icon Book Free Consultation
image

Description

“As cybersecurity leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.”  — Britney Hommertzheim

Britney is right, that's for sure. Cybersecurity has a culture, just like any other culture. This can only be done if companies and top executives know what's going on in the world. And it's our job to make you aware of this. So, what's been going on in the past month?

An attacker only needs to be able to send messages to a victim through Zoom chat over XMPP protocol. The end of the game. Yes, Zoom is what we're talking about. The most important parts of this month's report are how and why this happened, how it has changed things, and what can be done about it.

A group of cybercrooks made hundreds of rubber clones of fingerprints, whose images they copied along with name & Aadhar card from south of Haryana. This news has shocked all of us. How cybercrooks are exploiting others and vulnerable population.

Razor pay were unable to reconcile receipt of ? 7,38,36,192 against 831 transactions.Only to realise that a cyberfraudster is manupulating the authorisation process of payment gateway to authenticate 831 failed transaction. Razor pay attorney has filed the suit & police is looking for the fraudster. Razor pay is ISO 27001, SOC2, PCI DSS certified, yet, this happens. No one is safe oline, we can only harden the security layer.

These are the most important parts of this month's report. Aside from that, you should care about 23 other pieces of news. Another important story is that someone broke into Ferrari's subdomain to make fake NFTs. This month's news comes from many different fields. From the government, to health to airlines. We see that no one is safe online and that all industries are at risk.

To ensure that you get the most out of your read here, we've done all in our power to help you. Distribute this issue to anybody you think would benefit from it, whether they be coworkers, friends, or business partners. We wish you a safe and pleasurable month of online exploration.

I accept the Terms and Conditions

Latest Threatsploit

grid
  • Edition-82
  • June 05

Threatsploit Adversary Report June 2025

Every month, the Threatsploit Adversary Report delivers a curated overview of the latest global cyberattacks, vulnerabilities, and threat actor activities. We dive deep into real-world incidents that matter most to security teams and decision-makers across industries

grid
  • Edition-81
  • May 12

Threatsploit Adversary Report May 2025

This May, we bring you another edition of the Threatsploit Adversary Report, built with one goal in mind: to help you see what’s really happening beneath the surface. Behind every breach is a moment when something slipped through. Whether it’s a missed alert, a trusted vendor, or a tiny misstep in the cloud, every-thing changes in an instant

grid
  • Edition-80
  • April 11

Threatsploit Adversary Report April 2025

Cybercrime never sleeps, and neither do we. The April 2025. Threatsploit Adversary Report is here, breaking down the 30 most shocking cyberattacks that shook industries this month.

Image

Discover the Latest Cyber Threats - Stay Ahead of the Curve

captcha-img