriers, leaving more organizations vulnerable to attack,” he says.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Not surprisingly, the data shows the top target is critical infrastructure, and the U.S. is the region assailed most frequently.  However, other sectors draw this organized crime element as well. </span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">“Organized cybercrime groups are usual suspects for targeting retail services,” whose high-traffic volume and operational pressures during holidays can be used to increase the negotiating power of cybercriminals”, says Fletcher Davis, senior security research manager at BeyondTrust.</span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Noting how disruptive and disastrous ransomware can be to an organization, Ngoc Bui, a cybersecurity expert at Menlo Security, urges businesses to “prioritize protecting operations and stakeholders.” Those that do suffer a ransomware attack should “use it as a learning opportunity to adjust their security measures and ensure they are using actionable intelligence to do so.”</span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">How do defenders go up against organized criminals and win? Hint: It has nothing to do with teaming with a rival gang, becoming an informant or staging an ambush at a toll plaza (good luck even finding one of those these days). And no horse heads to send a warning. “For IT administrators and practitioners, it is vital to prioritize your vulnerability management program and establish possible attack paths across your estate to prevent unauthorized access,” says Davis, including applying best practices across the business and wider IT teams.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Ford says that “foundational controls still matter,” regardless of the actor behind an attack. “Knowing your total attack surface, testing your environment — with an eye toward efficient remediation is key,” he says. “Enterprise controls, including visibility (logging, EDR) and hardening (privileged account management, careful inventory of service accounts, and multi-factor authentication) for domain admin and remote access, are paramount.” </span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">That firm list of foundational controls that insurance underwriters require for policyholders speaks volumes. “If those controls are not effective, cyber insurance underwriters might have to pay out,” he says. In addition, security pros should “be open with management about which of those controls are effective and lacking — and secure funding to get them online as fast as possible.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p>Davis emphasizes the importance of <span data-contrast="none">implementing “strict vendor access controls with time-limited permissions and continuous monitoring of third-party activities, establishing robust IT help desk verification processes that require multi-factor authentication (MFA) before password resets or system changes, and creating clear protocols for validating identity through multiple channels before granting access.”</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">Building layered defenses around the most common attack vectors, “limiting vendor access to only what’s absolutely necessary and making it much harder for attackers to social engineer their way into critical systems through help desk manipulation,” Davis says.</span><span data-ccp-props='{"201341983":0,"335557856":16777215,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">If a ransomware attack slips past defenses, Ngoc Bui, a cybersecurity expert at Menlo Security, says businesses should “use it as a learning opportunity to adjust their security measures and ensure they are using actionable intelligence to do so.”</span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><p><span data-contrast="none">No doubt, defenders must up their game to spurn these gangsters…or be prepared to kiss the ring and pay the protection to get their data back.</span><span data-ccp-props='{"134233117":false,"134233118":false,"201341983":0,"335557856":16777215,"335559738":0,"335559739":0,"335559740":240}'> </span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/organized-and-criminal-ransomware-gangs-run-up-profits-2/" data-a2a-title="Organized and Criminal, Ransomware Gangs Run Up Profits "><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Forganized-and-criminal-ransomware-gangs-run-up-profits-2%2F&amp;linkname=Organized%20and%20Criminal%2C%20Ransomware%20Gangs%20Run%20Up%20Profits%C2%A0" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Forganized-and-criminal-ransomware-gangs-run-up-profits-2%2F&amp;linkname=Organized%20and%20Criminal%2C%20Ransomware%20Gangs%20Run%20Up%20Profits%C2%A0" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Forganized-and-criminal-ransomware-gangs-run-up-profits-2%2F&amp;linkname=Organized%20and%20Criminal%2C%20Ransomware%20Gangs%20Run%20Up%20Profits%C2%A0" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Forganized-and-criminal-ransomware-gangs-run-up-profits-2%2F&amp;linkname=Organized%20and%20Criminal%2C%20Ransomware%20Gangs%20Run%20Up%20Profits%C2%A0" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Forganized-and-criminal-ransomware-gangs-run-up-profits-2%2F&amp;linkname=Organized%20and%20Criminal%2C%20Ransomware%20Gangs%20Run%20Up%20Profits%C2%A0" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Can We Really Eliminate Human Error in Cybersecurity?

