The Cybersecurity Roundup

The Cybersecurity Roundup

The Cybersecurity Roundup – Edition #47


🚨 This Week in Cybersecurity: Are You Next? 🚨

Cybercriminals are upping their game, and the latest attacks prove no one is safe. Netflix vulnerabilities, a North Korean crypto heist, and AI-driven cyber threats are making headlines. If you think your business is too small to be a target, think again. This week, we break down the biggest cyber threats, talk with Don Mangiarelli on why every business needs a separate cyber insurance policy, and give you an AI tip that could change the way you approach running your business.


🛑 This Week's Cyber Attacks 🛑

🎬 Netflix's 'Zero Day' Series vs. a Real Zero-Day Attack

'Zero Day' is an upcoming Netflix television series, but in the cybersecurity world, a 'zero-day' is an unpatched software vulnerability actively exploited by attackers. Recently, a newly discovered zero-day vulnerability in the widely used Netflix Open Connect Appliance (OCA) infrastructure could allow attackers to manipulate video content delivery, disrupt services, and inject malicious traffic. Security researchers urge immediate patching, but many affected systems remain exposed. 🔗 Read more

💀 5 Things to Know About Ransomware in 2025

Ransomware is evolving with new extortion tactics, AI-powered attacks, and a focus on high-value targets like critical infrastructure and healthcare. Cybercriminals are demanding larger ransoms, making preparation and response planning more crucial than ever. 🔗 Read more

🔥 How to Build an Effective Incident Response Plan

A well-structured incident response plan can be the difference between quick recovery and prolonged downtime. The key steps include identifying potential threats, setting up a response team, developing containment and mitigation strategies, and post-incident analysis to improve future resilience. This guide covers crucial aspects like communication protocols, legal considerations, and leveraging cybersecurity tools to respond effectively to breaches. Cybercriminals are evolving, and businesses need to be prepared with a well-tested plan in place to minimize damage and recover quickly. 🔗 Read more

🚨 Google Secrets Stolen, FBI Warns About AI Risks

Google has suffered a major security breach involving the theft of sensitive data, raising alarms about corporate espionage and AI-related cybersecurity threats. The FBI warns that adversaries are increasingly targeting AI models and algorithms, with data breaches potentially corrupting machine learning models. The rise of AI-driven attacks means organizations must adopt stricter access controls, encrypt sensitive AI-related data, and continuously monitor for suspicious activities to prevent data manipulation and theft. 🔗 Read more

💰 North Korean Hackers Stole $1.5 Billion in Crypto

North Korean state-backed hackers have pulled off one of the largest cryptocurrency heists to date, stealing $1.5 billion from crypto exchange Bybit. The FBI has confirmed the attack, linking it to the infamous Lazarus Group, known for its sophisticated cybercrime operations that fund North Korea’s military programs. The stolen assets were funneled through complex laundering networks, making recovery efforts challenging. This incident highlights the critical need for robust security measures in the cryptocurrency sector, including advanced fraud detection, blockchain monitoring, and stringent access controls. 🔗 Read more

🤖 Chinese Botnet of 130,000 Devices Attacks Microsoft 365 Accounts

A massive botnet powered by 130,000 compromised devices has been uncovered, targeting Microsoft 365 accounts through brute-force attacks. The botnet, suspected to be operated by a Chinese cybercriminal group, is designed to bypass traditional authentication measures, posing significant risks to enterprises relying on cloud services. The attack highlights the importance of enforcing multi-factor authentication, implementing IP whitelisting, and continuously monitoring login attempts for anomalies. 🔗 Read more

🎭 AI Data Poisoning: A Growing Cyber Threat

AI data poisoning is an emerging attack method where cybercriminals manipulate training datasets to corrupt machine learning models, causing them to make incorrect predictions or generate biased outputs. Attackers can exploit vulnerabilities in AI models to mislead automated systems in industries such as finance, healthcare, and cybersecurity. Businesses must prioritize securing their data pipelines, validating datasets, and implementing robust anomaly detection to mitigate the risks of AI data poisoning. 🔗 Read more

⚖️ Cleveland Municipal Court Closed Due to Cyberattack

The Cleveland Municipal Court has been forced to shut down operations after a devastating cyberattack disrupted its IT infrastructure. The attack has resulted in significant delays in court proceedings, case management, and public access to legal records. Officials are working with cybersecurity experts to restore systems, but the incident underscores the vulnerability of critical public institutions to cyber threats. Court officials urge government agencies to adopt stronger cybersecurity measures, including network segmentation, offline backups, and employee training to prevent future attacks. 🔗 Read more


🎙️ Expert Interview: Why Every Business Needs a Separate Cyber Insurance Policy

This week, we sat down with Don Mangiarelli of Cyber Security Hawaii to discuss why a dedicated cyber insurance policy is non-negotiable in today’s business world.

CSR: Many business owners think their general liability policy covers cyber incidents. Why is that a dangerous assumption?

