Not rendering correctly? View this email as a web page here.
SWNews_Dateline_060625

CrowdStrike and Microsoft Join Forces on Naming Threat Actors

In a rare and potentially industry-shaping move, CrowdStrike and Microsoft have announced a formal collaboration to deconflict cyber threat attribution. The two cybersecurity giants are aligning their threat intelligence efforts to reduce confusion and enhance consistency in naming and describing threat actors across the ecosystem. Their joint blog post frames this as a win for the broader community, aiming to eliminate the friction caused by different vendors assigning different names and motivations to the same malicious actors. Cyber threat attribution is notoriously murky. Different vendors have historically used unique naming conventions (e.g., CrowdStrike's "Fancy Bear" versus Microsoft's "STRONTIUM") for the same threat actors, leading to confusion among security teams, media, and even policymakers... Read more

developer_coder_analyst_shutterstock_1603390984_crop

Outsmarting Phishing: How AI Is Powering Safer Schools

Did you know that 98% of K-12 IT teams faced phishing attacks last year—even with security tools in place? So what's missing from the equation? Join our live webinar on June 10th as we unpack insights from a nationwide survey of K-12 security leaders and show how AI is transforming the fight against phishing. You'll learn practical strategies to better protect your organization. Register now!


Malicious Open-Source Packages Target Crypto Wallets, Telegram Tokens, Codebases

A new wave of malicious packages found across npm, PyPI, and RubyGems has again exposed how vulnerable the open-source software supply chain remains to exploitation. According to new research from Socket, threat actors are actively publishing clones of legitimate software packages that, once installed, execute harmful payloads ranging from cryptocurrency theft to full codebase deletion. Researchers uncovered... Read more


Luxury, Loyalty and Lateral Movement: Retail and Banking Attacks Surge

In a matter of days, three major cybersecurity incidents have hit the retail and financial services sectors, drawing renewed attention to supply chain vulnerabilities, credential-based attacks, and the increasing value of non-financial customer data. These breaches—affecting Cartier, Main Street Bank, and The North Face—underscore the rising threat landscape facing luxury and everyday consumer brands. French... Read more


'SIEM Sprawl' Makes It Tough for Security Teams to Detect What Matters

In its 2025 State of SIEM report, CardinalOps delivers a stark message to cybersecurity professionals: despite massive investments in Security Information and Event Management platforms, most organizations are blind to a majority of known MITRE ATT&CK techniques. And the situation isn't improving fast enough. With data pulled from real-world production SIEM environments, the report exposes persistent... Read more


Massive InfoStealer Malware Breach Exposes 184 Million Credentials

In a significant cybersecurity incident, security researcher Jeremiah Fowler has uncovered an unprotected database containing more than 184 million login credentials. The 47.42 GB trove included plaintext usernames and passwords linked to major platforms such as Google, Apple, Microsoft, Facebook, Instagram, Snapchat, and Roblox. Alarmingly, the database also held sensitive data from banking institutions... Read more


West VC_display ad_970x90

webcast_central_iconWebcast: Tipping the Scales Back in Our Favor
Thursday, June 12 — 1:00-2:00 p.m. EDT

The economics of cyberattacks heavily favor attackers. Malware kits and 0-day exploits now come with SLAs and support, mirroring legitimate software vendors. AI is accelerating this trend, making sophisticated attack techniques—once exclusive to nation-state actors—widely accessible. This session explores how AI-driven hunting techniques, machine... Register here

Quote_Marks_yellow_left

Quote of the Week

It is commendable that both industry stalwarts are coming together in a way that could benefit the cybersecurity community. If this goes well, it would be great to see others follow suit. The more standardized and common language we speak, the less the effort to understand for taking appropriate action.

— Sara Ricci, Risk and Resilience Leader, on CrowdStrike and Microsoft joining forces on naming threat actors

Quote_Marks_yellow

Growing Security Communities

We're proud to serve cybersecurity communities in 15 North American markets, hosting events that facilitate learning, collaboration, and lasting connections. Registration is open for our upcoming virtual conference for the Pacific, Mountain, and Central regions, as well as live events covering the topics of Critical Infrastructure and AI in Cybersecurity. See our Events schedule, mark your calendar, and register today!

Our Mission: Connecting, informing, and developing leaders in cybersecurity