  • Ozhan Sisic
  • Published date: 2025-08-28 00:00:00

None

<p><span data-contrast="auto">For years, cybersecurity has been sold as a fortress-building exercise. The language is dramatic — military-grade encryption, zero-day protection and ironclad infrastructure. Yet, breach after breach tells the same unremarkable story: Someone clicked something they shouldn’t have; someone left a port open; someone trusted the wrong system.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">As someone who’s spent years in the trenches of cybersecurity, I have seen this play out time and again. The most sophisticated attacker rarely defeats the most sophisticated system. They defeat the least careful person connected to it.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">In other words, the flaw isn’t in the code — it’s in the conduct. We like to think of cybersecurity as a highly technical thing, but the <a href="https://securityboulevard.com/2025/07/inside-the-ai-threat-landscape-from-jailbreaks-to-prompt-injections-and-agentic-ai-risks/" target="_blank" rel="noopener">threat landscape is far more human and complicated</a>. The errors that bring down multimillion-dollar infrastructures are often laughably simple: A reused password, a forgotten environment or a permission granted out of habit.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><span data-contrast="auto">Cybersecurity isn’t just about defending systems. It’s about analyzing how humans behave under stress, distraction or convenience — and designing around that, not despite it.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">In almost every high-profile breach, it wasn’t that the hackers outsmarted the technology. They exploited trust, routine and human fallibility. Until we stop treating these as edge cases, but as the default state of the world, we’ll keep building walls with the wrong blueprint.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="754cfbb04cc55ff68f2dc456-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="754cfbb04cc55ff68f2dc456-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p><span data-contrast="auto">What we need isn’t a fantasy of flawless systems. We need a framework built for fallibility — resilient enough to expect mistakes and functional enough to survive them.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><h3 aria-level="3"><span data-contrast="none">People are the Real Attack Surface</span><span data-ccp-props='{"134245418":false,"134245529":false,"335551550":6,"335551620":6,"335559738":280,"335559739":80}'> </span></h3><p><span data-contrast="auto">You can encrypt data. You can isolate networks. You can audit every line of code.</span><span data-contrast="auto"> But you can’t stop a user from clicking a link that looks like it came from a friend; or reusing the password they created in 2007 for a long-dead forum; or skipping the security prompt because they’ve ‘never used it anyway’.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">We have architected entire infrastructures to keep bad actors out. But we forget that the easiest way in isn’t through the firewall — it’s through the front door, wearing a trusted face. Phishing, credential stuffing and social engineering — none of these are new. But they are disturbingly effective because they target the one thing that never gets updated: Human instinct, especially in emotionally charged environments such as gaming or social platforms, attackers mimic urgency, reward and familiarity to sidestep the logic gates entirely.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">It’s not about recklessness — it’s about reflex. These attacks target the lizard brain — triggering panic, desire and fear of missing out (FOMO). And in that split second, policy becomes irrelevant. What matters is your gut reaction.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Here are several now-infamous examples:</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559737":600,"335559738":240,"335559739":240}'> </span></p><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="2" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The </span><i><span data-contrast="auto">Slack token attack at EA</span></i><span data-contrast="auto">, where hackers simply asked an employee for access.</span><br><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="2" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">The </span><i><span data-contrast="auto">Twitch data leak</span></i><span data-contrast="auto">, when misconfigured permissions and stolen credentials collided.</span><br><span data-ccp-props='{"335551550":6,"335551620":6}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="2" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">The </span><i><span data-contrast="auto">Google Docs worm</span></i><span data-contrast="auto">, which spread like wildfire by impersonating a Google permission request.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559739":240}'> </span></li></ul><p><span data-contrast="auto">None of these were zero-day exploits. They were </span><i><span data-contrast="auto">trust</span></i><span data-contrast="auto"> exploits.</span><span data-contrast="auto"> </span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">You can’t patch curiosity. You can only design for it.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">My approach? Make the secure choice the easy one. Not by punishing mistakes, but by studying the psychology that leads to them. Phishing simulations aren’t witch hunts. They’re behavior audits. Usability testing isn’t fluff, it’s critical infrastructure.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Security that frustrates users will always be bypassed. So, don’t design for perfection. Design for real people, in real workflows, under real pressure. </span><span data-contrast="auto">At the end of the day the people will click.</span><br><span data-contrast="auto">The question is: What happens next?</span><span data-ccp-props='{"335559738":240,"335559739":240}'> </span></p><h3 aria-level="3"><span data-contrast="none">When the Call is Coming from Inside the House</span><span data-ccp-props='{"134245418":false,"134245529":false,"335551550":6,"335551620":6,"335559738":280,"335559739":80}'> </span></h3><p><span data-contrast="auto">It’s easy to imagine attackers as outsiders breaching the perimeter. But some of the most dangerous failures start inside, with the people building the system. A rushed configuration, an exposed development tool or a last-minute code commitment that skips review — these aren’t acts of sabotage. They’re decisions made under pressure, with limited visibility. The issue isn’t bad actors — it is system complexity and the gap between speed and safety. In fragmented environments, no one sees the whole picture. Risks build quietly.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">That’s why I advocate for intentional security: A shared culture where responsibility extends beyond the security team. It’s not about turning developers into experts, but giving them ownership, secure defaults, embedded tools and a safe space to raise concerns.</span><span data-contrast="auto"> One of the worst-case scenarios? Someone notices something off but says nothing. Not because they don’t care, but because they’re unsure it’s their job. By the time it is — it’s too late.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Policies can’t catch mistakes. People can. But only if speaking up is expected, not questioned.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><h3 aria-level="3"><span data-contrast="none">Error Chains — Why Mistakes Happen Despite Best Intentions</span><span data-ccp-props='{"134245418":false,"134245529":false,"335551550":6,"335551620":6,"335559738":280,"335559739":80}'> </span></h3><p><span data-contrast="auto">No breach ever starts with a grand, cinematic act of sabotage. It starts with a missed update or a stale test account or a security alert flagged one too many times as a false positive. Like a row of dominoes, each small, understandable lapse quietly lines up until the last one topples the system. It’s never one thing. It’s a dozen tiny things, all happening in the wrong order, under the wrong circumstances.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">During my work leading global application security at Sony, I saw firsthand how failure travels. The public is rarely wrong. It’s the execution that collapses under pressure: Deadlines, shifting priorities, product launches that can’t be delayed and systems that don’t tolerate friction. Security doesn’t fail in theory, it fails in the field — where stress is high, time is short and vigilance feels optional.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Real-world examples are abundant:</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="1" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="1" data-aria-level="1"><i><span data-contrast="auto">Capital One’s 2019 breach</span></i><span data-contrast="auto"> began with a misconfigured AWS firewall, paired with access by a former contractor.</span><br><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="1" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="2" data-aria-level="1"><i><span data-contrast="auto">Uber’s 2016 incident</span></i><span data-contrast="auto"> was the result of hardcoded AWS keys left exposed in a public GitHub repo.</span><br><span data-ccp-props='{"335551550":6,"335551620":6}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="1" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Facebook’s 2021 leak of over 500 million records stemmed from an abused contact importer API with poorly throttled permissions.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559739":240}'> </span></li></ul><p><span data-contrast="auto">None of these were the result of a single glaring mistake. They were chains of plausible decisions, made under duress, in fragmented systems without enough safeguards. The myth that strong policies equal strong outcomes is seductive but naïve. Policies are only as good as the environment they live in — resilience trumps rigidity every time.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Instead of punishing errors, I build systems that expect them. For instance, guardrails that limit blast radius, automated checks that don’t rely on perfect attention spans and incident reviews that aren’t about blame, but about how we understand the anatomy of failure. Every breach is a lesson plan; yet if you treat it like an embarrassment instead of a dataset, you’ll learn nothing.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Cybersecurity isn’t a game of perfect execution. It’s a game of absorption — absorbing pressure, mistakes and chaos without letting it become catastrophic.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><h3 aria-level="2"><span data-contrast="auto">Can Automation Save Us?</span><span data-ccp-props='{"134245418":false,"134245529":false,"335551550":6,"335551620":6,"335559738":360,"335559739":80}'> </span></h3><p><span data-contrast="auto">If human error is inevitable, the next question practically writes itself: Can we automate our way out of it?</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Yes, and no.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Automation is one of the most powerful tools in a security leader’s arsenal, especially when it comes to repetitive, error-prone tasks. Enforcing secure configurations, scanning code for known vulnerabilities, flagging leaked credentials and blocking outdated libraries are chores that machines handle better than humans ever could. Machines don’t get tired; they don’t cut corners because they’re late for a meeting. They simply execute, and that’s a huge advantage.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">My teams have used automation to run static and dynamic code analysis, enforce policy at the continuous integration/continuous delivery (CI/CD) level and spot drift before it becomes breach material. But for every case where automation works beautifully, there’s another where it introduces new, more insidious risks. Automation reflects the assumptions of the people who built it. If those assumptions are flawed, the automation won’t just replicate the mistake — it’ll scale it.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">I have seen companies deploy bots that sent alerts into dead channels, or auto-approved changes that violated every security principle, simply because no one thought to build a failsafe into the system. Some rules flagged erroneous behavior, while others flagged too many, burying real threats under noise.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">The goal, then, isn’t to replace human decision-making, but amplify it. I see automation as a co-pilot, not a commander. Its job is to clear clutter, surface anomalies and reduce the cognitive load on the people doing the hard thinking. The true power of automation is consistency. It frees your team to focus on edge cases and nuance — things machines can’t reason through. This creates space for judgment.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Judgment must still exist. Someone must still ask, ‘Does this make sense’? Automation won’t challenge your blind spots. It won’t stop a bad idea if it’s implemented cleanly.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Cybersecurity is still a human problem. So, your tooling should support the people, not sideline them. When deployed well, automation restores your team’s most precious resource: Attention. When deployed blindly, it becomes a liability hiding in plain sight.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><h3 aria-level="3"><span data-contrast="none">The Simulation Approach — Penetration Testing and Red Teams</span><span data-ccp-props='{"134245418":false,"134245529":false,"335551550":6,"335551620":6,"335559738":280,"335559739":80}'> </span></h3><p><span data-contrast="auto">In cybersecurity, there’s a difference between knowing how a system might break — and watching it actually collapse.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">That’s why the smartest security teams don’t just build defenses. They attack their own infrastructure before anyone else can. Red teaming, ethical hacking, chaos drills and phishing simulations — these aren’t buzzwords. They are full-contact stress tests designed to mimic real-world failure before it gets a chance to go live.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">You don’t wait for a fire to check if the exits work. You run the drill. You block the hallway. You pull the alarm and see who panics.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">I see simulations as a form of institutional memory. Not just about detection speed, but about muscle memory.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Who spots the breach first?</span><br><span data-contrast="auto">Who communicates it?</span><br><span data-contrast="auto">Who patches?</span><br><span data-contrast="auto">Who handles legal, press and stakeholders?</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">A breach isn’t just a technical event, it’s a company-wide crisis. If you haven’t rehearsed your roles, you’ll default to chaos.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">I’ve led tabletop exercises where product, engineering and executive teams came together to walk through complex breach scenarios. A developer uploads a key to GitHub — how fast is it caught? A spoofed login page captures credentials — does the security operations center (SOC) detect lateral movement? The goal isn’t to embarrass people. It’s to stress-test coordination under pressure.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Simulations are where you discover that your alert went to the wrong Slack channel; or that your escalation policy is dependent on someone who’s currently on vacation. But these drills aren’t just for show. They produce data: How long does it take to respond, where do communications break down and how do assumptions crumble. In fact, perhaps most importantly, how your team behaves when the script disappears.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Growth doesn’t come from pretending failure won’t happen — it comes from making failure mundane. Too many companies run penetration tests to check a compliance box. The report gets filed. Nothing changes. These exercises are only valuable if they lead to rewiring, not just reflection.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">A good red team exercise ends with a fix, not a summary. A great one changes how your entire organization thinks about risk. Simulation doesn’t eliminate human error, but it makes sure you meet it on your own terms, not the attacker’s.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559737":600,"335559738":240,"335559739":240}'> </span></p><h3 aria-level="3"><span data-contrast="none">The Inevitable Truth</span><span data-ccp-props='{"134245418":false,"134245529":false,"335551550":6,"335551620":6,"335559738":280,"335559739":80}'> </span></h3><p><span data-contrast="auto">Let’s make one thing clear: Human error isn’t a bug in the system — it </span><i><span data-contrast="auto">is</span></i><span data-contrast="auto"> the system.</span><span data-ccp-props='{"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">We forget; we improvise; we trust easily and we skip steps when we’re tired. In terms of security, these aren’t exceptions, they’re the default operating conditions. Pretending otherwise leads to brittle systems, unrealistic expectations and a culture of blame. </span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">You can’t out-policy human nature. You have to design with it in mind; or it will design the breach for you.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">I’ve spent years watching teams chase the illusion of airtight security — adding more controls, stricter processes and longer checklists. But breaches still happen. Not because the rules were bad, but because life got in the way (for instance, timelines, miscommunications, a moment of inattention and so on).</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">The companies that recover fastest from breaches aren’t the ones with the most tools. They’re the ones that know how to bend without snapping.</span> <span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">They have margin built into their systems.</span><br><span data-contrast="auto">They run chaos drills like fire alarms.</span><br><span data-contrast="auto">They treat every incident as feedback, not failure.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">Every red flag you miss is a gift — because next time, you won’t.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559737":600,"335559738":240,"335559739":240}'> </span></p><p><span data-contrast="auto">This is what mature security looks like:</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Detection that moves faster than exploitation.</span><br><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Recovery that works without heroics.</span><br><span data-ccp-props='{"335551550":6,"335551620":6}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Teams that speak up instead of second-guessing.</span><br><span data-ccp-props='{"335551550":6,"335551620":6}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="●" data-font="" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769242":[8226],"469777803":"left","469777804":"●","469777815":"multilevel"}' data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Systems that treat error not as a surprise, but as a known variable.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559739":240}'> </span></li></ul><p><span data-contrast="auto">Blame doesn’t prevent breaches, psychological safety does. If your engineers are afraid to raise their hand when something looks off, you’ve already lost. The mission isn’t to eliminate human error — that’s fantasy. The mission is to anticipate it, simulate it and mitigate it, and build an infrastructure that doesn’t crumble when someone, inevitably, screws up.</span><span data-ccp-props='{"335551550":6,"335551620":6,"335559738":240,"335559739":240}'> </span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/can-we-really-eliminate-human-error-in-cybersecurity/" data-a2a-title="Can We Really Eliminate Human Error in Cybersecurity? "><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcan-we-really-eliminate-human-error-in-cybersecurity%2F&amp;linkname=Can%20We%20Really%20Eliminate%20Human%20Error%20in%20Cybersecurity%3F%C2%A0" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcan-we-really-eliminate-human-error-in-cybersecurity%2F&amp;linkname=Can%20We%20Really%20Eliminate%20Human%20Error%20in%20Cybersecurity%3F%C2%A0" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcan-we-really-eliminate-human-error-in-cybersecurity%2F&amp;linkname=Can%20We%20Really%20Eliminate%20Human%20Error%20in%20Cybersecurity%3F%C2%A0" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcan-we-really-eliminate-human-error-in-cybersecurity%2F&amp;linkname=Can%20We%20Really%20Eliminate%20Human%20Error%20in%20Cybersecurity%3F%C2%A0" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fcan-we-really-eliminate-human-error-in-cybersecurity%2F&amp;linkname=Can%20We%20Really%20Eliminate%20Human%20Error%20in%20Cybersecurity%3F%C2%A0" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

