Cyber phases of a hybrid war continue at a nuisance level. IcedID’s distribution vectors. Automating software supply-chain attacks. CISA offers power supply risk mitigation guidance.

Previous articleMedical Hub Directory Site 1.0 Local File Inclusion
Next articleRisky Business #660 — Lapsus$ arrests, latest on Okta incident