CyberPulse SMB - Daily Security Digest
Date: September 22, 2025
⚠️ What Every Business Leader Should Know
🔴 High-Risk Issues
Passwords & Email
Phishing emails and weak passwords remain primary attack vectors. Sophisticated attacks leverage social engineering to bypass security controls and gain access to sensitive data.
**Business Risk:** A successful phishing attack can lead to data breaches, financial losses, and reputational damage, impacting customer trust and potentially causing legal liabilities.
- Implement multi-factor authentication (MFA) for all accounts.
- Conduct regular security awareness training for employees.
- Use strong, unique passwords and a password manager.
Ransomware
Ransomware attacks encrypt critical data, demanding payment for its release. These attacks can cripple operations and lead to significant financial losses.
**Business Risk:** Ransomware can halt operations, leading to lost revenue, data loss, and potentially hefty ransom payments.
- Regularly back up your data to an offline location.
- Keep your software updated with the latest security patches.
- Implement robust endpoint detection and response (EDR) solutions.
Supply Chain Attacks
Attacks targeting your software supply chain can introduce vulnerabilities into your systems, compromising your security without your direct knowledge.
**Business Risk:** Compromised software can lead to data breaches, malware infections, and operational disruptions, damaging your reputation and costing you significant time and money.
- Vet your software vendors carefully and ensure they have strong security practices.
- Regularly review and update your software inventory.
- Implement robust vulnerability management processes.
⚙️ Foundational Policy Risks
Outdated Software
Unpatched software creates vulnerabilities that cybercriminals can exploit. Regular updates are crucial for maintaining a secure environment.
**Business Risk:** Outdated software exposes your systems to known vulnerabilities, increasing the risk of data breaches, malware infections, and operational disruptions.
- Implement a robust patch management process.
- Automate software updates where possible.
Weak Access Controls
Inadequate access controls allow unauthorized individuals to access sensitive data and systems. Strong access controls are essential for protecting your information.
**Business Risk:** Weak access controls can lead to data breaches, unauthorized access to sensitive information, and potential regulatory fines.
- Implement the principle of least privilege.
- Regularly review and update user access permissions.
📢 Security Awareness Gaps
Phishing
Phishing attacks exploit human error to gain access to sensitive data and systems. Employee training is crucial to mitigate this risk.
**Business Risk:** Successful phishing attacks can lead to data breaches, malware infections, and financial losses.
- Conduct regular security awareness training for employees.
- Implement email filtering and anti-phishing solutions.
📦 What You Should Prioritize Now
| Priority | Action |
|---|---|
| Implement MFA | Enable MFA on all critical accounts. |
| Software Updates | Patch all critical vulnerabilities immediately. |
| Data Backups | Establish a robust offline backup strategy. |
| Security Awareness Training | Conduct regular training for employees. |
| Vendor Risk Assessment | Review your vendors' security practices. |
| Access Control Review | Review and update user access permissions. |
| Incident Response Plan | Develop and test an incident response plan. |
💬 Final Thought
Consistent, simple security practices—like MFA, regular software updates, and employee training—offer the strongest defense against cyber threats. Prioritizing these foundational elements significantly reduces your long-term risk.
🔗 Additional Reading
High-Risk
- [SMB] ⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More — The security landscape now moves at a pace no patch cycle can match.
- [SMB] Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants — A critical token validation failure in Microsoft Entra ID (previously Azure Active Directory) could have allowed attackers to impersonate any user, including G…
- 15 Years of Zero Trust: Why It Matters More Than Ever — With the emergence of AI-driven attacks and quantum computing, and the explosion of hyperconnected devices, zero trust remains a core strategy for security ope…
- [SMB] EU’s cyber agency blames ransomware as Euro airport check-in chaos continues — <h4>Airport staff revert to manual ops as travellers urged to use self-service check-in where possible</h4> <p>The EU's cybersecurity agency today confirmed th…
- Car giant Stellantis says customer data nicked after partner vendor pwned — <h4>Automaker insists only names and emails exposed, no financials</h4> <p>Car giant Stellantis is admitting that attackers targeted one of its third-party par…
- Microsoft Entra ID flaw allowed hijacking any company's tenant — A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world. [...]
