Breach Analysis April 19, 2026

Vercel Breach

Vercel has disclosed unauthorized access to internal systems, with threat actor ShinyHunters claiming possession of NPM and GitHub tokens for Vercel-maintained packages. This briefing covers response actions for Vercel customers and general npm-supply-chain hygiene relevant to any organization consuming npm packages, not just Vercel customers.

Leadership Guide April 6, 2026

EU Cyber Resilience Act

EU Vulnerability Reporting Deadline Hits September 2026, Not December 2027. If you sell software to EU customers, you have less than six months to operationalize 24-hour vulnerability reporting to ENISA.

Threat Advisory April 3, 2026

TeamPCP Supply Chain Attack

In March 2026, attackers compromised four widely-used developer tools — Trivy, Checkmarx KICS, LiteLLM, and Telnyx — silently stealing credentials from an estimated 500,000+ machines. If your CI/CD pipelines ran any of these tools during the affected windows, your cloud credentials may already be at risk.

Threat Advisory March 4, 2026

Iran-Affiliated Cyber Threat Advisory

Comprehensive analysis of Iran-affiliated cyber threats following Operation Epic Fury. Covers state-sponsored APT group mobilization, hacktivist surge with 60+ active groups, reduced federal cyber support, and 8 prioritized recommendations including SOC coordination, vulnerability patching, ICS/SCADA hardening, and identity controls.

AI Security February 2026

Security Risks in Claude Desktop Extensions

Attackers can take over a computer by sending a calendar invite to someone using Claude Desktop Extensions. This briefing covers which Claude products face exposure, IT team scanning recommendations, Anthropic's response, and how to evaluate similar risks in other AI tools.

AI Security August 1, 2025

ChatGPT Data Leakage via Shared Conversations

Publicly shared ChatGPT conversation links have been indexed by search engines, making sensitive business data discoverable via web searches. Covers detection methods, affected entities, and recommended AI usage policy updates.

Leadership Guide July 9, 2024

What to Look for in a Cloud Security Architect

Key attributes and skills to evaluate when hiring a Cloud Security Architect. Covers business alignment, security architecture design, IAM, data protection, compliance, incident response, collaboration, and DevSecOps integration.

Breach Analysis November 1, 2023

Scattered Spider Breaches

Analysis of the Scattered Spider (UNC3944) threat group's attacks on MGM Resorts ($100M impact), Caesars Entertainment ($15M ransom), and Clorox. Covers social engineering tactics, helpdesk manipulation, ransomware deployment, and prioritized defense recommendations.

Breach Analysis October 31, 2023 • Updated November 30, 2023

Okta Breach — Customer Support System Compromise

Analysis of the Okta customer support system breach, including the November 2023 scope expansion from 134 customers to all support system users. Covers HAR file exposure, session hijacking, identity provider manipulation, and detailed response actions for Okta administrators.

Stay Informed

Follow us on LinkedIn for executive briefings as they're published, subscribe via RSS, or contact us to discuss your threat landscape.

Follow on LinkedIn Subscribe via RSS Contact Us