#cyberRisk

2026-02-28

Operational disruption alert.
Reddit faced a global outage, 15,000+ rapid reports, mobile app impact at 64%, CDN-origin connectivity errors observed.

Security-adjacent considerations:
• Traffic surge management gaps
• CDN dependency risk
• Authentication system resilience
• Opportunistic phishing during downtime
• Brand impersonation spikes during trending outages

When high-traffic platforms fail, attackers often exploit confusion windows.

Did you observe increased malicious domain registrations or phishing attempts during #RedditDown?

Source: newsx.com/tech-and-auto/reddit

Engage below.
Follow TechNadu for infrastructure, outage intelligence, and cybersecurity insights.
Repost to expand situational awareness.

#Infosec #PlatformOutage #ThreatIntel #CloudSecurity #CDN #SRE #DigitalInfrastructure #CyberRisk #IncidentResponse #ServiceDisruption #SecurityMonitoring #AdTechSecurity

Reddit Hit By Major Global Outage; Over 15,000 Users Report Issues As Social Media Platform Admits ‘Elevated Error Rates’
2026-02-28

CVE-2026-21902 represents a high-impact infrastructure exposure.

Affected platform: Junos OS Evolved on PTX series routers.

Attack vector: Unauthenticated network access.
Privilege level: Root execution.
Service: On-Box Anomaly Detection, enabled by default.

Strategic risk:
• Traffic interception capability
• Policy manipulation
• Controller redirection
• Lateral pivoting
• Long-term foothold persistence
Although no exploitation has been observed, historically, high-performance routing infrastructure is a prime target due to its control-plane visibility and network centrality.

Recommended actions:
– Immediate patch validation
– Control-plane traffic monitoring
– Service exposure review
– Network segmentation validation
– Threat hunting for anomalous routing behavior
Are infrastructure devices integrated into your continuous detection engineering pipeline?

Source: securityweek.com/juniper-netwo

Engage below.
Follow TechNadu for high-signal vulnerability intelligence.
Repost to strengthen security awareness.

#Infosec #CVE2026 #Juniper #RouterSecurity #CriticalInfrastructure #ThreatModeling #DetectionEngineering #NetworkDefense #ZeroTrustArchitecture #CyberRisk #SecurityOperations #VulnerabilityManagement

Juniper Networks PTX Routers Affected by Critical Vulnerability
2026-02-28

Identity compromise continues to dominate intrusion chains.
From the Sophos Active Adversary Report 2026:
• 67% of initial access attributed to identity abuse
• 3.4-hour median to Active Directory pivot
• 3-day median dwell time
• 88% ransomware deployment off-hours
• 79% data exfiltration off-hours
Directory services remain high-value assets — authentication, authorization, policy control, privilege mapping.
The compressed timeline from credential misuse to directory-level access underscores the need for:
– Continuous identity monitoring
– Behavioral analytics
– After-hours SOC coverage
– Conditional access enforcement
– Least-privilege architecture
Generative AI is functioning as a force multiplier — improving phishing quality and campaign scale - not yet delivering autonomous attack chains.

Is identity governance keeping pace with adversary dwell time compression?
Engage below.

Source: sophos.com/en-us/press/press-r

Follow TechNadu for high-signal infosec analysis.

Repost to strengthen industry awareness.

#Infosec #IdentityThreats #RansomwareDefense #ActiveDirectorySecurity #ThreatModeling #GenAI #SecurityOperations #CyberRisk #ZeroTrustArchitecture #DetectionEngineering #EnterpriseSecurity #ThreatHunting

Sophos Active Adversary Report 2026: Identity attacks dominate as threat groups proliferate
2026-02-27

Sector alert: European football club targeted.

Olympique de Marseille confirmed an attempted cyberattack following alleged data leak claims involving:
• ~400,000 supporter records
• 2,050+ Drupal CMS accounts
• E-commerce and membership-related data
No confirmed compromise of banking credentials, investigation ongoing, incident reported to CNIL.
Attack surface observations:
– CMS exposure risk
– High-value fan PII aggregation
– Merchandising platforms as entry vectors
– Sector-wide vulnerability patterns (preceded by FFF breach)
Sports organizations increasingly mirror enterprise-scale digital infrastructures - yet often lack comparable security maturity.

What baseline controls should leagues enforce - MFA mandates, zero trust architecture, CMS hardening standards?

Source: bleepingcomputer.com/news/secu

Engage in the comments.
Follow TechNadu for high-signal infosec coverage.

Repost to amplify sector awareness.

