Cyber (In)Securities – Issue 171

Remote Access Exploits, Proxy Botnets, and Global Breaches

This edition of Cyber (In)Securities explores how cybercriminals are scaling their operations and exploiting trusted tools to infiltrate enterprise systems. From remote monitoring and management (RMM) abuse to global supply chain breaches, this issue delivers critical insights for cybersecurity leaders, governance professionals, and privacy advocates.

Security Leaders and Cyber Teams
Threat actors are increasingly using legitimate RMM tools such as ITarian, PDQ, SimpleHelp, and Atera to gain persistent access through sophisticated phishing campaigns. The SystemBC malware now controls over 1,500 infected VPS servers daily, fuelling brute force campaigns and proxy services. With WatchGuard Firebox vulnerabilities, a sixth Google Chrome zero day, and compromised PyPI packages, the pressure on defenders has never been greater.

Privacy, Trust and Safety
Breaches tied to Salesforce have exposed data at Farmers Insurance and Tiffany, while ShinyHunters claim 1.5 billion Salesforce records. Luxury retailers including Gucci, Balenciaga, and Alexander McQueen report millions of leaked customer records. In China, new rules require organizations to report severe cyber incidents within one hour, reshaping expectations for global transparency.

Governance, Geopolitics, and AI Security
Authorities in the UK arrested Scattered Spider members linked to the Transport for London hack. North Korea’s Kimsuky group is now deploying AI generated military IDs in espionage operations. Australia has unveiled new social media restrictions for children, while global regulators intensify debates around AI safety, corporate accountability, and cross-border governance.

Insights from CyAN

  • Editor’s Desk: Kim Chandler McDonald explores the rise of workplace surveillance, talent pipelines, and the governance risks of unchecked monitoring.
  • Root Access: Michael McDonald examines the Yurei ransomware strain and npm supply chain compromises, urging security leaders to focus on fixing architectural weaknesses.
  • Community Highlights: Congratulations to Kim Chandler McDonald, Highly Commended at the Australian Women in Security Awards, and to Bharat Raigangar, recognised as Middle East AI and Cyber Security Leader 2025.
  • CyAN Blogs, Articles & Podcasts: Featuring Sapann Harish Talwar on the deliverables of a modern CISO and Mohammed Shakil Khan on how unlearning drives innovation and resilience.

Stay informed with the latest threat intelligence, privacy updates, and governance insights from the global CyAN community.

You can download this edition by clicking the three dots icon on the bottom right and selecting Download PDF File. To enlarge the view, click the fullscreen icon on the bottom right. All article titles inside the flipbook are clickable links.