- [SMB] What happens when a cybersecurity company gets phished? — A Sophos employee was phished, but we countered the threat with an end-to-end defense process
- Nimbus Manticore Deploys New Malware Targeting Europe — <p>Nimbus Manticore Deploys New Malware Targeting Europe Key Findings Introduction Since early 2025, Check Point Research (CPR) has tracked waves of Nimbus Man…
- 22nd September – Threat Intelligence Report — <p>For the latest discoveries in cyber research for the week of 22nd September, please download our Threat Intelligence Bulletin.
- DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams — Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style lures to deliver a …
- [SMB] Toxics, Vol. 13, Pages 802: Toxicological Impacts of Polypropylene Nanoparticles Similar in Size to Nanoplastics in Plastic-Bottle Injections on Human Umbilical Vein Endothelial Cells — Microplastic and nanoplastic (MNP) particles have been observed in various human organs.
- LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer — LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that distribute malware…
- [SMB] Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell — Cybersecurity researchers have discovered what they say is the earliest example known to date of a malware with that bakes in Large Language Model (LLM) capabi…
- ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent — Cybersecurity researchers have disclosed a zero-click flaw in OpenAI ChatGPT's Deep Research agent that could allow an attacker to leak sensitive Gmail inbox d…
- UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware — An Iran-nexus cyber espionage group known as UNC1549 has been attributed to a new campaign targeting European telecommunications companies, successfully infilt…
- SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers — A proxy network known as REM Proxy is powered by malware known as SystemBC, offering about 80% of the botnet to its users, according to new findings from the B…
- [SMB] Patch Now: Max-Severity Fortra GoAnywhere Bug Allows Command Injection — Exploitation of the flaw, tracked as CVE-2025-10035, is highly dependent on whether systems are exposed to the Internet, according to Fortra.
- 'ShadowLeak' ChatGPT Attack Allows Hackers to Invisibly Steal Emails — The loophole allows cyberattackers to exfiltrate company data via OpenAI's infrastructure, leaving no trace at all on enterprise systems.
- FBI warns of cybercriminals using fake FBI crime reporting portals — The FBI warned today that cybercriminals are impersonating its Internet Crime Complaint Center (IC3) website in what the law enforcement agency described as "p…
- [SMB] CISA exposes malware kits deployed in Ivanti EPMM attacks — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the malware deployed in attacks exploiting vulnerabilities affect…
- [SMB] Fortra warns of max severity flaw in GoAnywhere MFT’s License Servlet — Fortra has released security updates to patch a maximum severity vulnerability in GoAnywhere MFT's License Servlet that can be exploited in command injection a…
- [SMB] Known. Emerging. Unstoppable? Ransomware Attacks Still Evade Defenses — Ransomware remains one of the most destructive threats—because defenses keep failing.
- [SMB] Gamaredon X Turla collab — Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine
- [SMB] Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine — Cybersecurity researchers have discerned evidence of two Russian hacking groups Gamaredon and Turla collaborating together to target and co-comprise Ukrainian …
- U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack — Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider hacking group in connection with their alleged participation in …
- [SMB] CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 — The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday released details of two sets of malware that were discovered in an unnamed organiz…
- SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers — SonicWall is urging customers to reset credentials after their firewall configuration backup files were exposed in a security breach impacting MySonicWall acco…
- SonicWall Breached, Firewall Backup Data Exposed — Threat actors breached the MySonicWall service and accessed backup firewall configuration files belonging to "fewer than 5%" of its install base, acc…
- Scattered Spider teen cuffed after buying games and meals with extortion bitcoin — <h4>Bad opsec</h4> <p>Thalha Jubair, one of the two UK teens arrested on Tuesday and accused of being members of the notorious Scattered Spider cybercrime gang…
- UK arrests 'Scattered Spider' teens linked to Transport for London hack — Two teenagers, believed to be linked to the August 2024 cyberattack on Transport for London, have been arrested in the United Kingdom. [...]
