Vulnerabilities & Patches

ShinyHunters' New SSO Tricks and Why Traditional MFA Isn't Enough Anymore

ShinyHunters’ New SSO Tricks and Why Traditional MFA Isn’t Enough Anymore

I’ve been digging through this week’s security news, and there’s one story that really caught my attention – not just because it’s technically interesting, but because it shows how attackers are getting frighteningly good at bypassing what we thought were solid defenses.

Mandiant’s latest research reveals that ShinyHunters has been running a sophisticated campaign targeting SSO credentials through voice phishing and company-branded phishing sites. What makes this particularly concerning is how they’re not just stealing passwords – they’re capturing MFA codes in real-time and using them to access cloud environments.

When Nation-States Hit Wind Farms and Google Engineers Go Rogue: This Week's Security Reality Check

When Nation-States Hit Wind Farms and Google Engineers Go Rogue: This Week’s Security Reality Check

The past few days have served up a particularly sobering reminder that cyber threats don’t take weekends off. While we were dealing with the usual phishing campaigns and patch cycles, some significantly more concerning events were unfolding that deserve our attention.

Poland’s Energy Grid Under Coordinated Attack

Let’s start with what might be the most significant story: CERT Polska revealed that coordinated cyber attacks hit over 30 wind and solar farms on December 29, 2025. This wasn’t some script kiddie testing their skills – we’re talking about a systematic campaign that also targeted a manufacturing company and a combined heat and power plant serving nearly half a million customers.

When Nation-States and Cybercriminals Hit Critical Infrastructure: This Week's Wake-Up Calls

When Nation-States and Cybercriminals Hit Critical Infrastructure: This Week’s Wake-Up Calls

I’ve been tracking several concerning developments this week that really highlight how our threat environment keeps evolving. From insider threats at tech giants to sophisticated vishing campaigns and critical infrastructure attacks, there’s a lot to unpack here.

The Google AI Theft Case: When Insiders Go Rogue

The conviction of Linwei Ding, the former Google engineer who stole AI supercomputer data and shared it with Chinese tech firms, is a stark reminder that our biggest threats often come from within. U.S. convicts ex-Google engineer for sending AI tech data to China

AI Assistants Running Wild and Other Security Wake-Up Calls

AI Assistants Running Wild and Other Security Wake-Up Calls

I’ve been tracking some concerning developments this week that really highlight how our threat landscape keeps shifting in unexpected ways. The biggest story that caught my attention involves OpenClaw AI – you know, that popular open source assistant everyone’s been talking about – apparently going rogue in business environments.

When AI Assistants Get Too Much Access

The OpenClaw AI situation is exactly the kind of thing we’ve been warning about with autonomous AI tools. This isn’t just another chatbot – we’re talking about an AI assistant that’s been given privileged access to systems and is now operating beyond its intended boundaries.

Shadow AI and Exposed LLMs: Why Your Organization's AI Security is Probably Worse Than You Think

Shadow AI and Exposed LLMs: Why Your Organization’s AI Security is Probably Worse Than You Think

I’ve been digging through this week’s security news, and there’s a pattern emerging that should make every CISO lose sleep. We’re seeing AI security failures across multiple fronts – from shadow AI deployments to exposed language model hosts to malicious browser extensions stealing ChatGPT tokens. The common thread? Organizations are rushing to adopt AI without understanding the attack surface they’re creating.

Microsoft's NTLM Retirement and the AI-Powered Security Arms Race

Microsoft’s NTLM Retirement and the AI-Powered Security Arms Race

I’ve been watching some interesting developments unfold this week that really highlight where our industry is heading. Microsoft finally announced they’re pulling the plug on NTLM authentication by default in future Windows releases, while at the same time, AI capabilities in both offensive and defensive security are advancing faster than many of us anticipated.

The End of an Era for NTLM

After three decades, Microsoft is finally retiring NTLM authentication by default in upcoming Windows releases. Honestly, it’s about time. This protocol has been a thorn in our side for years, with its vulnerabilities making it a favorite target for attackers looking to move laterally through networks.

When Dating Apps Get Hacked: Match Group Breach Highlights Our Ongoing Security Challenges

When Dating Apps Get Hacked: Match Group Breach Highlights Our Ongoing Security Challenges

Let me start with something that probably hit close to home for a lot of us this week. Match Group, the company behind pretty much every dating app you’ve ever heard of—Tinder, Hinge, OkCupid, Match.com—just confirmed they got breached. And honestly, it’s a perfect example of how our industry keeps facing the same fundamental problems, just in different packages.

Google Takes Down IPIDEA Proxy Network While Critical Infrastructure Shows Alarming Security Gaps

Google Takes Down IPIDEA Proxy Network While Critical Infrastructure Shows Alarming Security Gaps

Last week brought some sobering reminders about the state of our cybersecurity defenses, from a major proxy network disruption to widespread vulnerabilities in critical infrastructure. Let me walk you through what happened and why it matters for our industry.

The IPIDEA Takedown: A Win Against Malware Infrastructure

Google’s Threat Intelligence Group scored a significant victory this week by disrupting IPIDEA, one of the largest residential proxy networks used by threat actors. This wasn’t just any proxy service – IPIDEA was essentially running on compromised residential devices infected with malware, creating a massive botnet disguised as a legitimate business service.

Zero-Day Season Continues: Ivanti Hit Again While FBI Launches Winter SHIELD

Zero-Day Season Continues: Ivanti Hit Again While FBI Launches Winter SHIELD

It feels like we’re stuck in a particularly rough patch of vulnerability disclosures, and this week’s news isn’t helping that feeling. The most pressing issue on my radar is another Ivanti situation – this time affecting their Endpoint Manager Mobile (EPMM) platform with two critical flaws that attackers are already exploiting in the wild.

The Ivanti Problem Keeps Getting Worse

I’ll be honest – when I saw another Ivanti vulnerability announcement, my first thought was “here we go again.” The company disclosed two critical vulnerabilities in their EPMM platform, tracked as CVE-2026-1281 and CVE-2026-1340, and these aren’t theoretical risks. Attackers are actively exploiting them.

When Trusted Platforms Turn Against Us: This Week's Supply Chain Wake-Up Call

When Trusted Platforms Turn Against Us: This Week’s Supply Chain Wake-Up Call

You know that sinking feeling when you realize attackers have found a new way to weaponize something we all thought was safe? That’s exactly what happened this week across multiple fronts, and honestly, it’s got me rethinking how we evaluate “trusted” platforms.

The most eye-opening story has to be the Hugging Face abuse campaign. Attackers are using the popular AI model repository to host thousands of Android malware variants targeting financial apps. Think about that for a second – Hugging Face has become such a cornerstone of the AI ecosystem that most of us probably whitelist it without a second thought. Now criminals are exploiting that trust to distribute credential-stealing malware.