Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What's New in CyCognito: August 2025 Platform Enhancements

Security teams need automation, clarity, and speed to stay ahead. This month’s updates continue to refine the CyCognito experience so you can maintain an accurate asset inventory, pivot through investigations quickly, and share the right information with stakeholders. In the past few weeks we delivered improvements across automation (including Action Rules), APIs improvements, new investigation and management options, and reporting controls for PDFs. Below is a detailed look at what is new.

Better Network Visibility with New 11:11 Cloud Console Tools

When it comes to driving directions, it is easy to become dependent on a navigation system, especially when you are in an unfamiliar area. Unfortunately, when you run into one of those pesky locations that still don’t have wireless coverage you can quickly find yourself without much of an idea of where to turn next. Managing network infrastructure shouldn’t feel like navigating in the dark.

AssumeRoleWithWebIdentity WHAT?! Solving the Github to AWS OIDC InvalidIdentityToken Failure Loop

Ariel Beck has over a decade of software engineer and system architect experience. As current Head of Architecture at Jit.io, Ariel believes in proactively shaping the tech landscape to create secure, scalable solutions. Security experts dedicated to shaping insightful editorial content, guiding developers and organizations toward secure cloud app development. Dive into a wealth of knowledge and experience in fortifying software integrity.

How to lead with confidence in the AI era: a conversation with Nancy Wang, VP, Engineering

Artificial Intelligence (AI) is reshaping how we work and lead. At 1Password, we see AI as a powerful accelerator that helps our teams focus on the work that matters most. To explore what it means to lead in this new era, we sat down with Nancy Wang, VP/Head of Engineering. Nancy shares how AI shows up in her day-to-day, how she inspires her team to be curious, and why human skills like trust matter more than ever.

The Attacker's Playbook: A Technical Analysis of Quishing and Encrypted SVG Payloads Used in HR Impersonation Phishing Attacks

In this series, we first explored the psychology that makes HR phishing so effective, then showcased the real-world lures attackers use to trick your employees. Now, we’re going under the hood to answer the critical question: How do these attacks technically bypass security defenses?

New Homoglyph Phishing Campaign Impersonates Booking.com

Attackers are using a Japanese Unicode character to replace forward slashes in phishing URLs, BleepingComputer reports. The attacks impersonate Booking.com with phony emails that inform users of a new login to their account. “The attack, first spotted by security researcher JAMESWT, abuses the Japanese hiragana character “ん” (Unicode U+3093), which closely resembles the Latin letter sequence '/n' or '/~', at a quick glance in some fonts,” BleepingComputer explains.

Phishing Attacks Target Brokerage Accounts to Manipulate Stock Prices

Professional phishing groups are targeting customers of brokerage firms in order to manipulate stock prices, KrebsOnSecurity reports. The attackers use a technique called “ramp and dump” to profit from the scheme. “With ramp and dump, the scammers do not need to rely on ginning up interest in the targeted stock on social media,” Krebs explains.

Warning: Social Engineering is a Growing Threat to the Industrial Sector

Social engineering attacks are a growing threat to operational technology (OT) environments, Industrial Cyber reports. Cyberattacks against these environments can be particularly damaging since they have the potential to cause physical disruptions.

Fidelis Deception: Enterprise Insider Threat Solution

Insider threats drain organizational budgets by $17.4 million annually on average, with over 80% of companies experiencing at least one insider-related incident in the past year. Existing insider threat solutions deliver inadequate protection because of excessive false positives, sluggish threat detection, and weak intelligence gathering capabilities.

MURKY PANDA: A Trusted-Relationship Threat in the Cloud

Since 2023, CrowdStrike Services and CrowdStrike Counter Adversary Operations have investigated multiple intrusions conducted by MURKY PANDA, a sophisticated adversary leveraging advanced tradecraft to compromise high-profile targets. MURKY PANDA, active since at least 2023, is a cloud-conscious adversary with a broad targeting scope; the adversary’s operations have particularly focused on government, technology, academia, legal, and professional services entities in North America.