- Vastaamo psychotherapy hack: US citizen charged in latest twist of notorious data breach — 28-year-old Daniel Lee Newhard, an American citizen living in Estonia, has been charged in relation to the notorious hack of Vastaamo, the biggest data breach …
- [SMB] Small businesses, big targets: Protecting your business against ransomware — Long known to be a sweet spot for cybercriminals, small businesses are more likely to be victimized by ransomware than large enterprises
Policy
- Data, Vol. 10, Pages 151: Validation of Anthropogenic Emission Inventories in Japan: A WRF-Chem Comparison of PM2.5, SO2, NOx and CO Against Observations — Reliable, high-resolution emission inventories are essential for accurately simulating air quality and for designing evidence-based mitigation policies.
- Canada dismantles TradeOgre exchange, seizes $40 million in crypto — The Royal Canadian Mounted Police has shut down the TradeOgre cryptocurrency exchange and seized more than $40 million believed to originate from criminal acti…
- IJMS, Vol. 26, Pages 9233: Advances in Psoriasis Research: Decoding Immune Circuits and Developing Novel Therapies — Psoriasis is a chronic inflammatory autoimmune skin disease characterized by erythematous plaques covered with silvery-white scales, often accompanied by syste…
- Polymers, Vol. 17, Pages 2553: Recent Advances in Marine-Derived Polysaccharide Hydrogels: Innovative Applications and Challenges in Emerging Food Fields — Marine-derived polysaccharides (MPs) are a class of polysaccharides isolated and purified from marine organisms, which engage in various biological activities …
- [SMB] Friday Squid Blogging: Giant Squid vs. Blue Whale — <p>A <a href="https://a-z-animals.com/animals/comparison/giant-squid-vs-blue-whale-compared/">comparison</a> aimed at kids.</p>
- Agriculture, Vol. 15, Pages 1984: Harvest Date Monitoring in Cereal Fields at Large Scale Using Dense Stacks of Sentinel-2 Imagery Validated by Real Time Kinematic Positioning Data — This study presents an operational and robust method for detecting and dating cereal harvest events using temporal stacks of Copernicus Sentinel-2 imagery and …
- Applied Sciences, Vol. 15, Pages 10261: Development of a Virtual Robotic System for Learning Spatial Vector Concepts in Junior High Schools — This study aims to address the challenges junior high school students often encounter when learning abstract spatial vector concepts.
- [SMB] Improving Risk Management Decisions with SBOM Data: A New Whitepaper from the OpenSSF SBOM Everywhere SIG — SBOMs are becoming part of everyday software practice, but many teams still ask the same question: how do we turn SBOM data into decisions we can trust? Our ne…
Awareness
- Zuck has the power! Meta applies to sell excess electricity — <h4>With new electricity sources for AI datacenters, the company will have some juice left over</h4> <p>AI model training and serving require vast quantities o…
- Electronics, Vol. 14, Pages 3722: A Hybrid Deep Learning and Optical Flow Framework for Monocular Capsule Endoscopy Localization — Pose estimation and localization within the gastrointestinal tract, particularly the small bowel, are crucial for invasive medical procedures.
Emerging
- How to Gain Control of AI Agents and Non-Human Identities — We hear this a lot: “We’ve got hundreds of service accounts and AI agents running in the background.
- Don't despair. iFixit says you can still repair that iPhone Air — <h4>Thinnest yet still fixable, though not without effort</h4> <p>iFixit has given Apple's slimline new smartphone, the iPhone Air, a thumbs-up for repairabili…
- Brit scientists over the Moon after growing tea in lunar soil — <h4>It's one small sip for man...</h4> <p>British boffins say they've discovered a way of taking one of the country's favorite pastimes – having a nice cup of …
- ISC Stormcast For Monday, September 22nd, 2025 https://isc.sans.edu/podcastdetail/9622, (Mon, Sep 22nd) — ISC Stormcast For Monday, September 22nd, 2025 https://isc.sans.edu/podcastdetail/9622, (Mon, Sep 22nd)
- Help Wanted: What are these odd reuqests about?, (Sun, Sep 21st) — Looking at our web honeypot data, I came across an odd new request header I hadn&#;x26;#;39;t seen before: "X-Forwarded-App".