#Infosec #DrupalSecurity #DataBreach #SportsSecurity #ThreatIntelligence #CyberRisk #GDPRCompliance #SecurityOperations #DigitalForensics #CyberDefense

Olympique Marseille confirms 'attempted' cyberattack after data leak
2026-02-27

Odido confirms major breach:
• 688,102 accounts added to HIBP
• ~6M records potentially exposed
• ShinyHunters claims responsibility
• Ransom refused — data leaked in stages
Sensitive financial & identity data compromised.

Full details:
technadu.com/odido-data-breach

#InfoSec #DataBreach #TelecomSecurity #CyberRisk

Odido Data Breach Exposes Almost 690,000 Telecom Customer Accounts
2026-02-26

Threat Landscape Brief - 2026
Source: Darktrace Annual Threat Report

Key Metrics:
• 20% YoY rise in disclosed vulnerabilities
• 32M phishing emails detected
• 8.2M targeted VIP accounts
• 28% increase in QR-based phishing
• 70% of Americas incidents initiated via stolen credentials
• Microsoft Azure most targeted cloud
• Docker environments saw 54.3% honeypot targeting

Operational shift:
• Credential abuse > exploit development
• AI-assisted phishing increasing personalization
• DMARC bypass at 70% legitimacy pass rate
• Fresh domains deployed at scale

Strategic implication:
Identity telemetry and behavioral analytics are now mission-critical.

Source: darktrace.com/blog/what-the-da

Follow @technadu for actionable threat intelligence.
Share your detection strategy insights below.

#Infosec #ThreatIntel #IdentitySecurity #Darktrace #CloudSecurity #Azure #PhishingDefense #ZeroTrust #IAM #SecurityOperations #CyberRisk #TechNadu

What the Darktrace Annual Threat Report 2026 Means for Security Leaders
J. R. DePriest :verified_trans: :donor: :Moopsy: :EA DATA. SF:jrdepriest@infosec.exchange
2026-02-25

I thought I might post an actual Cyber Security / InfoSec thing for once.

"Visibility without consequences is not governance."

https://www.csoonline.com/article/4136995/boards-dont-need-cyber-metrics-they-need-risk-signals.html

This is a great article.

A large portion of my job is quantifying risk and turning it into numbers to help prioritize vulnerabilities, pen test findings, CNAPP reports, compliance failures,, and misconfigurations. I use all kinds of values to calculate "a number" for each finding. I'll probably throw up my methodology on gist soon because I'd like feedback and ideas for how to make it better. Incidentally, is there a gist equivalent on Codeberg?

With that said, this article talks about all the things that "a number" cannot do and all the other important things the board and other stakeholders and decision makers at that level should know.

There are lots of quotable lines, but my favorite, the one I'd like on a T-shirt or hanging on posters in every break room is: "Visibility without consequences is not governance."

It's important because we run up against it time and time again. A business line WONTFIX so they get an exception for X months (or years). That number no longer counts against them. As my boss likes to joke, "we'll just tell the malicious actors we have an exception and ask them not to exploit it." That doesn't work. It hides risk. But when all you care about is "a number" then fixing that number becomes the goal, not fixing the underling risk.

Again, this is a good article. Read it. Agree with it. Gnash your teeth that you can't do the things it suggests and that your board would never go for it. Or, more likely, your board will never know this is an option because the C-level execs are too terrified of rocking the boat.

#InfoSec #Metrics #GRC #CyberSecurity #VulnerabilityMetrics #ITRisk #ITRiskManagement #ITSecurity #CyberRisk #CyberRiskManagement

2026-02-24

Vishing-Based Compromise at Optimizely Highlights Identity Risk

Attackers gained access via voice phishing, targeting SSO-linked systems and CRM records.

No confirmed privilege escalation, but exposure of business contact data reinforces how social engineering bypasses perimeter defenses.

Activity patterns resemble ShinyHunters campaigns abusing MFA prompts and OAuth 2.0 device authorization flows.

Common post-access targets include Salesforce, Microsoft 365, Google Workspace, Slack, SAP, Atlassian - wherever SSO tokens provide lateral access.

Identity is the control plane. Once tokens are compromised, downstream exposure scales quickly.

Is your organization monitoring abnormal device code authentication and token issuance events?

Source: bleepingcomputer.com/news/secu

Engage below.
Follow @technadu for actionable threat intelligence.

#Infosec #Vishing #OAuth #IAM #SSO #ZeroTrust #ThreatHunting #SOC #IdentitySecurity #CyberRisk

Ad tech firm Optimizely confirms data breach after vishing attack
2026-02-24

Airline Phishing Infrastructure Expands in 2026
PreCrime Labs identified:
• 11,600+ suspicious airline-themed domains
• 1,799 domains in 4 months
• 36 AI-LLM branded domains harvesting traveler data
• High-value private jet fraud infrastructure
• Recruitment-based credential harvesting
Brands observed in impersonation campaigns:
LATAM Airlines, Avianca, British Airways, Lufthansa, Qatar Airways

Key technical risks:
• Vendor-jacking → BEC
• AI-assisted context harvesting
• SEO poisoning with airline keywords
• Crypto-payment themed fraud
• Defense & logistics-themed impersonation

Is aviation now one of the highest ROI phishing verticals?

