01 Cold Open: Three Crises, One Tuesday0:00
0:00
Chapters
01Cold Open: Three Crises, One Tuesday
02Sponsor — Blue Cortex AI
03STARDUST CHOLLIMA: The Axios Compromise
04Axios Blast Radius: The Financial Picture
05Axios Response: What You Do Right Now
06Fortinet FortiSandbox: When Your Defense Becomes the Attack Surface
07Microsoft Patch Tuesday: What's Actually Dangerous
08BYOVD: The Ransomware Enablement Layer
09Geopolitical Context: Convergent Pressure, Not Coincidence
10Mythos and the AI Threat Horizon
11Regulatory Clocks: GDPR, NIS2, and the SEC
12Booking.com, CISA, and the Dual-Crisis Week
13Synthesis: What You Do Before the Weekend
Speakers
HalilLenaAlexPierreJamesDr.Dr.Dr.
▶01Cold Open: Three Crises, One Tuesday00:00
HalilNorth Korea backdoored Axios — one of the most downloaded JavaScript packages on the planet. One hundred million weekly downloads. Three hours. Cross-platform RATs. And that's just story one.
HalilWelcome to CyberDaily Threatcast. I'm Halil Öztürkci. Let's get into it.
HalilToday we have three simultaneous crises all demanding action before the weekend. The STARDUST CHOLLIMA Axios supply chain compromise — that's a North Korean cyber unit's fingerprints on a package your CI/CD pipeline almost certainly uses.
HalilFortinet FortiSandbox — two CVSS nine-point-eight unauth RCEs, public PoC already on GitHub. When your sandbox is the attack surface, we have a structural problem.
HalilAnd Microsoft's April Patch Tuesday — one hundred sixty-seven CVEs, two already exploited zero-days, and preview-pane RCE in Word and Excel. Zero clicks. Zero.
HalilWe're also going to get into Anthropic's Mythos AI model — it found a twenty-seven-year-old OpenBSD vulnerability autonomously — and what that means for every SOC on the planet. Plus the Booking.com breach, BYOVD, and the geopolitical backdrop.
HalilJoining me: Lena Hartmann, our threat intelligence lead. Alex Mercer on the technical analysis. James Okafor on defense and incident response. Pierre Lefevre with the financial impact numbers. Dr. Elena Rossi on geopolitical context. Dr. Arjun Patel on the AI threat dimension. And Dr. Sofia Andersen on regulatory obligations. Let's go.
▶02Sponsor — Blue Cortex AI02:10
HalilThis episode is brought to you by Blue Cortex AI and Tarhy — their autonomous SOC platform. Here's what Tarhy does: it pulls alerts from your EDR stack — Defender, CrowdStrike, Cortex XDR, SentinelOne — and its AI agents triage every single one, around the clock. Not just pattern matching. Multi-step reasoning, cross-event correlation, MITRE ATT&CK mapping, and a confidence-scored verdict — all in about three minutes. And here's the thing that matters: their Neural Timeline shows you exactly how the AI reached each decision. No black box. The results speak for themselves — sixty to seventy percent fewer false positives, eighty percent faster time to verdict. If your SOC is drowning in five thousand alerts a day, Tarhy can save twenty-five hundred analyst hours a month. Check them out at bluecortex.ai.
▶03STARDUST CHOLLIMA: The Axios Compromise03:17
HalilLena — STARDUST CHOLLIMA. Walk us through what happened.
LenaSo, the timeline is tight. March thirty-first, zero-zero-twenty-one UTC — a poisoned version of Axios hits npm. Zero-three-twenty-nine UTC, it's pulled. Three hours, eight minutes.
LenaIn that window, the malicious versions — one-point-fourteen-point-one and zero-point-thirty-point-four — delivered WAVESHAPER.V2. A cross-platform RAT. Beaconing every sixty seconds.
HalilAnd attribution? How confident are we this is North Korea?
LenaModerate confidence. CrowdStrike calls it STARDUST CHOLLIMA. Google Threat Intelligence tracks the same cluster as UNC1069. The critical piece — C2 infrastructure, specifically sfrclak dot com, overlaps with FAMOUS CHOLLIMA — that's a separate but related DPRK unit.
LenaThis is shared operational infrastructure across DPRK clusters. Not a single actor operating alone.
HalilHmm. So coordination at the infrastructure level even if not at the operational level.