- Microsoft says recent updates cause DRM video playback issues — Microsoft has confirmed a known issue that prevents some apps from playing Digital Rights Management (DRM) protected video content or displaying and recording …
- Verified Steam game steals streamer's cancer treatment donations — A gamer seeking financial support for cancer treatment lost $32,000 after downloading from Steam a verified game named BlockBlasters that drained his cryptocur…
- [SMB] Details About Chinese Surveillance and Propaganda Companies — <p>Details from <a href="https://www.wired.com/story/made-in-china-how-chinas-surveillance-industry-actually-works/">leaked documents</a>:</p> <blockquote><p>W…
- Upgrade your travel kit with a tiny, Tailscale-friendly router — I’ll be on vacation when this post is published. It’s not a tropical, cultural, or adventure vacation, but a kind of remote staycation, in a big rented house, …
- Entropy, Vol. 27, Pages 991: Category Name Expansion and an Enhanced Multimodal Fusion Framework for Few-Shot Learning — With the advancement of image processing techniques, few-shot learning (FSL) has gradually become a key approach to addressing the problem of data scarcity.
- Sustainability, Vol. 17, Pages 8506: Analysis of the Summer Sea Breeze Cooling Capacity on Coastal Cities Based on Computer Fluid Dynamics — Summer sea breezes provide cooling in coastal cities; however, their temporal cooling distribution and inland penetration distance remain inadequately studied.
- BDCC, Vol. 9, Pages 242: A Critical Analysis of Government Communication via X (Twitter) — Social media has dramatically impacted all sectors of society, including public communication and governmental relations.
- Make Windows 11 more useful and less annoying with these 11 Registry hacks — <h4>From pain-free shutdowns to crap-free search, these tweaks will improve your experience</h4> <p><strong>hands on</strong> Windows 11 has a number of puzzli…
- Technologies, Vol. 13, Pages 424: Evaluation of a Cyber-Physical System with Fuzzy Control for Efficiency Optimization in Rotary Dryers: Real-Time Multivariate Monitoring of Humidity, Temperature, Air Velocity and Mass Loss — Precise control and monitoring systems are essential for efficient energy consumption in food dehydration.
- Plastic People, Plastic Cards: Synthetic Identities Plague Finance & Lending Sector — Following a pandemic-era respite, financial fraud linked to synthetic identities is rising again, with firms potentially facing $3.3 billion in damages from ne…
- SaaS vendors are hiking costs faster than inflation, but squeaky wheels can still get deals — <h4>And also force them to improve resilience</h4> <p>SaaS vendors are increasing prices faster than both inflation and the typical growth rate of corporate IT…
- Britain jumps into bed with Palantir in £1.5B defense pact — <h4>Arrangement follows big tech tie-ins claiming to offer £31B investment</h4> <p>The UK has struck a defense deal with US spy-tech biz Palantir, which the go…
- Trump admin says tech companies are abusing H-1B visas, slaps $100k a year to allow entry — <h4>It will hit outsourcing companies hardest</h4> <p>On Friday, President Trump signed a presidential proclamation to sharply raise the cost of employing H-1B…
- ChatGPT joins human league, now solves CAPTCHAs for the right prompt — <h4>Could this bot-prevention technique now be obsolete?</h4> <p>ChatGPT can be tricked via cleverly worded prompts to violate its own policies and solve CAPTC…
- Microsoft starts rolling out Gaming Copilot on Windows 11 PCs — Microsoft has begun rolling out the beta version of its AI-powered Gaming Copilot to Windows 11 systems for users aged 18 or older, excluding those in mainland…
- You don’t need quantum hardware for post-quantum security — Post-quantum cryptography protects against quantum threats using today’s hardware.
- [SMB] IJERPH, Vol. 22, Pages 1460: Designing, Developing, and Evaluating a Stakeholder-Informed Mobile App to Promote Physical Activity in Children — Background: Prolonged sedentary behavior and associated obesity are recognized risk factors for poor health across the lifespan.
- Systems, Vol. 13, Pages 826: The Missing Pieces in the Entrepreneurial Ecosystem Puzzle: A Complex Perspective on Economic Growth — The entrepreneurial ecosystem (EE) concept is widely popular, but it has recently attracted criticism.
