
I go through about 25 cybersecurity news portals and blogs every week and pull out the most interesting stories. Then I turn them into this short, digestible summary, so you can stay up to date without trying to follow 25 different sources yourself. 😱
My aim is to create a summary that gives you the gist without needing to open up the source article. But if you do want to dig deeper, all the sources covering the event are linked below each story.
This week I also included two long form reads. These were just interesting articles rather than breaking news.
If you enjoy these, come back next Monday
scroll to the bottom to subscribe to the e-mail newsletter.
Security firm Mandiant has released a cloud-hosted rainbow table that can crack Net-NTLMv1 administrative passwords in under 12 hours using consumer-grade hardware, spotlighting the continued risk of the deprecated protocol.
Despite its known weaknesses and the availability of NTLMv2 since 1998, NTLMv1 remains in use across legacy and mission-critical systems, enabling trivial credential theft and account takeover.
Mandiant is hoping that this tool will allow security experts to demonstrate the weakness of the protocol even easier, allowing them finally push companies away from Net-NTLMv1.
Key Details
Next Steps
Read more at Ars Technica
Researchers from Endor Labs have uncovered eight malicious npm packages posing as n8n community nodes that decrypt and exfiltrate OAuth tokens and API keys from enterprise workflows to attacker servers.
By leveraging n8n’s trust model, where community nodes run with full platform privileges, threat actors gained access to centralized credential vaults without triggering traditional supply chain defenses.
Key Details
Next Steps
Read more at CSO Online, Cybersecurity News, The Hacker News
A flaw in Telegram’s Android and iOS clients lets attackers expose a user’s real IP by clicking a crafted proxy link, bypassing all configured proxies or VPNs. The app’s automatic proxy validation pings attacker-controlled servers before adding them, allowing silent tracking, deanonymization, or targeted attacks against privacy-sensitive users.
Key Details
Next Steps
Read more at CybersecurityNews, Bleeping Computer, Reddit
Anthropic’s new Claude Cowork preview extends its AI coding assistant
to non-developers by granting folder-level read/write access via chat
interfaces, simplifying document and file automation tasks.
Security teams should note the risks of prompt injection and unrestricted
deletion, and enforce strict access controls and monitoring.
Key Details
Next Steps
Read more at SiliconANGLE
Security researchers at Varonis have uncovered “Reprompt,” a novel attack that uses a malicious URL parameter to inject prompts into Microsoft Copilot Personal and exfiltrate user data in a single click.By chaining Parameter-to-Prompt injection, a double-request bypass, and dynamic follow-up queries, attackers can harvest session data undetected even after the Copilot window closes. Microsoft has since patched the vulnerability for Copilot Personal, with enterprise Microsoft 365 Copilot customers unaffected.
Key Details
Next Steps
Read more at SecurityWeek, CybersecurityNews, BleepingComputer, TheHackerNews, Varonis
Everest ransomware operators allege they exfiltrated roughly 900 GB of internal data from Nissan Motor Co., publishing proof-of-compromise samples and a directory structure on their dark-web leak site. The incident underscores ongoing double-extortion tactics targeting supply chains and high-value industrial data.
Key Details
Next Steps
Read more at Cybersecurity News, Hackread
Microsoft, in partnership with Europol, German authorities and U.K. law enforcement, seized the infrastructure behind RedVDS—a subscription-based service selling disposable Windows RDP servers. This disrupts a cybercrime marketplace that facilitated over $40 million in U.S. fraud and compromised more than 191,000 accounts.
Key Details
Next Steps
Read more at CyberScoop, The Hacker News, The Record
Organizational AI agents often run under shared, high-privilege service accounts, allowing users to indirectly perform actions or access data beyond their individual permissions.Because system logs attribute activity to the agent’s identity rather than the initiating user, traditional IAM controls and audit trails fail to enforce least privilege or provide clear attribution.
Key Details
Next Steps
Read more at The Hacker News
In a CSO Online feature, Southeast Asian CISOs forecast that by 2026 attackers will increasingly target cloud and AI-powered infrastructure, exploit identity weaknesses, and leverage OT and supply-chain vulnerabilities. They urge organizations to tighten cloud and AI configurations, embed continuous identity verification, and operationalize resilience both as strategic defense and as a potential service offering.
Read more at CSO Online
Subscribe to receive this weekly cybersecurity news summary to your inbox every Monday.