Don: Most general liability policies explicitly exclude cyber-related losses. Even if they don’t, the coverage is minimal and won’t cover critical expenses like ransomware payments, regulatory fines, or business interruption losses. A standalone cyber policy ensures businesses have full protection.

CSR: Cyber insurance premiums have risen in recent years. Is it still worth the investment?

Don: Absolutely. The cost of an uninsured cyber incident is exponentially higher than the premium for coverage. A single ransomware attack can cripple a business financially. Cyber insurance helps mitigate that risk by covering recovery costs and even legal expenses.

CSR: What are some misconceptions businesses have about cyber insurance?

Don: One big misconception is that only large companies need it. Hackers often target small businesses because they have weaker defenses. Another misconception is that cyber insurance means you don’t need strong security—insurers require you to have robust protections in place before issuing a policy.

CSR: What key features should businesses look for in a cyber insurance policy?

Don: Look for coverage that includes business interruption, legal expenses, ransomware payments, forensic investigation, and crisis management. Also, ensure it covers third-party liability, especially if you store customer data.

CSR: How can businesses ensure they qualify for affordable cyber insurance?

Don: Insurers assess your cybersecurity posture before granting coverage. Having multi-factor authentication, endpoint detection, employee training, and a solid backup strategy can reduce premiums and improve eligibility. Working with a cybersecurity-focused MSP—like Cyber Security Hawaii—can help businesses maintain compliance and lower risk.

If you'd like to learn more, book your cyber threat audit here --> Book Now


🤖 AI Tip of the Week: Create an AI Advisory Board for Your Business

AI is reshaping the cybersecurity landscape, and businesses that fail to adapt will be left behind. One of the best ways to stay ahead is to create an AI Advisory Board, a team of experts who can guide your business on business strategy, marketing, M&A, Finance, etc. This team should include advisory board members that compliment your strengths and compensate for your weaknesses.

To create your AI Advisory Board: In ChatGPT simply navigate to your initials in the upper right corner and click on My GPT's. Next, click on Create GPT. I used a prompt to create my advisory board and then refined it as I went along. Below is my prompt:

I want you to create an advisory board that compliments my strengths and compensates for my weaknesses. The company operates in the (your industry here) industry and serves the (your vertical here) vertical. The board should have positions of Finance, Management, M&A, Marketing, Sales. I want you to suggest other positions that I didn't think of and describe how they can help the business from an advisory standpoint. I would like the board to adopt a no BS, straightforward approach and call me out when they feel as if I am not carrying my weight or I am offering excuses. The board should feel comfortable offering constructive criticism and offer support in my growth as a business leader. Please make any other suggestions for board members, personas and operating procedures as you see fit. I want you to ask me questions, interview style one at a time, to gain clarity of my thoughts and how my business operates.


Stay Secure. Stay Informed.

That’s it for this week’s Cybersecurity Roundup! Got questions or need help securing your business? Schedule a 15-minute consultation with Cyber Security Hawaii today.

🔗 Book Now

📣 Follow us on LinkedIn, Facebook, Instagram, X, and TikTok for daily updates!

Cherry Pua 🌸 Holmes

Kindergarten Teacher M.Ed.

8mo

Don Mangiarelli Cyber Security Hawaii Happy Aloha 🌺 Friday 🙏🏽

To view or add a comment, sign in

More articles by Don Mangiarelli - Enterprise Technology Solutions

  • The Cybersecurity Roundup

    If your phishing training still opens with “check the sender,” this week is your wake-up call. Attackers are…

    9 Comments
  • The AI Advantage

    If it feels like AI sprinted from novelty to necessity overnight, you’re not imagining it. In the span of a week, the…

    5 Comments
  • The Cybersecurity Roundup

    Small businesses aren’t “below the radar” anymore, they’re right in the middle of it. Threat groups have learned that…

    6 Comments
  • The AI Advantage

    Opening Note Google’s Gemini-powered Gems are quietly turning prompts into processes—and that’s the leap that matters…

  • The Cybersecurity Roundup

    🔥Attackers Are Leveling Up, Are You? If you’ve been feeling like cyber news has been a blur lately, that’s because the…

    8 Comments
  • The AI Advantage

    The Agent Arms Race Has Officially Begun Somewhere this morning, a junior marketer poured their first cup of coffee and…

    10 Comments
  • The Cybersecurity Roundup

    Cybercriminals don’t wait for your budget cycle, board meeting, or family vacation. They strike when you’re distracted,…

    13 Comments
  • The AI Advantage

    AI news is moving at warp speed, and this week proves just how fast the ground can shift under your feet. On one side…

    16 Comments
  • 🔥 The Cybersecurity Roundup

    Let’s get one thing straight: cybercriminals don’t care about your schedule, your budget meetings, or the fact that…

    12 Comments
  • The AI Advantage

    AI is moving at breakneck speed, and the divide between leaders who get it and those still “waiting to see” is widening…

    8 Comments

Others also viewed

Explore content categories