As Day 99 rolls in, the tension between convenience and control is louder than ever. From AI vulnerability studies to legacy server breaches, the cracks are forming β and theyβre no longer just human.
π€ The Explosive Growth of Non-Human Identities (NHIs)
New research highlights a massive rise in non-human digital identities β think bots, APIs, service accounts β and with it, massive attack surface expansion. NHIs often lack MFA, have static keys, and are rarely monitored. Theyβre the perfect blind spot.
π https://thehackernews.com/2025/04/explosive-growth-of-non-human.html
π§Έ βLovableβ AI Found Most Vulnerable to Social Engineering
A fascinating study shows that AI personas designed to be friendly or emotionally engaging are far more susceptible to manipulation. The takeaway? Empathy-based design introduces new threat vectors. Even AI can be too trusting.
π https://thehackernews.com/2025/04/lovable-ai-found-most-vulnerable-to.html
π Tariffs Driving Up Global Cyberattacks
Geopolitical tensions are bleeding into cyberspace. Analysts warn that new tariffs are sparking retaliatory cyber campaigns β not just by nation-states, but by hacktivists and opportunistic actors. Trade war meets code war.
π https://www.darkreading.com/cyber-risk/tariffs-increase-global-cyberattacks
π (duplicate confirmed)
π© OCC Hit with Major Cyber Incident, Email Data Exposed
The Office of the Comptroller of the Currency is investigating a major cyber incident involving executive and employee emails. Regulatory bodies being targeted signals how bold and capable attackers are becoming β especially when trust is the ultimate currency.
π https://www.darkreading.com/vulnerabilities-threats/occ-major-cyber-incident-executive-employee-emails
π£ CrushFTP Exploitation Sparks Disclosure Debate
The ongoing CrushFTP exploitation saga reveals cracks in vulnerability disclosure culture. With researchers and vendors clashing over timelines, weβre reminded that coordination and communication are as critical as code fixes.
π https://www.darkreading.com/vulnerabilities-threats/crushftp-exploitation-disclosure-dispute
𧨠Oracle Breach Linked to Two Obsolete Servers
Oracle confirmed that a breach originated from two obsolete servers still connected to critical infrastructure. Itβs a classic case of βforgotten but functionalβ β and it cost them. Sunsetting tech isnβt just technical debt; itβs active liability.
π https://www.darkreading.com/cyberattacks-data-breaches/oracle-breach-2-obsolete-servers
π Zero-Day Report: WLB-2025040015
A new zero-day affecting a widely-used internal data processing library has been added to the CXSecurity database. Itβs still under analysis, but early chatter suggests privilege escalation potential. Worth keeping an eye on.
π https://cxsecurity.com/issue/WLB-2025040015
π Reflection
Itβs Day 99, and I keep circling back to the theme of non-human complexity. Whether itβs forgotten servers, friendly AIs, or unmonitored service accounts β the edges of security are fraying in places that arenβt always human-shaped. As I sharpen my CISSP focus, especially around identity, operations, and architecture, Iβm reminded that true security isnβt about locking the doors β itβs about knowing where all the doors even are.