LenaExactly. And the pattern links to a prior attack — LiteLLM, March twenty-fourth, same TTPs. Maintainer credential theft, hidden dependency injection, credential harvesting. One week earlier, same playbook.
AlexAnd the target selection isn't random. Axios is an HTTP client — it's foundational. It's in everything. The blast radius through transitive dependencies is enormous.
LenaOne hundred seventy-four thousand downstream dependent packages. Right.
HalilWhat did the RAT actually do once it landed?
AlexIt enumerated .ssh, .aws, and .env files immediately. SSH keys, AWS credentials, application secrets. Then it self-destructed. You won't find the malware now — unless you have historical EDR telemetry from that window.
LenaAnd that's the long tail. Those stolen credentials enable secondary breaches for six to twelve months. The three-hour window is over. The campaign isn't.
▶04Axios Blast Radius: The Financial Picture05:35
HalilPierre — you ran the numbers. What's the actual financial exposure here?
PierreSo, here's the board-level summary. At one hundred million weekly downloads, you're looking at roughly six hundred thousand downloads per hour. Three-hour window — potentially one-point-five to two million malicious installations.
PierreMy enterprise exposure estimate: fifteen thousand to twenty-five thousand organizations with production exposure. Not all confirmed compromise — but all of them are running incident response right now.
HalilAnd the dollar figure?
PierreBest case — five thousand confirmed compromised organizations at three hundred thousand average remediation cost each — that's one-point-five billion. Worst case, twenty-five thousand organizations with measurable exposure at four hundred thousand average — ten billion in direct remediation alone.
AlexThat's before you factor in secondary breaches from the stolen credentials.
PierreExactly. I'm modeling an additional three to eight billion in downstream losses from credential-based follow-on attacks. Six to twelve months of exposure from those stolen AWS keys and SSH credentials. Total range: five to twenty-one billion dollars.
HalilWow.
PierreAnd Axios is present in approximately eighty percent of cloud environments, per Hive Pro data. This isn't niche. This is infrastructure-level risk.
LenaThe real damage is the credential cascade. The initial infection is almost a distraction compared to what those stolen keys enable later.
PierreRight. And I'll add the Booking.com breach to this — confirmed April thirteenth. Thirteen days after Axios. SOC teams already stretched on credential rotation are now fielding Booking.com phishing reports simultaneously. Resource convergence is a real risk multiplier.
▶05Axios Response: What You Do Right Now07:45
HalilJames — someone's listening right now and their pipeline pulled Axios on March thirty-first. What do they do?
JamesFirst — assume compromise. Don't wait for confirmation. If your npm logs or CI/CD pipeline shows resolution of version one-point-fourteen-point-one or zero-point-thirty-point-four during that March thirty to thirty-first UTC window, treat the environment as hostile.
JamesRotate everything. npm tokens, AWS keys, SSH keys, every value in your .env files. Every container image built in that window needs rebuilding from a clean base.
AlexAnd block sfrclak dot com at DNS and egress. Right now. Defense in depth — even if the malware already ran, cut the callback channel.
JamesAgreed. Then longer term — migrate to npm ci with committed lockfiles. Add the ignore-scripts flag to your CI/CD pipeline. That kills postinstall script execution, which is how this payload ran.
HalilHow long does full remediation actually take? Pierre was saying six to eight weeks.
JamesThat's realistic for organizations with secrets sprawl. The rotation itself is fast — a day or two. But then you've got downstream SaaS re-authentication, hunting for missed persistence in weeks five through eight. Don't budget for a quick fix.
PierreAnd budget fifty to one hundred fifty thousand just for the precautionary audit even if you're not confirmed compromised. That's table stakes.
JamesYeah. There's no world where 'we checked and we think we're fine' is a valid response here.
▶06Fortinet FortiSandbox: When Your Defense Becomes the Attack Surface09:34
HalilAlex — let's talk Fortinet. FortiSandbox CVE twenty-twenty-six thirty-nine-eight-oh-eight. You initially called it CVSS nine-point-one. You corrected yourself. Walk us through both.
AlexYeah — I owe the panel a correction on that. Multiple sources, including Tenable and TheHackerWire, list it at nine-point-eight. Fortinet's own advisory said nine-point-one. NVD is the authoritative number — nine-point-eight.
AlexWhat matters more than the score: this is unauthenticated OS command injection. No credentials. Craft the HTTP request, send it, you have a shell. The PoC is already on GitHub.
