Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Today's Cyber Risk Is the Industrialization of Known Weaknesses

This article was authored by Dave Burg Cybersecurity has long been framed as an arms race driven by increasingly sophisticated attacks. But that framing is increasingly outdated. The reality emerging from the front line is more uncomfortable: Today’s cyber risk is defined less by breakthrough innovation and more by the industrialization of existing weaknesses.

Kroll Conversations: Meet the Digital Identity Experts

Enabling seamless user access without compromising security is a complex challenge. Gaurav Sheth, Cynthia Yang and Sorabh Chopra are helping to change that. As part of Kroll’s recently established team dedicated to Digital Identity, their focus is on transforming fragmented administration, manual processes and siloed identity solutions into mature programs.

April 27, 2026 Emerging Threats Weekly

This week’s briefing covers: The attack chain invokes two preparatory batch scripts before the final wiper stage. Those scripts disable services, enumerate users, change passwords, log off sessions, disable network interfaces and begin destructive actions with diskpart, robocopy and fsutil before the final payload is launched. Dive deeper.