Inside the Salesloft Breach: A New Era of Salesforce Attacks

  • None
  • Published date: 2025-08-28 00:00:00

None

<div class="rich-text-3 w-richtext" morss_own_score="5.353535353535354" morss_score="82.54820111787855"> <figure><img decoding="async" src="https://cdn.prod.website-files.com/606d79a3190d3a764c032a2c/68b0a4458191d28a74c941b8_Salesloft%20breach%20image-1.png"></figure> <p>The spotlight has finally swung toward the integration layer, and what’s emerging should worry every SaaS security leader. </p> <p>Another Salesforce breach. But <a href="https://thehackernews.com/2025/08/salesloft-oauth-breach-via-drift-ai.html">this one</a> isn’t just another credential theft story; it’s more calculated. Attackers didn’t just gain access; they systematically exported sensitive data from hundreds of Salesforce instances. However, because the initial compromise involved <a href="https://www.grip.security/glossary/what-is-open-authorization-oauth">OAuth tokens,</a> not credentials, attackers bypassed logins, slipped past MFA, and operated undetected until the data was long gone. </p> <blockquote><p><em>“A threat actor used OAuth credentials to exfiltrate data from our customers’ Salesforce instances.” – Salesloft statement </em></p></blockquote> <p>This wasn’t an isolated incident. It’s the latest chapter in a larger campaign targeting Salesforce customers through OAuth token abuse.  These tokens, essentially the skeleton keys of SaaS identity, were used to slip past login screens, bypass <a href="https://www.grip.security/glossary/mfa">MFA</a>, and harvest data directly from Salesforce environments. No alerts. No credential stuffing. Just quiet, large-scale exfiltration. </p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div> <h2>A Different Class of Data Breach </h2> <p>Compare this to the <a href="https://www.grip.security/blog/workday-breach-joins-growing-wave-2025-hackers-playground">Workday breach</a> we recently covered. That attack leaned on social engineering. Phone calls, impersonation, phishing for contact data. The kind of breach we’ve seen before. </p> <p>But the Salesloft incident? It signals a shift. This wasn’t about tricking users, but exploiting the connection and permissions between applications. Specifically, attackers exploited the OAuth token between Salesloft and Salesforce, which was granted through a Drift chatbot integration. That token, once issued, became a master key used to quietly unlock Salesforce data across multiple tenants. No phishing required. Just a compromised integration and an exposed token. </p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="5a3f868791da60ea666db7ca-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="5a3f868791da60ea666db7ca-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div> <p>OAuth flows exist for convenience, but they’re rarely scrutinized until they’re abused. Salesloft wasn’t the end target. Salesforce was. The Salesloft-Drift integration provided the bridge. That’s the playbook now: compromise a less-guarded app, hijack its tokens, and move laterally into high-value platforms like Salesforce. </p> <blockquote><p>“The rule is simple: monitor the tokens. If Salesforce OAuth grants and scopes aren’t inventoried and watched, one overprivileged integration becomes a quiet, ongoing leak.” -Ben Robertson, Principal Identity Architect</p></blockquote> <h2>Takeaways from the Salesloft Breach </h2> <p>Most SaaS security conversations focus on the apps themselves: securing user accounts, detecting misconfigurations, enforcing MFA. But let’s not overlook the exposure often lies between the apps, hidden in integrations, permissions, and trust relationships. OAuth tokens don’t expire when employees leave. They don’t always show up in centralized logs. And they can persist for months or years, quietly granting unauthorized access to sensitive data. </p> <p>The rise of these attacks points to a blind spot. It’s not just about <a href="https://www.grip.security/glossary/shadow-saas">shadow SaaS</a> anymore. It’s about <strong>shadow integrations: </strong>the connected web of app relationships that no one is monitoring. Sales teams connect Drift to Salesforce. Marketing layers in analytics tools. Customer support installs help desk apps. One misconfigured integration, one breached app, and your Salesforce tenant becomes the exit ramp for exfiltration. </p> <h3>This Isn’t Just a Salesforce Problem </h3> <p>The tactic is spreading. Anywhere OAuth is used, and that’s virtually every modern SaaS platform, is vulnerable. Attackers know that compromising a user is hard. Compromising a token buried inside a SaaS integration? Much easier. And far less visible. </p> <p>The cloud access plane is being reshaped in real time. And while organizations scramble to plug holes and revoke tokens, the more fundamental issue remains: too many integrations, too little oversight, and far too much implicit trust. </p> <h2>Preventing a Similar Breach in Your Organization </h2> <p>It’s time to expand the SaaS security conversation beyond user-to-app relationships and include app-to-app trust chains. That means: </p> <ul> <li><strong>Inventorying all OAuth-based integrations, </strong>even the obscure ones. </li> </ul> <ul> <li><strong>Revoking unused tokens</strong> and regularly rotating active ones. </li> </ul> <ul> <li><strong>Monitoring token usage patterns</strong>, especially for lateral access into sensitive platforms like Salesforce. </li> </ul> <ul> <li><strong>Applying least privilege principles</strong> to apps, not just users. </li> </ul> <p>Without visibility into these trust chains, attackers can—and will—move silently between apps. The Salesloft breach is proof. </p> <h2>How Grip Helps </h2> <p><a href="https://www.grip.security/">Grip</a> automatically discovers every SaaS integration, including misconfigured connections and <a href="https://www.grip.security/use-case-library/discover-and-manage-risky-oauth-scopes">risky OAuth scopes</a>, and continuously monitors token use across environments. If an integration is compromised or misused, Grip detects suspicious activity, flags risky tokens, and enables one-click remediation. This level of control is what stops an OAuth breach from becoming a data exfiltration event. </p> <h2>Don’t Wait for the Next OAuth Breach </h2> <p>We’re past the era of simple phishing attacks. Today’s adversaries understand SaaS identity gaps and OAuth permissions better than most defenders. They’re bypassing endpoints, moving laterally through integrations, and exploiting trust relationships organizations don’t even know exist. And if you’re not watching that path, you won’t see the breach coming. </p> <p><a href="https://www.grip.security/demo?utm_source=web&amp;utm_medium=blog&amp;utm_campaign=content">Book time with our team</a> to learn how Grip gives you visibility into your hidden OAuth risks and stops integration-driven data breaches before they happen. </p> <p>‍</p> <h3>Related Content</h3> <p><a href="https://www.grip.security/blog/workday-breach-joins-growing-wave-2025-hackers-playground">Workday Breach Joins a Growing Wave: Why the Second Half of 2025 is a Hacker’s Playground</a></p> <p><a href="https://www.grip.security/blog/fake-salesforce-app-breached-google">How a Fake Salesforce App Breached Google and 30+ Global Brands</a></p> <p><a href="https://www.grip.security/getting-started-itdr-practical-guide?utm_source=web&amp;utm_medium=blog&amp;utm_campaign=content">Strengthening your defenses with ITDR</a></p> <figure><a href="https://www.grip.security/getting-started-itdr-practical-guide?utm_source=web&amp;utm_medium=blog&amp;utm_campaign=content"><img decoding="async" src="https://cdn.prod.website-files.com/606d79a3190d3a764c032a2c/6881115c79d011e5a47bc27b_GettingStartedITDR.png"></a></figure> <p>‍</p> <p>‍</p> </div><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/inside-the-salesloft-breach-a-new-era-of-salesforce-attacks/" data-a2a-title="Inside the Salesloft Breach: A New Era of Salesforce Attacks"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Finside-the-salesloft-breach-a-new-era-of-salesforce-attacks%2F&amp;linkname=Inside%20the%20Salesloft%20Breach%3A%20A%20New%20Era%20of%20Salesforce%20Attacks" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Finside-the-salesloft-breach-a-new-era-of-salesforce-attacks%2F&amp;linkname=Inside%20the%20Salesloft%20Breach%3A%20A%20New%20Era%20of%20Salesforce%20Attacks" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Finside-the-salesloft-breach-a-new-era-of-salesforce-attacks%2F&amp;linkname=Inside%20the%20Salesloft%20Breach%3A%20A%20New%20Era%20of%20Salesforce%20Attacks" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Finside-the-salesloft-breach-a-new-era-of-salesforce-attacks%2F&amp;linkname=Inside%20the%20Salesloft%20Breach%3A%20A%20New%20Era%20of%20Salesforce%20Attacks" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Finside-the-salesloft-breach-a-new-era-of-salesforce-attacks%2F&amp;linkname=Inside%20the%20Salesloft%20Breach%3A%20A%20New%20Era%20of%20Salesforce%20Attacks" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.grip.security">Grip Security Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Grip Security Blog">Grip Security Blog</a>. Read the original post at: <a href="https://www.grip.security/blog/salesloft-breach-oauth-salesforce-attacks">https://www.grip.security/blog/salesloft-breach-oauth-salesforce-attacks</a> </p>

