Philippine AML Council launches casino probe amid flood project corruption scandal | AGB

Philippine AML Council launches casino probe amid flood project corruption scandal | AGB Summary The Philippine Anti‑Money Laundering Council (AMLC) has opened an investigation into casino transactions after reports that former Department of Public Works and Highways (DPWH) engineers allegedly channelled more than PHP1 billion through 13 casinos while overseeing dubious flood control projects in […]

Read More →

Blast Radius of Salesloft Drift Attacks Remains Unclear

Blast Radius of Salesloft Drift Attacks Remains Unclear Summary Between 8–18 August, threat actor UNC6395 exploited Salesloft’s Drift by stealing OAuth and refresh tokens from its Salesforce integration. The stolen tokens enabled lateral movement into customer Salesforce instances and resulted in numerous downstream disclosures from organisations such as Zscaler, Palo Alto Networks, Cloudflare, Proofpoint and […]

Read More →

Czech Warning Highlights China Stealing User Data

Czech Warning Highlights China Stealing User Data Summary The Czech Republic’s National Cyber and Information Security Agency (NÚKIB) issued a warning about products and services that transfer system and user data to the People’s Republic of China or are remotely administered from there. The advisory highlights risks that data routed to Chinese territories or entities […]

Read More →

Phishing Empire Runs Undetected on Google, Cloudflare

Phishing Empire Runs Undetected on Google, Cloudflare Summary Researchers at Deep Specter Research uncovered a multi-year, industrial-scale phishing-as-a-service (PhaaS) operation that ran largely unnoticed on public cloud infrastructure, primarily Google Cloud and Cloudflare. The campaign abused expired, high-trust domains and used cloaking techniques to present cloned, brand-authentic pages to search engines while serving malicious or […]

Read More →

ISC2 Aims to Bridge DFIR Skills Gap With New Certificate

ISC2 Aims to Bridge DFIR Skills Gap With New Certificate Summary ISC2 has launched the Threat Handling Foundations Certificate — a four-course programme intended to tighten digital forensics and incident response (DFIR) capability across organisations. The offering delivers hands-on training on building an effective DFIR programme, fundamentals of digital forensics, incident management and network threat […]

Read More →

Chinese Hackers Game Google to Boost Gambling Sites

Chinese Hackers Game Google to Boost Gambling Sites Summary Acybercrime operation ESET calls “GhostRedirector” has been compromising Windows web servers to install malware and a malicious native IIS module named Gamshen that injects backlinks when search-engine crawlers (like Googlebot) visit compromised sites. The campaign — active since at least August 2024 — has hit dozens […]

Read More →

Why Great CMOs Act Like Orchestrators, Not Megaphones

Why Great CMOs Act Like Orchestrators, Not Megaphones Summary The article argues that modern marketing is no longer a peripheral function but the central glue that aligns product, sales and strategy. Great CMOs act as orchestrators — they embed marketing early in product conversations, influence without formal authority, coordinate cross-functional work, and design systems that […]

Read More →