- How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines — Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practitioners fro…
- 7 Lessons for Securing AI Transformation From Former CIA Digital Guru — Jennifer Ewbank, former CIA deputy director of digital innovation, discusses resilience, cultural shifts, and cyber fundamentals in the AI era.
- [SMB] TikTok Deal Won't End Enterprise Risks — The proposed restructuring plan would address many concerns related to the social media platform, but risks remain for security teams.
- Court lets NSF keep swinging axe at $1B in research grants — <h4>Judge rules there’s no quick fix for 1,700+ axed grants, leaving labs scrambling for cash while the lawsuit plays out</h4> <p>A US court has cleared the wa…
- One token to pwn them all: Entra ID bug could have granted access to every tenant — <h4>Until Microsoft lobbed it into a virtual volcano</h4> <p>A security researcher claims to have found a flaw that could have handed him the keys to almost ev…
- Nice try, sinners: Pope nixes idea of AI pontiff blessing netizens — <h4>Leo XIV voices concerns about AI taking jobs – and not just his own</h4> <p>Pope Leo XIV has crucified the idea of creating an AI version which would've al…
- User group says SAP's licensing models make cloud migration harder — <h4>DSAG criticizes separate regimes for public, private cloud, says users need more time to upgrade in uncertain times</h4> <p>SAP's German-speaking user grou…
- ISC Stormcast For Friday, September 19th, 2025 https://isc.sans.edu/podcastdetail/9620, (Fri, Sep 19th) — ISC Stormcast For Friday, September 19th, 2025 https://isc.sans.edu/podcastdetail/9620, (Fri, Sep 19th)
- Steam will stop running on Windows 32-bit in January 2026 — Valve has announced that its Steam digital distribution service will drop support for 32-bit versions of Windows starting January 2026. [...]
- OpenAI's $4 GPT Go plan may expand to more regions — .OpenAI released $4 GPT Go in August, but it was limited to just India. Now, OpenAI is expanding GPT Go to include new regions. [...]
- ChatGPT Search is now smarter as OpenAI takes on Google Search — OpenAI has rolled out a big update to ChatGPT Search, which is an AI-powered search feature, similar to Google AI Mode. [...]
- ChatGPT now gives you greater control over GPT-5 Thinking model — OpenAI is finally rolling out a toggle that allows you to decide how hard the GPT-5-thinking model can think.
- [SMB] Surveying the Global Spyware Market — <p>The Atlantic Council has published its second annual report: “<a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mythical-…
- Threat landscape for industrial automation systems in Q2 2025 — Kaspersky industrial threat report contains statistics on various malicious objects detected and blocked on ICS computers by Kaspersky solutions in Q2 2025.
- Microsoft Defender delivered 242% return on investment over three years — <p>The latest 2025 commissioned Forrester Consulting Total Economic Impact™ (TEI) study reveals a 242% ROI over three years for organizations that chose Micro…
- Tourism and Hospitality, Vol. 6, Pages 186: Competition in Medical Tourism and Consumer Spending: Evidence from Turkey’s Growing Healthcare Market — As competition intensifies in the global medical tourism industry, countries are increasingly seeking effective marketing strategies to enhance their market sh…
Other
- Windows 11 update leaves Blu-ray and TV apps stuttering — <h4>Protected content in some Blu-ray and DVD applications broken</h4> <p>Microsoft has added another entry to its growing list of problematic updates in the W…
- Capture the Flag Competition Leads to Cybersecurity Career — As Splunk celebrates the 10th anniversary of Boss of the SOC competition, it continues to be a valuable platform for security professionals to test their skill…
- [SMB] Transforming Cyber Frameworks to Take Control of Cyber-Risk — Frameworks may seem daunting to implement — especially for government IT teams that may not have an abundance of resources and expertise.
- From Ghent to Brussels: OpenSSF’s Week of Policy and Security in Europe — At the end of October, the Linux Foundation, the Linux Foundation Europe and OpenSSF will gather leaders across industry, government, and open source communiti…
No spam. Unsubscribe anytime.
Sign up for From the CISO's desk
CyberSecurity information tailored for Small-Medium Sized businesses to navigate in the current Cyber-Landscape