The CBUAE’s SMS and OTP Ban is a Golden Opportunity

  • None
  • Published date: 2025-08-28 00:00:00

None

<p>The Central Bank of the UAE has drawn a line in the sand. <a href="https://www.bankinfosecurity.com/uae-central-bank-tells-fis-to-drop-sms-otp-authentication-a-28589">By March 2026, the era of the SMS and One-Time Passwords will be over for the nation’s financial institutions.</a></p><p>This is not a minor policy tweak. <span style="font-weight: bold;">It’s a seismic shift.</span></p><p>For years, the SMS/OTP has been the default security blanket for digital banking. A familiar, but flawed, solution. But the CBUAE’s directive acknowledges a harsh reality: in the face of sophisticated phishing, SIM-swapping, and social engineering attacks, this legacy method has become a critical liability. It creates unacceptable financial and reputational risk.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p>For the C-suite in the UAE’s banking sector, it’s easy to view this as another compliance burden. Another costly, complex project to manage. But that’s a limited view. The leaders who will win the next decade of digital banking will see this mandate for what it truly is: a strategic inflection point. This is your opportunity to leapfrog the competition by building a digital experience that is not only radically more secure, but also profoundly simpler for your customers.</p><h2>Phishing-Resistant Passkeys: The Secure Alternative to SMS OTP</h2><p>The CBUAE recommends a move toward robust, risk-based authentication. The golden standard that unequivocally answers this call is <span style="font-weight: bold;">passkeys</span>.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="7fdedf2d1125ee782007f3a3-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="7fdedf2d1125ee782007f3a3-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p>Passkeys are not just an incremental improvement. They represent a fundamental change in authentication technology, offering a rare combination of superior security and a user experience that is genuinely effortless. Built on FIDO standards, passkeys replace passwords and OTPs entirely. They use the biometrics already built into your customers’ devices, like Face ID or a fingerprint, to create a login experience that is fast, familiar, and frictionless.</p><p>So, why are passkeys the definitive solution to the CBUAE mandate?</p><ul> <li><strong>They are Inherently Phishing-Resistant.</strong> A passkey is cryptographically bound to your bank’s specific website or app. There is no password to steal, no code to intercept. The primary attack vector for financial fraud is neutralized at its source, directly protecting your customers and your firm’s bottom line.</li> <li><strong>They Create a World-Class Customer Experience.</strong> No more waiting for delayed SMS messages. No more frustrated calls to the help desk. A frictionless, biometric login increases digital channel adoption, boosts customer satisfaction, and builds loyalty in a fiercely competitive market.</li> <li><strong>They Lower Your Operational Costs.</strong> The business case is undeniable. You can immediately eradicate the significant and rising costs of SMS delivery. More importantly, passwordless authentication slashes password-related help desk inquiries, lowering your total cost of ownership (TCO) and freeing up valuable IT resources to focus on innovation, not resets.</li> </ul><h2>From Onboarding to Transactions: A CIAM Approach to Customer Identity</h2><p>True digital leadership isn’t just about a secure login. It’s about securing the entire customer relationship. This is where HYPR’s Customer Identity and Access Management (CIAM) solution extends the power of passkeys across the entire user journey.</p><p>Our unified framework allows you to:</p><ul> <li><strong>Onboard Customers with Trust:</strong> Securely register new customers and establish confidence from the very first interaction, accelerating their transition into high-value digital clients.</li> <li><strong>Deliver Effortless Authentication: </strong>Provide a consistent, best-in-class login experience across all your digital properties, reinforcing your brand’s commitment to innovation and security.</li> <li><strong>Protect High-Value Transactions:</strong> Implement seamless, biometric step-up authentication for sensitive actions, preventing fraud without adding frustrating friction for your legitimate customers.</li> </ul><h2>The HYPR Advantage: Proven Results and Accelerated Time-to-Market</h2><p>Navigating this transition requires more than just new technology; it requires a proven, globally-deployed partner.</p><p>HYPR is not a startup testing a new theory. We are the trusted identity partner to the world’s most demanding financial institutions, including two of the four largest US banks. Our FIDO-certified solutions are architected for the scale, reliability, and security your institution demands. And with our flexible SDKs and APIs, we enable rapid integration with your existing infrastructure, ensuring you lead the market in this transition, not follow it.</p><h2>Conclusion</h2><p>The CBUAE’s SMS OTP ban is far more than a compliance requirement — it’s a turning point for the UAE’s financial sector. Institutions that treat it as a checkbox exercise will fall behind, while those that embrace phishing-resistant passkeys will gain a lasting competitive edge.</p><p>Now is the time to act. With the March 2026 deadline fast approaching, early movers will be the ones to set the standard for secure, passwordless digital banking in the region.<span style="color: #0600ff; font-weight: bold;"><br></span></p><h2>Related Resources</h2><ul> <li><a href="https://www.hypr.com/resources/webinar-helpdesk-social-engineering?utm_source=chatgpt.com">Preventing Social Engineering Attacks on the Helpdesk</a></li> <li><a href="https://blog.hypr.com/best-practices-for-identity-proofing-in-the-workplace?utm_source=chatgpt.com">Best Practices for Identity Proofing in the Workplace</a></li> <li><a href="https://blog.hypr.com/nist-sp-800-63-3-digital-identity-guidelines-review">NIST SP 800-63-3 Review: Digital Identity Guidelines Overview</a></li> <li><a href="https://get.hypr.com/passwordless-mfa-security-evaluation-guide?utm_source=chatgpt.com">Passwordless MFA Security Evaluation Guide</a></li> </ul><p><a class="cta_button" href="https://www.hypr.com/cs/ci/?pg=9b50cee6-bc8a-4f21-93f5-b04103b27804&amp;pid=2670073&amp;ecid=&amp;hseid=&amp;hsic="><img fetchpriority="high" decoding="async" class="hs-cta-img " style="border-width: 0px; /*hs-extra-styles*/; " alt="New call-to-action" height="229" width="1598" src="https://no-cache.hubspot.com/cta/default/2670073/9b50cee6-bc8a-4f21-93f5-b04103b27804.png"></a></p><p><img decoding="async" src="https://track.hubspot.com/__ptq.gif?a=2670073&amp;k=14&amp;r=https%3A%2F%2Fblog.hypr.com%2Fthe-cbuaes-sms-and-otp-ban-is-a-golden-opportunity&amp;bu=https%253A%252F%252Fblog.hypr.com&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/the-cbuaes-sms-and-otp-ban-is-a-golden-opportunity/" data-a2a-title="The CBUAE’s SMS and OTP Ban is a Golden Opportunity"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fthe-cbuaes-sms-and-otp-ban-is-a-golden-opportunity%2F&amp;linkname=The%20CBUAE%E2%80%99s%20SMS%20and%20OTP%20Ban%20is%20a%20Golden%20Opportunity" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fthe-cbuaes-sms-and-otp-ban-is-a-golden-opportunity%2F&amp;linkname=The%20CBUAE%E2%80%99s%20SMS%20and%20OTP%20Ban%20is%20a%20Golden%20Opportunity" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fthe-cbuaes-sms-and-otp-ban-is-a-golden-opportunity%2F&amp;linkname=The%20CBUAE%E2%80%99s%20SMS%20and%20OTP%20Ban%20is%20a%20Golden%20Opportunity" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fthe-cbuaes-sms-and-otp-ban-is-a-golden-opportunity%2F&amp;linkname=The%20CBUAE%E2%80%99s%20SMS%20and%20OTP%20Ban%20is%20a%20Golden%20Opportunity" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fthe-cbuaes-sms-and-otp-ban-is-a-golden-opportunity%2F&amp;linkname=The%20CBUAE%E2%80%99s%20SMS%20and%20OTP%20Ban%20is%20a%20Golden%20Opportunity" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://blog.hypr.com">HYPR Blog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Joshua Gonzales">Joshua Gonzales</a>. Read the original post at: <a href="https://blog.hypr.com/the-cbuaes-sms-and-otp-ban-is-a-golden-opportunity">https://blog.hypr.com/the-cbuaes-sms-and-otp-ban-is-a-golden-opportunity</a> </p>

