Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 14, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Fortinet Warns of Active Exploitation of Known Vulnerabilities Fortinet has identified a post-exploitation technique used by threat actors targeting known, unpatched vulnerabilities in FortiGate devices. The threat actor leveraged a symbolic link trick to maintain read-only access to FortiGate devices, even after the original access vector was remediated.

Getting Started with Brivo Access

Welcome to your beginner's guide to Access, Brivo's powerful cloud-based access control platform! Whether you're a new user, installer, or just getting familiar with Brivo, this tutorial walks you through the essentials to get you up and running quickly. Explore the future of security and smart technology with Brivo. Our content delves into innovative solutions that empower businesses and individuals to create safer, more connected environments.

Claude AI BLEW MY MIND! (Board Game Challenge)

In this video, I challenge Claude AI to a head-to-head match in the board game King of Tokyo Duel. I walk the AI through the rules, give it everything it needs to understand how to play, and then we battle it out! Claude picks up the game shockingly fast — its strategy, decision-making, and logic were next-level. I was seriously mind-blown at how intelligent it was… Should we put this to the test with other AI's like ChatGPT?

Singapore's Scam Surge Strategy: What Enterprises Must Do Now Under the New Shared Responsibility Framework

Scam losses in the Asia-Pacific region continue to escalate, positioning the area as a global testing ground for phishing innovations. Singapore’s recent implementation of the Shared Responsibility Framework (SRF) serves as a critical alert for enterprises: both regulators and customers are demanding heightened vigilance.

Strategies for accelerating a successful log migration

Log management becomes more challenging as both log volume and diversity rapidly grow. Yet many companies still rely on legacy log management and SIEM solutions that aren’t designed to cost-effectively or securely handle the large scale of logs today coming from sources both in the cloud and on premises.

Identify risky behavior in cloud environments

Risk assessment requires context. One of the primary challenges with protecting cloud environments is understanding how certain activity can lead to risk. Risky behavior can be categorized as any activity or action that increases the likelihood of an attack in your cloud environment. While certain activity may not be malicious on its own, it can expand an environment’s attack surface or indicate post-compromise behavior.

The Fast Eat the Slow: AI Adoption for Survival in Modern Cybersecurity

John Quinsey (also known as “JQ”) is a regional director at Torq with 25 years in software and SaaS sales, solving business problems with disruptive technologies. He firmly believes AI has the power to revolutionize modern security operations. Just five years ago, the average dwell time for a ransomware attack was seven months. Today, it’s five days and shrinking.

Hidden Threats in Our Power Grid: The Chinese Transformer Backdoor Scandal

America's critical infrastructure faces an unprecedented threat, and it's already installed in hundreds of locations across the nation. Recent investigations confirm that Chinese-manufactured power transformers—essential components of our electrical grid—have been discovered with hidden capabilities allowing remote shutdown from overseas. In summer 2019, federal authorities seized a massive 500,000-pound Chinese transformer at the Port of Houston.

CrowdStrike Research: Securing AI-Generated Code with Multiple Self-Learning AI Agents

Applying robust security measures to automated software development is no longer a luxury but a necessity. CrowdStrike data scientists have developed an AI-driven, multi-agent proof of concept that leverages Red Teaming capabilities to identify vulnerabilities in code developed by AI agents. While it is still in the research stage, our work shows this advanced AI technology has the potential to revolutionize software security.