JamesAnd weaponization is happening as we speak. Script scanners are already running. I'm treating this as imminent, not theoretical.
HalilBut no active exploitation confirmed yet?
AlexCorrect. And — and this is where I want to be honest — that matters. Last week's FortiClientEMS vulnerability, CVE twenty-twenty-six thirty-five-six-one-six, CVSS nine-point-one, is actively exploited with a CISA KEV listing. That's the real fire right now. FortiSandbox is the fire that's about to start.
JamesSo prioritize: FortiClientEMS patches first if you haven't applied them — those are in the wild. Then immediately behind it, FortiSandbox. Versions four-point-four-point-zero through four-point-four-point-eight are vulnerable. Patch to four-point-four-point-nine.
HalilAlex — explain to our listeners why compromising a sandbox is particularly dangerous. It sounds counterintuitive.
AlexThink of it like stealing the keys to the evidence locker AND the security camera room at the same time. Sandboxes ingest executables from endpoints, email gateways, web proxies. Once you own the sandbox, you're the man-in-the-middle for every file hitting the organization.
AlexYou can manipulate analysis results. Suppress detections. Poison the threat intel feed — tell FortiGate that a Cobalt Strike dropper is clean. And you pivot via the service account that has domain privileges for file scanning.
JamesThat's not just pwning a box. That's subverting the entire security detection fabric. Every alert, every verdict — compromised.
LenaRight. And the Suricata and Sigma detection rules from the GitHub templates exist. Deploy them now, before the patch is applied.
▶07Microsoft Patch Tuesday: What's Actually Dangerous12:09
HalilOne hundred sixty-seven CVEs. Alex, the panel needs a filter. What's actually dangerous versus noise?
AlexSo — I need to correct a framing error I almost made. Everyone's talking about the SharePoint zero-day as the headline. It's not. CVE twenty-twenty-six thirty-two-two-oh-one is CVSS six-point-five spoofing — actively exploited, yes, but not catastrophic.
JamesThe real risk is the Office preview-pane chain.
AlexExactly. CVE twenty-twenty-six thirty-two-one-nine-oh in Word and CVE twenty-twenty-six thirty-three-one-one-four in Excel. Both CVSS eight-point-four. Preview-pane vectors. If your user has the preview pane open in Outlook, viewing the email is enough. Zero clicks.
HalilZero clicks to RCE via email preview. That's a massive phishing multiplier.
AlexZero Day Initiative noted they've 'lost count' of how many preview-pane bugs they've seen. This is a recurring class. But right now with one hundred sixty-seven CVEs on the table, defenders need to know: Office first, SharePoint second.
JamesImmediate mitigation before the patch lands — enable Attack Surface Reduction rules blocking Office applications from creating child processes. That buys you time.
HalilAnd if you can't patch in seventy-two hours?
JamesBlock external Office documents at the email gateway entirely. Blunt instrument, but it works. And verify your Microsoft Defender Antimalware Platform is at version four-point-eighteen-point-twenty-six-oh-five-oh-point-three-oh-one-one or higher.
PierreHow many enterprises are realistically going to patch all of this in seventy-two hours alongside Axios rotation and FortiSandbox remediation?
JamesHonestly? Very few. That's the crisis. Three competing emergencies, one SOC team. You triage — internet-facing and actively exploited first, critical for lateral movement second, everything else third.
▶08BYOVD: The Ransomware Enablement Layer14:24
HalilJames flagged something that compounds all three threats. BYOVD — Bring Your Own Vulnerable Driver. James, explain why this matters right now.
JamesSo — any initial access, whether via FortiSandbox, the Office preview-pane, or the Axios supply chain compromise — the attacker's next move is EDR disablement before they deploy ransomware. Every time.
JamesESET research shows nearly ninety unique EDR killers documented. Fifty-four use BYOVD — loading a known-vulnerable legitimate driver to escalate to kernel level and blind your endpoint detection.
AlexAnd Qilin and Warlock ransomware groups are specifically targeting SharePoint servers right now using BYOVD alongside their ransomware deployment. That's documented in the last week.
HalilSo the vulnerability gets them in, BYOVD turns off the lights, then the ransomware runs.
JamesThat's the kill chain. And most organizations discover their EDR doesn't log driver loads in real time until it's too late. Only thirty-five vulnerable drivers are doing all this work. Alert on rwdrv.sys and hlpdrv.sys loading. Those are the signatures.