NSA, FBI, Others Say Chinese Tech Firms are Aiding Salt Typhoon Attacks

  • Jeffrey Burt
  • Published date: 2025-08-28 00:00:00

None

<p>Intelligence agencies in the United States and more than a dozen other countries are putting a focus on three Chinese companies they say are supporting the state-sponsored threat group Salt Typhoon’s hacking and cyber-espionage attacks around the world.</p><p>In a <a href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF" target="_blank" rel="noopener">joint report</a> that also details the advanced persistent threat (APT) group’s methods and tactics, the agencies this week wrote that Sichuan Juxinhe Network Technology Co., Beijing Huanyu Tianqiong Information Technology Co., and Sichuan Zhixin Ruijie Network Technology Co. are supplying products and services to intelligence services China – including various units in the People’s Liberation Army and Ministry of State Security – that are used in the Salt Typhoon operations, which have been running since 2021.</p><p>“The data stolen through this activity against foreign telecommunications and Internet service providers (ISPs), as well as intrusions in the lodging and transportation sectors, ultimately can provide Chinese intelligence services with the capability to identify and track their targets’ communications and movements around the world,” the agencies wrote in the report.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p>The agencies include the U.S. National Security Agency, CISA, FBI, and Department of Defense Cyber Crime Center, and counterparts from the UK, Canada, Australia, New Zealand, Italy, Germany, Finland, Czech Republic, Japan, the Netherlands, Spain, and Poland.</p><h3>A Focus on Private Companies</h3><p>The naming of the three companies follows similar efforts by U.S. intelligence agencies to highlight the connections between Chinese intelligence agencies, state-sponsored threat groups, and commercial entities in the country.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="3254bae115ec542c32170269-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="3254bae115ec542c32170269-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p>In March, the U.S. Justice Department (DOJ) indicted 12 Chinese nationals for <a href="https://securityboulevard.com/2025/03/indictments-of-chinese-cyber-spies-reveal-hacker-for-hire-operation/" target="_blank" rel="noopener">hacking into computer systems</a> of a range of individuals and organizations in the United States and elsewhere, with prosecutors saying the charges revealed an extensive and long-standing use of private companies and freelance threat actors in <a href="https://www.justice.gov/usao-sdny/pr/10-chinese-nationals-charged-large-scale-hacking-us-and-international-victims-behalf" target="_blank" rel="noopener">hacker-for-hire operations</a>.</p><p>In this latest report, “the three China-based technology companies <a href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign" target="_blank" rel="noopener">provide cyber-related services</a> to the Chinese intelligence services and are part of a wider commercial ecosystem in China, which includes information security companies, data brokers and hackers for hire,” the UK’s National Cyber Security Centre <a href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign" target="_blank" rel="noopener">wrote</a>.</p><p>John Hultquist, chief analyst with the Google Threat Intelligence Group, in an email statement described an “ecosystem of contractors, academics, and other facilitators … at the heart of Chinese cyber espionage. Contractors are used to build tools and valuable exploits as well as carry out the dirty work of intrusion operations. They have been instrumental in the rapid evolution of these operations and growing them to an unprecedented scale.”</p><h3>Attacking the Telecoms</h3><p>Salt Typhoon is best known for its widespread attacks <a href="https://securityboulevard.com/2024/09/china-backed-salt-typhoon-targets-u-s-internet-providers-report/" target="_blank" rel="noopener">compromising the broadband networks</a> of U.S. telecoms as Verizon, AT&amp;T, T-Mobile, and others to attain persistence and steal data. However, the ATP group has attacked organizations in such areas as critical infrastructure in the United States and around the globe, with Hultquist saying that “reported targeting of hospitality and transportation by this actor could be used to closely surveil individuals. Information from these sectors can be used to develop a full picture of who someone is talking to, where they are, and where they are going.”</p><p>He also said that while there are many Chinese-sponsored espionage groups targeting the telecom sector, Salt Typhoon’s “familiarity with telecommunications systems gives them a unique advantage, especially when it comes to evading detection. Many of the highly successful Chinese cyber espionage actors we encounter have deep expertise in the technologies used by their targets, giving them an upper hand.”</p><h3>Exploiting CVEs for Initial Access</h3><p>According to the report this week, the Salt Typhoon actors are exploiting known common vulnerabilities and patched security flaws in compromised infrastructure, in particular <a href="https://nvd.nist.gov/vuln/detail/cve-2024-21887" target="_blank" rel="noopener">CVE-2024-21887</a> (Ivanti Connect Secure and Policy Secure command injection flaw), <a href="https://nvd.nist.gov/vuln/detail/cve-2024-3400">CVE-2024-3400</a> (Palo Alto Networks’ PAN-OS GlobalProtect remote code execution, or RCE), <a href="https://nvd.nist.gov/vuln/detail/cve-2023-20273" target="_blank" rel="noopener">CVE-2023-20273</a> (Cisco IOS XE software command injection and privilege escalation), <a href="https://nvd.nist.gov/vuln/detail/cve-2023-20198" target="_blank" rel="noopener">CVE-2023-20198</a> (Cisco IOS XE authentication bypass), and <a href="https://nvd.nist.gov/vuln/detail/cve-2018-0171" target="_blank" rel="noopener">CVE-2018-0171</a> (Cisco IOS and IOS XE smart install RCE).</p><p>“To maintain persistent access to target networks, the APT actors use a variety of techniques,” the intelligence agencies wrote. “Notably, a number of these techniques can obfuscate the actors’ source IP address in system logs, as their actions may be recorded as originating from local IP addresses.”</p><p>Once in the devices, Salt Typhoon then targets authentication protocols and infrastructure to enable lateral movement through network devices, with the report noting that “capturing network traffic containing credentials via compromised routers is a common method for further enabling lateral movement.”</p><h3>Persistence is Key</h3><p>The threat group’s malicious activity is aimed at establishing persistent and long-term access to networks, with the APT actors maintaining more than one method of access. The agencies said critical infrastructure operators should run red-teaming operations and incident responses, and encouraged defenders to define and understand the full extent of the threat group’s access to networks, and then to remove them simultaneously.</p><p>“Partial response actions may alert the actors to an ongoing investigation and jeopardize the ability to conduct full eviction,” the agencies wrote. “Incident response on one network may also result in the APT actors taking measures to conceal and maintain their access on additional compromised networks, and potentially disrupt broader investigative and operational frameworks already in progress.”</p><p>They also encouraged defenders to monitor configuration changes, virtualized containers, network services and tunnels, firmware and software integrity, and logs.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/nsa-fbi-others-say-chinese-tech-firms-are-aiding-salt-typhoon-attacks/" data-a2a-title="NSA, FBI, Others Say Chinese Tech Firms are Aiding Salt Typhoon Attacks"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnsa-fbi-others-say-chinese-tech-firms-are-aiding-salt-typhoon-attacks%2F&amp;linkname=NSA%2C%20FBI%2C%20Others%20Say%20Chinese%20Tech%20Firms%20are%20Aiding%20Salt%20Typhoon%20Attacks" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnsa-fbi-others-say-chinese-tech-firms-are-aiding-salt-typhoon-attacks%2F&amp;linkname=NSA%2C%20FBI%2C%20Others%20Say%20Chinese%20Tech%20Firms%20are%20Aiding%20Salt%20Typhoon%20Attacks" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnsa-fbi-others-say-chinese-tech-firms-are-aiding-salt-typhoon-attacks%2F&amp;linkname=NSA%2C%20FBI%2C%20Others%20Say%20Chinese%20Tech%20Firms%20are%20Aiding%20Salt%20Typhoon%20Attacks" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnsa-fbi-others-say-chinese-tech-firms-are-aiding-salt-typhoon-attacks%2F&amp;linkname=NSA%2C%20FBI%2C%20Others%20Say%20Chinese%20Tech%20Firms%20are%20Aiding%20Salt%20Typhoon%20Attacks" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnsa-fbi-others-say-chinese-tech-firms-are-aiding-salt-typhoon-attacks%2F&amp;linkname=NSA%2C%20FBI%2C%20Others%20Say%20Chinese%20Tech%20Firms%20are%20Aiding%20Salt%20Typhoon%20Attacks" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>

