Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 27, 2025 Cyber Threat Intelligence Briefing

This campaign uses an updated lure combination of a Cloudflareturnstile and fake Windows update before socially engineering the victim into pasting malicious commands into the run dialogue box. Sekoia has released a detailed technical analysis of the POLAREDGE botnet which it initially reported on earlier this year. The botnet is spread by exploiting vulnerabilities, most notably CVE-2023-20118 in cisco routers; however, other samples from the same family have been seen exploiting routers from other vendors such as Asus, QNAP and Synology.

A Practical Guide to Adopting a Zero Trust Architecture

As organizations adapt to hybrid work, cloud adoption, and expanding digital ecosystems, traditional perimeter-based security models are no longer enough. Zero Trust has emerged as a leading framework to help reduce risk, improve visibility, and strengthen resilience, but implementation remains a challenge for many. This whitepaper explores how organizations can adopt Zero Trust in a practical, phased approach, aligned to real business and risk priorities.

The AI Revolution: Embracing the Future of eDiscovery

The eDiscovery landscape is undergoing a profound transformation, driven by the rapid evolution of artificial intelligence (AI). What was once a labor-intensive, manual process is now being revolutionized by technologies capable of analyzing vast volumes of data with speed, precision and insight. AI is not just a buzzword; it’s a catalyst for smarter, faster and more defensible legal workflows.

Let's Talk Cyber Resilience E3: Max Henderson

In this series, we chat with cybersecurity and data resilience leaders from Kroll and our partners. Our third guest is Max Henderson, Global Head of Digital Forensics and Incident Response, based in Tampa. Future episodes will cover topics such as the Cyber Threat Landscape, AI Risk Governance, and Breach Notification.