Engage below.
Follow @technadu for actionable threat intelligence.

#Infosec #ThreatIntel #PhishingInfrastructure #BrandProtection #BEC #FraudOps #OSINT #AviationCyber #DomainMonitoring #CyberRisk

Commercial Airline Industry Sees Sustained Scam and Impersonation Activity in 2026
2026-02-24

Oversecured Flags 1,575 Issues in Android Mental Health Apps
Oversecured identified 54 high-severity vulnerabilities across 10 apps totaling 14.7M+ installs.
Technical concerns include:
• Improper use of Intent.parseUri()
• Insecure PRNG via java.util.Random
• Local storage exposure
• Plaintext API endpoints in APK
• Missing root detection
These apps handle highly sensitive mental health records, including CBT notes and therapy transcripts.

Threat modeling implication:
Mobile health apps may represent high-value data reservoirs with weaker security maturity than regulated healthcare systems.

Should digital health apps undergo mandatory security audits before distribution?

Engage below.
Follow TechNadu for deep-dive cybersecurity reporting.

#Infosec #MobileAppSecurity #AndroidSecurity #SecureCoding #DigitalHealth #ThreatModeling #AppSec #CyberRisk #DataProtection

Android mental health apps with 14.7M installs filled with security flaws
2026-02-23

Proton Reports Malicious Proton VPN Impersonators in Chrome Web Store

Impact reportedly included:
• Credential harvesting
• Personal data collection
• Potential traffic relay
• Abuse of brand trust
Repeated reporting allegedly led to delayed removal.

Security takeaways:
• Extension ecosystems remain high-risk
• Search-based brand targeting is effective for attackers
• Store review latency increases exposure window

Community question:
Should browser vendors implement stricter publisher verification or cryptographic signing tied to corporate identity?

Source: cyberinsider.com/proton-warns-

Engage below and follow @technadu for threat ecosystem analysis and digital trust reporting.

#ThreatIntel #BrowserSecurity #ExtensionSecurity #ProtonVPN #CyberRisk #AppStoreSecurity #Infosec #MalwareResearch

Proton warns of malicious Chrome extensions impersonating its VPN service
2026-02-23

CVE-2026-2329 — Critical VoIP RCE
Affects: Grandstream GXP1600
Type: Stack-based buffer overflow
Impact: Unauthenticated RCE (root)

Attack Path:
• Extract SIP credentials
• Modify SIP proxy settings
• Transparent call interception

Operational risk:
• SMB exposure
• Flat networks
• Insufficient VoIP monitoring

Patch available: Firmware 1.0.7.81.
Community question:
Are you incorporating VoIP firmware into vulnerability scanning pipelines?

Do you log and monitor SIP configuration changes?

Source: securityweek.com/critical-gran

Engage below and follow TechNadu for detailed CVE intelligence and technical breakdowns.

#ThreatIntel #VoIPSecurity #CVE20262329 #RCE #VulnerabilityManagement #NetworkDefense #Infosec #CyberRisk

Critical Grandstream Phone Vulnerability Exposes Calls to Interception
2026-02-23

Wikipedia Deprecates Archive.today - Infrastructure Trust Debate

Concerns cited:
• JavaScript allegedly used for DDoS activity
• Archived content integrity questioned
• Ownership transparency unclear
695k+ links across Wikipedia affected.
This incident highlights risks in:
• Third-party archive dependency
• Client-side script misuse
• Citation ecosystem fragility
• Digital evidence reliability

Question for the community:
Should web archives implement cryptographic verification of snapshots?

Source: techcrunch.com/2026/02/21/wiki

Is independent auditing necessary for archival services?

Engage below and follow TechNadu for structured cybersecurity and infrastructure analysis.

#ThreatIntelligence #WebSecurity #DigitalForensics #CyberRisk #DDoS #ArchiveIntegrity #Infosec #Governance

Wikipedia blacklists Archive.today after alleged DDoS attack
2026-02-23

I write about the things that keep executives up at night — and the things they should be losing sleep over but aren’t.