News alert: Halo Security’s custom dashboards give security teams control while streamlining workflows

  • None
  • Published date: 2025-08-28 00:00:00

None

<div class="entry" morss_own_score="5.684698608964451" morss_score="54.227186950070376"> <img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/uploads/SH_FYI_logo-sepia-1850px-960x462.jpg"> <p>Miami, Aug. 28, 2025, CyberNewswire<strong> — </strong><a href="https://www.halosecurity.com/?utm_campaign=soc2type1&amp;utm_source=cybernewswire&amp;utm_medium=referral">Halo Security</a>, a leading provider of external risk management solutions, today announced significant platform enhancements designed to give security teams greater flexibility and control within the platform.</p> <p><a href="https://www.lastwatchdog.com/wp/wp-content/uploads/Halo-Security-logo.png"><img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/uploads/Halo-Security-logo.png"></a>The new features include custom dashboards, configurable reports, and improved automation capabilities that give organizations better control over how they visualize and manage their exposure data.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div> <div><a href="https://www.lastwatchdog.com/wp/wp-content/uploads/Lisa-Dowling-hdsht.jpg"><img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/uploads/Lisa-Dowling-hdsht-100x114.jpg"></a> Dowling</div> <p>“No two organizations are the same, and different team members face different challenges,” said Lisa Dowling, CEO of Halo Security. “A vulnerability analyst needs different insights than a compliance manager, and a CISO requires different views than a security specialist. These updates give every team member the ability to create personalized dashboards and reports that make them more effective at protecting their organizations.”</p> <p><strong>Key platform enhancements</strong></p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="c6637805fcea70609d4b11d6-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="c6637805fcea70609d4b11d6-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div> <p><strong>•Custom dashboards with drag-and-drop functionality: </strong>Security professionals can now build personalized dashboards using more than a dozen customizable widgets, including risk score trends, critical findings tables, asset distribution charts, and compliance status monitors. The intuitive drag-and-drop interface allows users to create role-specific views while maintaining the ability to share dashboards across teams and apply global filtering across all custom views.</p> <p><strong>•Configurable reports for enhanced asset management: </strong>The platform now features fully customizable data tables that allow users to select which columns display in their target lists, create multiple saved views for different scenarios, and resize columns to optimize their workflow. Pre-configured views include summary, scan schedule, tag management, and technical details options.</p> <p><strong><a href="https://www.lastwatchdog.com/wp/wp-content/uploads/Halo-Security-graphic.png"><img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/uploads/Halo-Security-graphic-520x308.png"></a>•Improved auto-tagging with granular control: </strong>The Halo Security platform now provides more precise control over asset organization. Automations now offer three distinct tagging modes, allowing users to sync, add, or remove tags based on the defined rules. The improved automation system offers better performance and predictability to ensure consistent asset categorization.</p> <p><strong>Industry impact</strong></p> <p>The cybersecurity industry continues to grapple with tool sprawl and workflow inefficiencies that can slow response times to critical security incidents. Security teams often struggle with managing multiple tools and platforms, creating challenges in data correlation and workflow management.</p> <div><a href="https://www.lastwatchdog.com/wp/wp-content/uploads/Nick-Merritt-hdsht.jpg"><img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/uploads/Nick-Merritt-hdsht-100x120.jpg"></a> Merritt</div> <p>“Security teams shouldn’t have to fight their tools to get the information they need,” said Nick Merritt, VP of Security at Halo Security. “These customization features let our customers organize their data the way they think about it and take control of how they interact with the security data we collect.”</p> <p><strong>Availability</strong></p> <p>The new customization features are immediately available to all Halo Security customers at no additional cost. Organizations using the platform can access custom dashboard creation through their existing accounts, with shared configurations automatically synchronized across team members.</p> <p>New users interested in trying the Halo Security platform can sign up for a 7-day free trial at <a href="https://www.halosecurity.com/">halosecurity.com</a>.</p> <p><strong><em>About Halo Security: </em></strong><em><a href="https://www.halosecurity.com/?utm_campaign=soc2type1&amp;utm_source=cybernewswire&amp;utm_medium=referral"><strong>Halo Security</strong></a> is a comprehensive external attack surface management platform that provides asset discovery, risk assessment, and penetration testing in a single, easy-to-use dashboard. Founded by cybersecurity experts with backgrounds at McAfee, Intel, Kenna Security, OneLogin, and WhiteHat Security, Halo Security delivers a unique attacker-based approach to help organizations safeguard against potential threats. Users can learn more at <a href="https://www.halosecurity.com/?utm_campaign=soc2type1&amp;utm_source=cybernewswire&amp;utm_medium=referral"><strong>halosecurity.com</strong></a>.</em></p> <p><strong><em>Media contact: </em></strong><em>Nick Hemenway, VP of Marketing, Halo Security, <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="402e29232b0028212c2f33252335322934396e232f2d">[email protected]</a></em></p> <p><strong><em>Editor’s note:</em></strong><em> This press release was provided by </em><a href="https://cybernewswire.com/">CyberNewswire</a><em> as part of its press release syndication service. The views and claims expressed belong to the issuing organization.</em></p> <p> <a href="https://www.facebook.com/sharer.php?u=https://www.lastwatchdog.com/news-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows/"><img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/plugins/simple-share-buttons-adder/buttons/somacro/facebook.png" title="Facebook"></a><a href="https://plus.google.com/share?url=https://www.lastwatchdog.com/news-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows/"><img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/plugins/simple-share-buttons-adder/buttons/somacro/google.png" title="Google+"></a><a href="/cdn-cgi/l/email-protection#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"><img decoding="async" src="https://www.lastwatchdog.com/wp/wp-content/plugins/simple-share-buttons-adder/buttons/somacro/email.png" title="Email"></a></p> <p>August 28th, 2025 <span> | <a href="https://www.lastwatchdog.com/category/news-alerts/">News Alerts</a> | <a href="https://www.lastwatchdog.com/category/top-stories/">Top Stories</a></span></p> <p> </p></div><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/news-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows/" data-a2a-title="News alert: Halo Security’s custom dashboards give security teams control while streamlining workflows"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnews-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows%2F&amp;linkname=News%20alert%3A%20Halo%20Security%E2%80%99s%20custom%20dashboards%20give%20security%20teams%20control%20while%20streamlining%20workflows" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnews-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows%2F&amp;linkname=News%20alert%3A%20Halo%20Security%E2%80%99s%20custom%20dashboards%20give%20security%20teams%20control%20while%20streamlining%20workflows" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnews-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows%2F&amp;linkname=News%20alert%3A%20Halo%20Security%E2%80%99s%20custom%20dashboards%20give%20security%20teams%20control%20while%20streamlining%20workflows" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnews-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows%2F&amp;linkname=News%20alert%3A%20Halo%20Security%E2%80%99s%20custom%20dashboards%20give%20security%20teams%20control%20while%20streamlining%20workflows" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fnews-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows%2F&amp;linkname=News%20alert%3A%20Halo%20Security%E2%80%99s%20custom%20dashboards%20give%20security%20teams%20control%20while%20streamlining%20workflows" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.lastwatchdog.com">The Last Watchdog</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by cybernewswire">cybernewswire</a>. Read the original post at: <a href="https://www.lastwatchdog.com/news-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows/">https://www.lastwatchdog.com/news-alert-halo-securitys-custom-dashboards-give-security-teams-control-while-streamlining-workflows/</a> </p>

