Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DDoS Attacks Up 358%: Early 2025 Breakdown with Omer Yoachimik

In this week’s episode, we talk about DDoS attacks and their sharp rise in recent months. We also start with a quick look at some Internet trends tied to the announcement of the new pope. To guide us through the world of distributed denial-of-service (DDoS) attacks, host João Tomé is joined by our DDoS expert, Omer Yoachimik.

What Is Pretexting? Definition and Examples

Pretexting is a fictional story threat actors use to trick you into giving them access to sensitive information. It is a popular scam that can happen online or in person, and it uses common phishing techniques to help threat actors achieve success in their pretexting scam. In this article, we cover: what is pretexting, how it works, examples of pretexting, and how to prevent it by subscribing to Internxt Drive and by increasing your cyberawareness online. Ready to learn more? Then keep reading!

Human-Directed Threats: The New Frontline in Cybersecurity

A constantly shifting threat landscape has given rise to a new cyberattack vector, driven by two powerful forces: the rapid migration of data to the cloud and the fundamental change in how employees access and interact with that data. Today’s workforce expects the freedom to work and access information from any device—especially mobile devices, which have become integral to their professional and personal lives.

What Is a Supply Chain Attack?

A supply chain attack does not start with your firewall. It starts with someone else’s. Instead of targeting your company directly, a cyber attacker looks for weak spots in your organization’s supply chain. That could be a trusted third-party vendor, a widely used software supplier, or even an outdated package from an open-source code repository. Once they find an opening, they exploit security vulnerabilities to gain access to your systems without ever going through the front door.

Safeguarding Against Subdomain Takeover

Subdomain takeovers are a growing threat in today’s cloud-first ecosystem. As organizations rely on third-party services, continuously launch digital assets, and manage sprawling DNS configurations, they often leave behind vulnerable subdomains ripe for exploitation. In this article, we explore subdomain takeovers, why they pose such a serious risk, and most importantly, how to prevent them before threat actors strike.

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6 million phished data records recaptured from the criminal underground over the last six months. Phishing attacks have been growing in scale and sophistication, and SpyCloud's research reveals that cybercriminals are increasingly targeting high-value identity data that can be used for follow-on attacks like ransomware, account takeover, and fraud.

What to Do if You Are Affected by a Retailer Cyberattack

In April and May 2025, several prominent UK retailers including Marks & Spencer (M&S), Co-op, and Harrods experienced significant cyberattacks. At the time of writing we have not had confirmation of these attacks but consider them to be a Ransomware attack. These incidents are disrupting services, compromising customer data, and highlight vulnerabilities in retail cybersecurity. This guide aims to help you as a consumer take the steps you can take to protect yourself.

RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)

On 5 May, 16:00 GMT+0, our automated malware analysis pipeline detected a suspicious package released, rand-user-agent@1.0.110. It detected unusual code in the package, and it wasn’t wrong. It detected signs of a supply chain attack against this legitimate package, which has about ~45.000 weekly downloads.

Scattered Spider and DragonForce: A Case Study in Human-Centric Cyber Threats

In April 2025, Marks & Spencer, the Co-op Group, and Harrods were all targeted by cyber-attacks that caused disruption across their services. Although attribution is still being confirmed, indicators strongly link these attacks to Scattered Spider, a group known for aggressive, human-centric tactics and high-profile breaches. This post is not an incident breakdown for each retailer.

Top 4 Cybersecurity Threats Facing Businesses Today

Keeping your business data safe is more important than ever. As more companies use technology and remote work grows, the risk of cybersecurity threats increases. No matter the size or small business can be a target. To stay safe, businesses need strong cybersecurity plans and must know what threats to watch out for. In this post, we'll look at the top cyber threats businesses face today and how to guard against them. Let's get started and learn how to protect your business from these risks.