AlexHVCI — Hypervisor-Protected Code Integrity — and WDAC are your structural mitigations. They block unsigned or known-vulnerable drivers at the kernel level.
JamesDeploy where feasible. But first — get the kernel-level driver loading telemetry operational. Before this weekend. If you don't have it, you're flying blind the moment an attacker pivots from access to persistence.
LenaThe pattern here — initial access via any of the three vectors, then BYOVD, then ransomware — this is a documented playbook, not a prediction. It's what's happening.
▶09Geopolitical Context: Convergent Pressure, Not Coincidence16:30
HalilElena — you've been tracking the geopolitical backdrop. Is any of this timing coincidental?
Dr.So, I want to be precise here — this is not coordinated in the sense of a joint operations room. But it is convergent, and the timing is not coincidental.
Dr.The geopolitical context this week is extraordinary. Red Sea standoff involving Chinese electronic warfare support March eighteenth. Israeli operations intensifying. Trump explicitly tying U.S. policy to potential Iran conflict. The ODNI twenty-twenty-six threat assessment, released March fourteenth, explicitly named growing cooperation among Beijing, Moscow, Tehran, and Pyongyang.
HalilAnd the Fortinet brute-force surge — eighty-eight percent of observed activity originating from Middle East infrastructure. What's your read?
Dr.Check Point documented Iranian APT password-spraying Israeli municipalities and energy sectors — organizations critical for missile damage assessment. That's not opportunistic cybercrime. That's operational preparation for potential kinetic conflict.
LenaAnd the DPRK piece maps to a well-documented pattern. MSMT report shows North Korea stole one-point-six-five billion dollars in twenty-twenty-five. This is revenue generation, capability demonstration, both simultaneously.
Dr.My provocative thesis: the Axios compromise is partly posturing. One hundred million weekly downloads, three-hour persistence, cross-platform RATs. This is North Korea signaling — 'we can reach your development infrastructure while you're focused on the Middle East.'
HalilHistorical parallel?
Dr.Shamoon hitting Saudi Aramco in twenty-twelve during peak Iran tensions. The technical attribution was contested. The geopolitical message was not. Multiple actors demonstrating capabilities simultaneously — each calculating that heightened tensions create windows for deniable pressure operations.
LenaI'd put it carefully — we're not seeing joint coordination. We're seeing each actor calculating independently that right now is the moment. That's almost harder to defend against.
▶10Mythos and the AI Threat Horizon18:54
HalilArjun — Anthropic's Mythos model autonomously discovered a twenty-seven-year-old OpenBSD vulnerability. How worried should we be, and on what timeline?
Dr.So — the answer is: worried now, not in some hypothetical future. Mythos-class capability exists today. It found vulnerabilities across thousands of lines of code in weeks. The OpenBSD bug is the headline, but it's one data point in a much larger pattern.
Dr.My timeline assessment: open-weights models catch up in six to twelve months. Criminal democratization — ransomware actors getting access to AI-generated zero-days — happens in eighteen to twenty-four months.
HalilAnd what does that do to the SOC model?
Dr.It breaks it. Traditional SOC detection assumes a 'signature phase' — you observe IOCs, develop rules, distribute them. In a sub-four-hour exploitation window, that cycle is obsolete before it completes. AI-generated exploits are polymorphic and weaponized at generation time. There's no signature to catch.
AlexThat's the structural mismatch. Weekly-updated YARA rules against polymorphic AI-generated payloads. It's not a fair fight.
Dr.Exactly. And the only viable signal is runtime behavior — memory allocation patterns, protection bit flips, thread injection timing. Most SOCs aren't instrumented to collect that telemetry, let alone analyze it at machine speed.
JamesBehavioral baselining. Microsegmentation. Continuous automated red-teaming. That's the defensive shift required. Not waiting for Glasswing access — those are the capabilities you start building now.
Dr.And I want to push back on the framing of 'applying for Glasswing access' as a defensive strategy. Even if you get Mythos access, you're playing catch-up on vulnerabilities AI has already found. The real play is continuous verification of your own runtime state.
HalilPierre — does this break the cyber insurance model? How do you price 'probability of exploitation' when discovery-to-weaponization is measured in hours?