Beyond the Firewall: Rethinking Enterprise Security for the API-First Era

  • None
  • Published date: 2025-08-28 00:00:00

None

<h1>Beyond the Firewall: Rethinking Enterprise Security for the API-First Era</h1><h2>The Shifting Landscape: Why Traditional Security Fails the API Economy</h2><p>Alright, so you're thinking about APIs and security, right? It's not your grandpa's internet anymore, that's for sure. Remember when security was <em>just</em> about keeping the bad guys out of your network? Yeah, those days are long gone.</p><p>APIs are everywhere, powering everything from your banking app to that fancy supply chain management system. But here's the thing: every api is another potential doorway for attackers. It's like adding a bunch of extra entrances to your building – you need to secure each one.</p><ul> <li> <p>APIs are definitely driving innovation faster than ever before, but, uh, it's also expanding the attack surface dramatically. Think about it: every new api endpoint is a potential vulnerability waiting to be exploited.</p> </li> <li> <p>Legacy security setups? They were built around the idea of a fortified network perimeter. Firewalls and intrusion detection systems were the main line of defense. But apis often bypass this perimeter, leaving them dangerously exposed.</p> </li> <li> <p>And speaking of vulnerabilities, apis have their own unique set of problems. We're talking about things like <strong>injection attacks</strong>, where malicious code is inserted into api requests, and <strong>broken authentication</strong>, where attackers can bypass security measures and gain unauthorized access.</p> </li> <li> <p>Firewalls and intrusion detection systems? They offer <em>limited</em> protection for apis. They're designed to inspect network traffic, but they often can't understand the specific logic and data flows of apis.</p> </li> <li> <p>Visibility is a huge issue. Legacy systems often lack insight into api traffic. It's hard to know what's going on when you can't see what's happening.</p> </li> <li> <p>Enforcing <strong>granular access control policies</strong> is a nightmare. You need to be able to control who can access what apis and what data they can access. Traditional systems often lack the fine-grained controls needed to do this effectively.</p> </li> <li> <p>Distinguishing between legit traffic and malicious attacks? That's another challenge. Attackers can disguise their malicious activity as normal api requests, making it difficult to detect and prevent breaches.</p> </li> <li> <p>Think about the financial industry. A breach of a payment api could expose sensitive customer data, leading to fraud and financial losses. According to <a href="https://www.ibm.com/security/data-breach" title="IBM Security">IBM</a> the average cost of a data breach in 2024 was $4.88 million.</p> </li> <li> <p>In healthcare, a breach of an api that accesses patient records could violate hipaa regulations and lead to hefty fines.</p> </li> <li> <p>And in retail, a breach of an e-commerce api could compromise customer credit card information, leading to a loss of trust and sales.</p> </li> </ul><p>The bottom line? We need a more robust approach to api security. Something that's designed specifically for the challenges of the api economy. And that's exactly what we'll be diving into next.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><h2>Building a Modern Security Fortress: Key Strategies for API Protection</h2><p>Alright, time to really lock down those apis. It's not enough to just <em>think</em> you're secure, you gotta <em>be</em> secure, ya know? So how do we build this modern security fortress?</p><p>First thing's first: security can't be an afterthought. It needs to be baked in from the very beginning, like adding yeast to bread. This is what they mean by "shifting left" – moving security earlier in the api development lifecycle.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="c932f64cf7afba61a1b7f337-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="c932f64cf7afba61a1b7f337-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><ul> <li>Think about it this way: you want to catch vulnerabilities <em>before</em> they make it into production. That means integrating security testing into your <strong>ci/cd pipeline</strong>. Automate those security checks!</li> <li>Run static analysis tools to scan your code for potential vulnerabilities – it's like giving your code a health checkup. Then, use dynamic analysis to test your apis in a runtime environment. This is where you see how they <em>really</em> behave under pressure.</li> <li>And don't forget about secure coding guidelines. Establish best practices <em>and make sure</em> your developers know them inside and out. It's not enough to just write code, you gotta write <em>secure</em> code.</li> </ul><p>Next up, authentication and authorization. This is all about verifying who's trying to access your apis and what they're allowed to do. think of it like a nightclub bouncer and a vip list – but way more sophisticated.</p><ul> <li>Implement strong authentication mechanisms. OAuth 2.0 and oidc are your friends here. They're industry standards for a reason.</li> <li>Enforce <strong>granular authorization policies</strong>. Control who can access which apis and what data they can access. Role-based access control (rbac) is a great way to do this.</li> <li>And speaking of security, mfa is a must. It's like adding an extra lock to your door. And hey, maybe think about passwordless authentication. Passkeys and biometrics are becoming more popular for good reason.</li> <li>sso is your secret weapon for centralized user management. It makes it easier to control access and improves your overall security. Plus, it makes life easier for your users.</li> </ul><p>api gateways are like the gatekeepers of your api kingdom. They control access, manage traffic, and enforce security policies. And wafs? They're like the bodyguards, protecting against common web attacks.</p><ul> <li>api gateways can do all sorts of cool stuff. They can handle authentication, authorization, rate limiting, and traffic management. They're like the swiss army knife of api security.</li> <li>wafs protect against common web attacks like sql injection, cross-site scripting (xss), and cross-site request forgery (csrf). They're like a shield against the dark arts of the web.</li> <li>Make sure you're setting up rate limiting and threat detection rules. This helps prevent abuse and keeps your apis running smoothly. And don't forget to regularly update your waf rules to address new vulnerabilities.</li> </ul><pre><code class="language-mermaid">graph LR A[Client Application] --&gt; B(API Gateway) B --&gt; C{Authentication and Authorization} C -- Yes --&gt; D(WAF) D --&gt; E{Rate Limiting and Threat Detection} E -- Pass --&gt; F[Backend API] E -- Block --&gt; G[Blocked Request] </code></pre><p>So, yeah; that's how you build a modern security fortress for your apis. But, it's not a "set it and forget it" kinda thing – you have to stay vigilant and keep learning. Which brings us to…</p><h2>Cultivating a DevSecOps Culture: Security as Everyone's Responsibility</h2><p>Okay, so, you've built this awesome security fortress, right? But get this – it's gotta be a team sport, not just a solo mission for the security folks. Seriously, that's where a <strong>DevSecOps culture</strong> comes into play, and it's crucial for keeping those apis safe.</p><ul> <li>Think of security as everyone's job, not just the "security team". Developers, operations, <em>everyone</em> needs to be thinking about security from the start, ya know?</li> <li>Training is super important. Make sure everyone understands api security risks and how to avoid 'em. Like, seriously, phising simulations? Do it!</li> <li>Automation is your friend. Automate those security tasks so you're not manually doing everything. ain't nobody got time for that.</li> </ul><p>So, how do you actually <em>do</em> this stuff?</p><p>Well, foster open communication between teams. Devs need to talk to security, and security needs to talk to ops. Regular meetings, shared documentation, the whole nine yards.</p><p>Also, keep an eye on team management and culture. The security <a href="https://www.northdoor.co.uk/insight/news/it-skills-gap-may-impact-the-cyber-security-sector/">skills gap</a> is a well-documented issue. as noted by northdoor, so make sure y'all are encouraging open communication and prioritizing tasks to prevent burnout.</p><p>Ultimately, it's all about building a culture where security is <em>baked in</em>, not bolted on.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/beyond-the-firewall-rethinking-enterprise-security-for-the-api-first-era/" data-a2a-title="Beyond the Firewall: Rethinking Enterprise Security for the API-First Era"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fbeyond-the-firewall-rethinking-enterprise-security-for-the-api-first-era%2F&amp;linkname=Beyond%20the%20Firewall%3A%20Rethinking%20Enterprise%20Security%20for%20the%20API-First%20Era" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fbeyond-the-firewall-rethinking-enterprise-security-for-the-api-first-era%2F&amp;linkname=Beyond%20the%20Firewall%3A%20Rethinking%20Enterprise%20Security%20for%20the%20API-First%20Era" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fbeyond-the-firewall-rethinking-enterprise-security-for-the-api-first-era%2F&amp;linkname=Beyond%20the%20Firewall%3A%20Rethinking%20Enterprise%20Security%20for%20the%20API-First%20Era" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fbeyond-the-firewall-rethinking-enterprise-security-for-the-api-first-era%2F&amp;linkname=Beyond%20the%20Firewall%3A%20Rethinking%20Enterprise%20Security%20for%20the%20API-First%20Era" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fbeyond-the-firewall-rethinking-enterprise-security-for-the-api-first-era%2F&amp;linkname=Beyond%20the%20Firewall%3A%20Rethinking%20Enterprise%20Security%20for%20the%20API-First%20Era" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://ssojet.com/blog">SSOJet - Enterprise SSO &amp;amp; Identity Solutions</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by SSOJet - Enterprise SSO &amp; Identity Solutions">SSOJet - Enterprise SSO &amp; Identity Solutions</a>. Read the original post at: <a href="https://ssojet.com/blog/rethinking-enterprise-security-api-first-era">https://ssojet.com/blog/rethinking-enterprise-security-api-first-era</a> </p>

What to expect during the DigiCert World Quantum Readiness Day event on Sept. 10

  • Ryan Stevens
  • Published date: 2025-08-27 17:00:23

Quantum computing is no longer a far-off possibility — it’s a fast-approaching reality that threatens the very foundations of digital security. Encryption once considered unbreakable could soon be obsolete, forcing organizations to rethink how they safeguard …

Quantum computing is no longer a far-off possibility its a fast-approaching reality that threatens the very foundations of digital security. Encryption once considered unbreakable could soon be obsol… [+5055 chars]

The 19th’s first-ever strategic plan is an attempt to “play it safe” in a precarious media age

  • Hanaa' Tameez
  • Published date: 2025-08-27 16:41:34

When Amanda Zamora and Emily Ramshaw launched The 19th — with $8.5 million to start — in August 2020, they kicked off with a budget that most news outlets can only dream of. Five years and $100 million raised later, The 19th’s next chapter is focused on subst…

When Amanda Zamora and Emily Ramshaw launched The 19th with $8.5 million to start in August 2020, they kicked off with a budget that most news outlets can only dream of. Five years and $100 million r… [+8550 chars]

I automate my Windows PC maintenance with Task Scheduler, here's how

  • Dhruv Bhutani
  • Published date: 2025-08-27 12:00:19

Learn how to use Windows Task Scheduler to automate essential PC maintenance tasks, saving time and ensuring your computer runs smoothly. Easy setup for beginners.

I'll say it out loud. Much as I love the functionality that Windows offers, I've never been the greatest fan of the operating system because of the sheer amount of maintenance it requires to keep run… [+4727 chars]

Germany to streamline security policy decisions with new National Security Council

  • Jeremias Lin
  • Published date: 2025-08-27 10:52:08

“The time when we first had to call all the ministries to get a picture of a crisis is over"

German Chancellor Friedrich Merz and Defence Minister Boris Pistorius announced the formation of Germanys new National Security Council (NSC) on Wednesday, streamlining high-level consultations on de… [+2911 chars]

Security Bite: Viral TikToks promote ‘undetectable’ Find My-enabled GPS trackers for stalking

  • Arin Waichulis
  • Published date: 2025-08-27 01:29:05

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specifi…

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform.Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to mana… [+4772 chars]

We Are Still Unable to Secure LLMs from Malicious Inputs

  • None
  • Published date: 2025-08-27 00:00:00

None

<p>Nice <a href="https://www.wired.com/story/poisoned-document-could-leak-secret-data-chatgpt/">indirect prompt injection attack</a>:</p><blockquote> <p>Bargury’s attack starts with a poisoned document, which is <a href="https://support.google.com/drive/answer/2375057?hl=en-GB&amp;co=GENIE.Platform%3DDesktop">shared</a> to a potential victim’s Google Drive. (Bargury says a victim could have also uploaded a compromised file to their own account.) It looks like an official document on company meeting policies. But inside the document, Bargury hid a 300-word malicious prompt that contains instructions for ChatGPT. The prompt is written in white text in a size-one font, something that a human is unlikely to see but a machine will still read.</p> <p>In a <a href="https://www.youtube.com/watch?v=JNHpZUpeOCg">proof of concept video of the attack</a>, Bargury shows the victim asking ChatGPT to “summarize my last meeting with Sam,” referencing a set of notes with OpenAI CEO Sam Altman. (The examples in the attack are fictitious.) Instead, the hidden prompt tells the LLM that there was a “mistake” and the document doesn’t actually need to be summarized. The prompt says the person is actually a “developer racing against a deadline” and they need the AI to search Google Drive for API keys and attach them to the end of a URL that is provided in the prompt.</p> <p>That URL is actually a command in the <a href="https://www.wired.com/story/the-eternal-truth-of-markdown/">Markdown language</a> to connect to an external server and pull in the image that is stored there. But as per the prompt’s instructions, the URL now also contains the API keys the AI has found in the Google Drive account.</p> </blockquote><p>This kind of thing should make everybody stop and really think before deploying any AI agents. We simply don’t know to defend against these attacks. We have zero agentic AI systems that are secure against these attacks. Any AI that is working in an adversarial environment—and by this I mean that it may encounter untrusted training data or input—is vulnerable to prompt injection. It’s an existential problem that, near as I can tell, most people developing these technologies are just pretending isn’t there.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/we-are-still-unable-to-secure-llms-from-malicious-inputs/" data-a2a-title="We Are Still Unable to Secure LLMs from Malicious Inputs"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwe-are-still-unable-to-secure-llms-from-malicious-inputs%2F&amp;linkname=We%20Are%20Still%20Unable%20to%20Secure%20LLMs%20from%20Malicious%20Inputs" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwe-are-still-unable-to-secure-llms-from-malicious-inputs%2F&amp;linkname=We%20Are%20Still%20Unable%20to%20Secure%20LLMs%20from%20Malicious%20Inputs" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwe-are-still-unable-to-secure-llms-from-malicious-inputs%2F&amp;linkname=We%20Are%20Still%20Unable%20to%20Secure%20LLMs%20from%20Malicious%20Inputs" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwe-are-still-unable-to-secure-llms-from-malicious-inputs%2F&amp;linkname=We%20Are%20Still%20Unable%20to%20Secure%20LLMs%20from%20Malicious%20Inputs" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Fwe-are-still-unable-to-secure-llms-from-malicious-inputs%2F&amp;linkname=We%20Are%20Still%20Unable%20to%20Secure%20LLMs%20from%20Malicious%20Inputs" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.schneier.com/">Schneier on Security</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Bruce Schneier">Bruce Schneier</a>. Read the original post at: <a href="https://www.schneier.com/blog/archives/2025/08/we-are-still-unable-to-secure-llms-from-malicious-inputs.html">https://www.schneier.com/blog/archives/2025/08/we-are-still-unable-to-secure-llms-from-malicious-inputs.html</a> </p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwxXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div>

Randall Munroe’s XKCD ‘Where Babies Come From’

  • None
  • Published date: 2025-08-27 00:00:00

None

<figure class=" sqs-block-image-figure intrinsic "> <p> <a class=" sqs-block-image-link " href="https://xkcd.com/3127/"></a></p> <p> <script src="/cdn-cgi/scripts/7d0fa10a/cloudflare-static/rocket-loader.min.js" data-cf-settings="7bef10dd7d56868c74943a70-|49"></script><img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png" data-image-dimensions="652x362" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=1000w" width="652" height="362" sizes="auto, (max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload='this.classList.add("loaded")' srcset="https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/5355d604e4b03c3e9896e131/96c29036-e46a-4ed5-97fb-64cfea2cd8c2/where_babies_come_from.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs"></p> <p> <figcaption class="image-caption-wrapper"> <p class=""><strong>via the cosmic humor &amp; dry-as-the-desert wit of Randall Munroe, creator of XKCD</strong></p> </figcaption></p></figure><p><a href="https://www.infosecurity.us/blog/2025/8/27/randall-munroes-xkcd-where-babies-come-from">Permalink</a></p><p> </p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/08/randall-munroes-xkcd-where-babies-come-from/" data-a2a-title="Randall Munroe’s XKCD ‘Where Babies Come From’"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-where-babies-come-from%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Where%20Babies%20Come%20From%E2%80%99" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-where-babies-come-from%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Where%20Babies%20Come%20From%E2%80%99" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-where-babies-come-from%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Where%20Babies%20Come%20From%E2%80%99" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-where-babies-come-from%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Where%20Babies%20Come%20From%E2%80%99" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F08%2Frandall-munroes-xkcd-where-babies-come-from%2F&amp;linkname=Randall%20Munroe%E2%80%99s%20XKCD%20%E2%80%98Where%20Babies%20Come%20From%E2%80%99" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://www.infosecurity.us/">Infosecurity.US</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Marc Handelman">Marc Handelman</a>. Read the original post at: <a href="https://xkcd.com/3127/">https://xkcd.com/3127/</a> </p>