Over the past few months I’ve published deep dives on the collisions between AI, cybersecurity, leadership, and the forces reshaping the workforce. Here are 10 you might find useful:

🔒 Security & Leadership
→ Nearly 25% of Fortune 500 CISOs last just one year. The problem isn’t the people — it’s the system.
kiledjian.com/2025/10/14/built
→ Attackers aren’t deploying AI someday. They’re doing it now — and 80% of recent ransomware already uses it.
kiledjian.com/2025/10/05/cyber
→ A new anonymous wireless carrier claims to know nothing about its customers. I did a technical teardown.
kiledjian.com/2025/12/17/in-th
→ “Unhackable” phones are everywhere on social media. Here’s what a security professional actually thinks.
kiledjian.com/2026/01/25/why-t

🤖 AI — Practically
→ The “stochastic parrot” era is over. What that means for your boardroom.
kiledjian.com/2026/01/24/the-e
→ Your AI agrees with you too much. Here’s how to fix that with better prompts.
kiledjian.com/2025/10/07/promp
→ One line added to any prompt can improve AI output by 14–45%. No tools required.
kiledjian.com/2025/11/28/impro

🌍 The Bigger Picture
→ In 2026, the internet is a contested information environment. Here’s a field manual for protecting your perception.
kiledjian.com/2026/01/19/conte
→ France just recorded more deaths than births for the first time since WWII. The U.S. is projected to follow by 2030. What this means for business.
kiledjian.com/2026/01/29/the-d
→ The Great Resignation is dead. Welcome to “job clinging” — and it’s worse than you think.
kiledjian.com/2025/09/29/the-g

I write at kiledjian.com — no ads, no sponsors, no vendor spin. Just analysis from 25+ years in cybersecurity and technology leadership.

#Cybersecurity #AI #Leadership #CISO #ArtificialIntelligence #PromptEngineering #Privacy #InfoSec #ThreatIntelligence #FutureOfWork #ExecutiveLeadership #TechLeadership #AgenticAI #CyberRisk #DigitalTransformation​​​​​​​​​​​​​​​​

2026-02-21

Incident summary:
Target: PayPal - Working Capital (PPWC) loan app
Root cause: Software code error
Exposure window: July 1- Dec 13, 2025
Discovery: Dec 12, 2025
Scope: ~100 users

Data exposed:
• SSN
• DOB
• Contact & business details

No core system compromise reported.
Unauthorized transactions observed in limited cases.

Credit monitoring via Equifax provided.
Key considerations:

– Secure SDLC gaps?
– Change management review failure?
– Logging & anomaly detection delay?
– Exposure vs intrusion classification challenges

Six months of unnoticed PII exposure highlights how application-layer misconfigurations can rival full breaches in impact.

How would you design detection controls to catch this earlier?

Engage below.
Follow @technadu for technical cybersecurity coverage.

Source: bleepingcomputer.com/news/secu

#ThreatAnalysis #SecureSDLC #FintechSecurity #ApplicationSecurity #DataExposure #CyberRisk #DFIR #Governance #Infosec

PayPal discloses data breach that exposed user info for 6 months
hackmachackmac
2026-02-21

72 Minuten. Das ist alles, was Angreifer heute brauchen. KI verändert die Spielregeln der Cyberkriminalität fundamental – und zwar nicht zugunsten der Verteidiger. Laut einer aktuellen Studie von Palo Alto Networks ist die Zeit zwischen der Entdeckung einer Schwachstelle und deren aktiver Ausnutzung auf durchschnittlich 72 Minuten gesunken. Bei den schnellsten Angreifern noch deutlich weniger.

Threatcopthreatcop
2026-02-19

Ransomware doesn’t just shut down systems — it triggers compliance violations.
𝗚𝗗𝗣𝗥 deadlines. 𝗛𝗜𝗣𝗔𝗔 reporting. 𝗣𝗖𝗜-𝗗𝗦𝗦 investigations.

If employees delay reporting, the legal risk multiplies.

Read more: threatcop.com/blog/how-ransomw

How ransomware threatens compliance?
2026-02-19

Unemployment benefit fraud remains a high-impact identity theft vector.

Threat model:
• Compromised SSNs
• Fraudulent unemployment filings
• Downstream tax fraud risk
• Potential wage garnishment exposure

Mitigation workflow:
– Immediate employer notification
– State agency reporting
– FTC complaint filing
– Credit freeze across all three bureaus
– Continuous credit monitoring
– IRS Identity Protection PIN enrollment

Key takeaway: Administrative fraud often precedes financial fraud. Early reporting limits lateral exploitation.

From a security governance perspective, how should agencies strengthen identity verification in unemployment systems?

Source: consumer.ftc.gov/consumer-aler?

Engage below.
Follow @technadu for structured infosec reporting.

#Infosec #IdentityFraud #CyberRisk #DataProtection #SecurityAwareness #FraudMitigation #TechNadu

Got a letter about unemployment benefits you didn’t file? That’s identity theft

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst