Cybersecurity Funding Reached .5 Billion in 2024: Report
Summary: A report from Pinpoint Search Group reveals that cybersecurity firms raised $9.5 billion in 2024, despite a decrease in the number of funding rounds. The report highlights a shift towards late-stage funding, which accounted for a significant portion of the total raised amount.

Threat Actor: N/A | N/A Victim: N/A | N/A

Key Point :

Funding rounds decreased by 16%, from 346 to 304, but total raised amount increased by 9% year-over-year.…
Read More
Thousands Impacted by Casio Data Breach
Summary: Casio has concluded its investigation into a ransomware attack that compromised the personal information of thousands of employees and business partners. The breach was attributed to vulnerabilities in overseas offices and phishing emails that allowed unauthorized access to their network.

Threat Actor: Underground | Underground Victim: Casio | Casio

Key Point :

Approximately 6,500 employees’ personal information was compromised, including names, email addresses, and taxpayer IDs.…
Read More
Insider Threat: Tackling the Complex Challenges of the Enemy Within
Summary: The insider threat encompasses a range of malicious actions from employees, including espionage, fraud, and intellectual property theft, posing significant risks to national security and corporate integrity. Solutions to mitigate these threats involve both pre-employment background checks and ongoing monitoring of employee behavior and sentiment.…
Read More
Chrome 131, Firefox 134 Updates Patch High-Severity Vulnerabilities
Summary: Google and Mozilla have released security updates for their browsers, addressing several high-severity vulnerabilities, including critical type confusion flaws and memory safety bugs. Users are urged to update their browsers promptly to mitigate potential risks.

Threat Actor: Unknown | unknown Victim: Browser Users | browser users

Key Point :

Google’s Chrome 131 update fixes four security defects, including a high-severity type confusion flaw in the V8 JavaScript engine.…
Read More
First Android Update of 2025 Patches Critical Code Execution Vulnerabilities
Summary: Google has released the January 2025 Android security updates addressing 36 vulnerabilities, including five critical remote code execution bugs. The updates are divided into two parts, with the first patching various components and the second focusing on specific hardware vulnerabilities.

Threat Actor: Unknown | unknown Victim: Google Android Users | Google Android Users

Key Point :

Five critical vulnerabilities could lead to remote code execution on multiple Android versions.…
Read More
Veracode Targets Malicious Code Threats with Phylum Acquisition
Summary: Veracode has acquired key assets from Phylum to enhance its capabilities in detecting and mitigating malicious code in open-source libraries. This acquisition aims to strengthen Veracode’s software supply chain security amidst rising costs of supply chain attacks.

Threat Actor: Software Supply Chain Attackers | software supply chain attackers Victim: Software Supply Chain | software supply chain

Key Point :

Veracode’s acquisition of Phylum includes malicious package analysis and detection technology.…
Read More
Chinese Tech Companies Tencent, CATL and Others Protest US Listings as Army-Linked Companies
Summary: The U.S. Defense Department has added multiple Chinese companies, including Tencent, SenseTime, and CATL, to its list of companies linked to China’s military, prompting protests and legal actions from the affected firms. This designation restricts U.S. defense procurement from these companies starting June 2026, as part of broader efforts to limit technology sharing deemed a national security threat.…
Read More
Chinese Tech Companies Tencent, CATL and Others Protest US Listings as Army-Linked Companies
Summary: Former NSA director Rob Joyce has joined DataTribe as a venture partner to support early-stage cybersecurity startups. His extensive experience in cyber defense will enhance the strategic capabilities of DataTribe’s portfolio companies.Threat Actor: N/A | N/AVictim: N/A | N/A

Key Point :

Rob Joyce will help identify and grow startups focused on cybersecurity at DataTribe.…
Read More
Washington Attorney General Sues T-Mobile Over 2021 Data Breach
Summary: Washington State Attorney General Bob Ferguson has filed a lawsuit against T-Mobile over a significant data breach in 2021 that compromised the personal information of millions. The lawsuit claims T-Mobile failed to implement adequate security measures and misled customers about the breach’s severity.

Threat Actor: John Binns | John Binns Victim: T-Mobile | T-Mobile

Key Point :

The 2021 breach affected over 76.6 million individuals, including more than 2 million Washington residents.…
Read More
Chinese Tech Companies Tencent, CATL and Others Protest US Listings as Army-Linked Companies
Summary: Major hardware manufacturers MediaTek, HPE, and Dell have released advisories regarding critical vulnerabilities in their products, urging users to apply patches promptly. These vulnerabilities range from remote code execution to local privilege escalation and could have serious implications if exploited.

Threat Actor: Unknown | unknown Victim: MediaTek, HPE, Dell | MediaTek, HPE, Dell

Key Point :

MediaTek patched a critical vulnerability (CVE-2024-20154) in its modem component that could allow remote code execution via rogue base stations.…
Read More
Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents
Summary: Over the past decade, more than 2,000 ransomware attacks have targeted critical infrastructure organizations in the U.S. and beyond, according to the Critical Infrastructure Ransomware Attacks (CIRA) database maintained by Temple University.

Threat Actor: Various | ransomware attackers Victim: Various | critical infrastructure organizations

Key Point :

The CIRA database has documented over 2,000 ransomware attacks since 2013, with a significant increase in larger ransom demands.…
Read More
CISA: No Federal Agency Beyond Treasury Impacted by BeyondTrust Incident
Summary: The US cybersecurity agency CISA reported that the recent cybersecurity incident involving a BeyondTrust service primarily affected the Department of the Treasury, with no other federal agencies impacted. The attack, attributed to Chinese state-sponsored hackers, exploited a compromised API key, leading to unauthorized access to Treasury workstations and documents.…
Read More
China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks
Summary: The U.S. Treasury has sanctioned the Beijing-based cybersecurity firm Integrity Technology Group for its alleged involvement in hacking incidents targeting critical U.S. infrastructure, prompting a strong denial and condemnation from China. Chinese officials assert that the U.S. is misrepresenting the situation to defame China while also reporting cyberattacks on its own networks.…
Read More

Summary: The cybersecurity landscape of 2025 is expected to be shaped by evolving threats, particularly from human vulnerabilities, cryptocurrency exchanges, state-sponsored attacks, supply chain vulnerabilities, and the adoption of cybersecurity mesh architecture. Organizations must adapt their strategies to bolster defenses and enhance resilience against these emerging challenges.…
Read More

Summary: The increasing data collection by car manufacturers, exemplified by Tesla’s detailed tracking of a Cybertruck driver involved in an explosion, raises significant privacy concerns. Experts debate the balance between law enforcement needs and individual privacy rights as vehicles become more like data-collecting devices.

Threat Actor: Tesla | Tesla Victim: Matthew Livelsberger | Matthew Livelsberger

Key Point :

Tesla’s data collection proved crucial for law enforcement in tracking the driver’s movements after a Cybertruck explosion.…
Read More