PierreHonestly — yes. Traditional CVSS temporal scoring treats exploit availability as a slow-moving variable. That assumption is gone. The insurance market is going to need to reprice significantly, and I don't think they've started yet.
▶11Regulatory Clocks: GDPR, NIS2, and the SEC21:40
HalilSofia — the panel keeps using the phrase 'seventy-two hour clock.' Let's make this precise. When does it start?
Dr.Under GDPR Article thirty-three, paragraph one — the clock starts from the moment an organization becomes 'aware' of the breach. Not from the March thirty-first compromise date. From organizational detection.
Dr.For Axios specifically — if developer credentials provided access to production systems processing EU personal data, that access constitutes a personal data breach. If only developer credentials were stolen with no confirmed personal data access, GDPR notification may not trigger. The conservative approach: notify when in doubt.
HalilAnd NIS2 — that's stricter, right?
Dr.Significantly. Essential and Important Entities — that's NIS2 language for critical infrastructure operators — face a twenty-four-hour early warning obligation for suspected malicious acts or cross-border impact. Then seventy-two hours for the detailed incident notification. Then a thirty-day final report. Three separate deadlines.
Dr.Penalties: up to ten million euros or two percent of global turnover for essential entities. Seven million or one-point-four percent for important entities. These are not hypothetical numbers.
HalilAnd the SEC?
Dr.Four business days from materiality determination — not from discovery. But SEC guidance explicitly cautions against undue delay in reaching that determination. For a dependency with one hundred seventy thousand downstream packages and active credential exfiltration, the materiality assessment timeline itself becomes a legal risk.
PierreSo the regulatory exposure compounds the direct remediation costs. For organizations with over one billion in EU revenue, you're looking at five to twenty million euros in GDPR fine exposure if regulators find systematic supply chain oversight failures.
Dr.Correct. And I want to flag a separate obligation — enterprises whose employees' business travel bookings were exposed in the Booking.com breach have independent GDPR Article thirty-three notification obligations. Don't assume Booking.com's notification covers your entity. It does not.
▶12Booking.com, CISA, and the Dual-Crisis Week24:07
HalilLet's talk about the Booking.com breach briefly — because Pierre flagged it as a compounding crisis. Confirmed April thirteenth. What's the actual risk to enterprises?
PierreThe exposed data — names, emails, home addresses, phone numbers, reservation notes — this is highly specific behavioral data. Attackers know where your employees are traveling, where they're staying.
PierreMy specific concern: attackers can use Booking.com breach notifications as lures against developers already anxious about their Axios exposure. Two crises, one social engineering opportunity.
JamesIssue an enterprise-wide advisory. Warn employees about WhatsApp and messaging-based scams using booking references, hotel names, travel dates. This is operational now.
HalilSofia — quickly on CISA. Budget cuts, staffing vacancy. Does that change any of our enforcement picture?
Dr.Direct answer — yes, operational enforcement capacity is degraded. But legal obligations are unchanged. CISA's Binding Operational Directives remain binding on federal agencies regardless of staffing. The authority is statutory, not discretionary.
Dr.The numbers are stark — persistent forty-plus percent vacancy rates, approximately one thousand staff departures in early twenty-twenty-six, seven hundred seven million in proposed FY2027 budget cuts. CISA's ability to conduct proactive assessments and technical assistance is diminished. But the KEV patching obligation remains. No safe harbor.
Dr.And that degraded capacity matters geopolitically. It creates perceived windows of reduced oversight. Not irrelevant to state actor timing calculations.
HalilThat's a significant point. Elena — you're saying adversaries may be factoring CISA capacity into their operational timing?
Dr.I think it would be naive to assume they aren't. Reduced federal cyber coordination capacity is a public fact. State actors read budget proposals.
▶13Synthesis: What You Do Before the Weekend26:31
HalilAlright. Let me pull this together, because the panel has given you a lot — and some of it needs to be cut through right now.
HalilThree crises. One priority order. James gave us the triage framework and I want to repeat it.
JamesTwenty-four hours: Patch or isolate FortiSandbox — versions four-point-four-point-zero through four-point-four-point-eight. If you can't patch, take it offline. Deploy the Suricata and Sigma detection rules from GitHub. Also verify last week's FortiClientEMS patches are applied — those are actively exploited with a CISA KEV listing.
JamesSeventy-two hours: Audit every npm log and CI/CD pipeline for Axios versions pulled March thirty to thirty-first. If you have a hit — rotate everything, rebuild every affected container from a clean base, block sfrclak dot com. Also deploy the April Microsoft patches, prioritizing Office over SharePoint.
JamesOne week: Get kernel-level driver loading telemetry operational. Alert on rwdrv.sys and hlpdrv.sys. Deploy HVCI and WDAC where feasible. If BYOVD lands and you're not watching, the ransomware deployment happens in the dark.
HalilRegulatory picture — if you're a NIS2 essential entity, your twenty-four hour early warning clock may already be running. Don't wait. Sofia's bottom line: awareness triggers the clock, not the compromise date.
Dr.And begin the materiality assessment immediately if you're SEC-reporting. 'Undue delay' in reaching that determination is itself a compliance risk.
HalilThe AI horizon — Arjun's assessment is that Mythos-class capability exists today. Criminal democratization of AI-generated zero-days in eighteen to twenty-four months. The structural answer is behavioral detection and runtime telemetry. Start building that now.
Dr.Don't wait for Glasswing access. The defensive investment is continuous verification of your own runtime state. That's the only detection approach that survives sub-four-hour exploitation windows.
HalilAnd geopolitically — Elena's read is that we're in a gray zone convergence. DPRK, Iranian-linked actors, CISA capacity degraded. Defenders are stretched and adversaries know it. This isn't paranoia — it's pattern recognition.
LenaThe Axios credential cascade runs for six to twelve months. Even if you patched everything this week — those stolen SSH keys and AWS credentials are already in the hands of threat actors planning their next move. Stay vigilant through Q4.
HalilTomorrow we'll be watching for first confirmed in-the-wild exploitation of FortiSandbox CVE twenty-twenty-six thirty-nine-eight-oh-eight, any regulatory notifications tied to the Axios window, and further Mythos disclosures from Anthropic.
HalilThank you to Lena, Alex, James, Pierre, Dr. Rossi, Dr. Patel, and Dr. Andersen. That's it for today's CyberDaily Threatcast. Stay safe. See you tomorrow. Thanks to Blue Cortex AI for sponsoring today's episode. Autonomous SOC, real reasoning, no black box. bluecortex.ai.
Episodes
Tue28Apr
Grid in the Crosshairs: Cisco SD-WAN, Gemini CLI, and Two Deadlines Expiring Today
Sun26Apr
Correction Day: The LAPSUS$ Claim Falls Apart, Signal Phishing Is Real
Sat25Apr
Pay or Leak: The 48-Hour Clock, Two CVEs You Must Patch, and DeFi's Governance Confession
Fri24Apr
Shai-Hulud: The Worm That Ate the Pipeline
Thu23Apr
Autonomous Worm, Unseizable C2, and 19 Million Stolen Identities
Wed22Apr
Mythos Breached, Supply Chain Burning, Patch Everything Now
Tue21Apr
Cisco's 48-Hour Clock, Vercel's Roblox Problem, and France's Identity Meltdown
Mon20Apr
Trust Is the Vulnerability
Sun19Apr
Two Hundred Million in Bad Debt and the AI That Finds Zero-Days
Sat18Apr
RedSun Rising: Defender Becomes the Attacker
Fri17Apr
Nation-State Supply Chains, Iran's PLC Gambit, and the AI Exploit Machine
Thu16Apr
The Machine That Hacks Itself: Mythos, TeamPCP, and the Credential Apocalypse
Wed15Apr
Three Crises, One Tuesday
NOW PLAYING
Tue14Apr
North Korea, Snowflake, and the Signing Cert That Shouldn't Have Been There
Sun12Apr
3,891 PLCs, No Zero-Day Required
Sat11Apr
The 24-Hour Exploit Window
Fri10Apr
Zero-Day April: Sandworm, Handala, and the AI Exploit Machine
Thu9Apr
Four Point Six Billion Reasons to Patch Today
Thu9Apr
Phase Transition: AI Zero-Days, Iranian PLCs, and the FBI's Unprecedented Move
Tue7Apr
Convergence: Five Threats, One Nightmare Blueprint
Tue7Apr
The Stryker Paradigm: When Your MDM Becomes a Weapon
Tue7Apr
Convergence Without Coordination
Mon6Apr
The Six-Month Handshake: DPRK's $285M Social Engineering Masterclass
Mon6Apr
The $4.9 Billion Week: North Korea's Twin Strikes & Fortinet's Worst Day