Quorum Cyber Reveals New Cybercriminal Tactics in Mid-Year Global Cyber Risk Outlook Report

Posted in Commentary with tags on September 3, 2025 by itnerd

Quorum Cyber, a proactive, threat-led cybersecurity company founded to help organizations defend themselves in an increasingly hostile digital landscape, today released its Relentless Threats: 2025 Mid-Year Global Cyber Risk Outlook Report.

Compiled by Quorum Cyber’s Threat Intelligence team, with insights derived from its frontline engagements and strategic monitoring over the first half of the year, the report highlights the tracking of over 70 cybercriminal groups and Malware-as-a-Service (MaaS) offerings, unveiling sophisticated new tactics shaping the cyber threat landscape. It also includes a ransomware demand trend for Q1 2022 to Q1 2025 inclusive. 

What You’ll Learn from Quorum Cyber’s 2025 Mid-Year Global Cyber Risk Outlook Report:

  • Rising Ransomware Threats: The ransomware group Codefinger has begun exploiting legitimate Amazon Web Services (AWS) features to encrypt cloud storage, marking a troubling trend toward targeting cloud-native infrastructure
  • Emergence of New Stealware: Following law enforcement crackdowns, a new variant known as Acreed has emerged, highlighting the underground market’s resilience
  • State and Criminal Convergence: North Korea’s Moonstone Sleet exemplifies the growing convergence of state and criminal capabilities, utilizing a Russian-language  Ransomware-as-a-Service (RaaS) platform to target software companies
  • Quadruple Extortion Tactics: Groups like Qilin and DragonForce are innovating  extortion methods by incorporating services such as legal harassment, AI-driven  negotiation bots, and call centers, signaling the rise of ‘quadruple extortion’ in ransomware operations
  • Mature RaaS Ecosystem: The RaaS model has evolved towards greater maturity and scalability, adopting enterprise business strategies. A newly discovered whitelabel model allows cybercriminal affiliates to rebrand ransomware payloads,  customizing attacks for specific targets
  • Increased Ransom Demands: The report reveals a 53% rise in ransom demands from Q1 2022 to Q1 2025, varying across sectors based on financial size and threat actor behaviors
  • Actionable Recommendations: understand how to defend against evolving cyber threats, including ransomware and stealware.

2025 Mid-Year Intelligence Briefing

Quorum Cyber recently hosted a webinar to explain the key findings of the report and shared actionable advice so that organizations in any sector can counter the growing threats and minimize the risk of becoming the victim of a cyber-attack. You can watch Relentless Threats: 2025 Mid-Year Intelligence Briefing on-demand for free at any time.

Guest Post – From PowerShell to Payload: Darktrace’s Detection of a Novel Cryptomining Malware

Posted in Commentary with tags on September 3, 2025 by itnerd

  • Author: Keanna Grelicha, Cyber Analyst
  • Author: Tara Gould, Threat Research Lead
  • Summary: Cryptojacking attacks are rising as threat actors exploit hard-to-detect cryptomining malware. Learn how Darktrace detected and contained a cryptojacking attempt in its early stages using Autonomous Response, with expert analysis of the malware itself revealing insights into a novel cryptomining strain.
  • Blog Category: On the Case: Incident Analysis

What is Cryptojacking?

Cryptojacking remains one of the most persistent cyber threats in the digital age, showing no signs of slowing down. It involves the unauthorized use of a computer or device’s processing power to mine cryptocurrencies, often without the owner’s consent or knowledge, using cryptojacking scripts or cryptocurrency mining (cryptomining) malware [1]. Unlike other widespread attacks such as ransomware, which disrupt operations and block access to data, cryptomining malware steals and drains computing and energy resources for mining to reduce attacker’s personal costs and increase “profits” earned from mining [1]. The impact on targeted organizations can be significant, ranging from data privacy concerns and reduced productivity to higher energy bills.

As cryptocurrency continues to grow in popularity, as seen with the ongoing high valuation of the global cryptocurrency market capitalization (almost USD 4 trillion at time of writing), threat actors will continue to view cryptomining as a profitable venture [2]. As a result, illicit cryptominers are being used to steal processing power via supply chain attacks or browser injections, as seen in a recent cryptojacking campaign using JavaScript [3][4].

Therefore, security teams should maintain awareness of this ongoing threat, as what is often dismissed as a ‘compliance issue’ can escalate into more severe compromises and lead to prolonged exposure of critical resources.

While having a security team capable of detecting and analyzing hijacking attempts is essential, emerging threats in today’s landscape often demand more than manual intervention.

In July 2025, Darktrace detected and contained an attempted cryptojacking incident on the network of a customer in the retail and e-commerce industry, when a threat actor attempted to use a PowerShell script to download and run NBMiner directly in memory.

In addition to highlighting Darktrace’s successful detection of the malicious activity and the role of Autonomous Response in halting the attack, this blog will also include novel insights from Darktrace’s threat researchers on the cryptominer payload, showing how the attack chain was initiated through the execution of a PowerShell-based payload.

Darktrace’s Coverage of Cryptojacking via PowerShell

The initial compromise was detected on July 22, when Darktrace / NETWORK observed the use of a new PowerShell user agent during a connection to an external endpoint, indicating an attempt at remote code execution.

Specifically, the targeted desktop device established a connection to the rare endpoint, 45.141.87[.]195, over destination port 8000 using HTTP as the application-layer protocol. Within this connection, Darktrace observed the presence of a PowerShell script in the URI, specifically ‘/infect.ps1’.

Darktrace’s analysis of this endpoint (45.141.87[.]195[:]8000/infect.ps1) and the payload it downloaded indicated it was a dropper used to deliver an obfuscated AutoIt loader. This attribution was further supported by open-source intelligence (OSINT) reporting [5]. The loader likely then injected NBMiner into a legitimate process on the customer’s environment – the first documented case of NBMiner being dropped in this way.

Figure 1: Darktrace’s detection of a device making an HTTP connection with new PowerShell user agent, indicating PowerShell abuse for command-and-control (C2) communications.

Script files are often used by malicious actors for malware distribution. In cryptojacking attacks specifically, scripts are used to download and install cryptomining software, which then attempts to connect to cryptomining pools to begin mining operations [6].

Inside the Payload: Technical Analysis of the Malicious Script and Cryptomining Loader

To confidently establish that the malicious script file dropped an AutoIt loader used to deliver the NBMiner cryptominer, Darktrace’s threat researchers reverse engineered the payload. Analysis of the file ‘infect.ps1’ revealed further insights, ultimately linking it to the execution of a cryptominer loader.

Figure 2: Screenshot of the ‘infect.ps1’ PowerShell script observed in the attack.

The ‘infect.ps1’ script is a heavily obfuscated PowerShell script that contains multiple variables of Base64 and XOR encoded data. The first data blob is XOR’d with a value of 97, after decoding, the data is a binary and stored in APPDATA/local/knzbsrgw.exe. The binary is AutoIT.exe, the legitimate executable of the AutoIt programming language. The script also performs a check for the existence of the registry key HKCU:\\Software\LordNet.

The second data blob ($cylcejlrqbgejqryxpck) is written to APPDATA\rauuq, where it will later be read and XOR decoded. The third data blob ($tlswqbblxmmr)decodes to an obfuscated AutoIt script, which is written to %LOCALAPPDATA%\qmsxehehhnnwioojlyegmdssiswak. To ensure persistence, a shortcut file named xxyntxsmitwgruxuwqzypomkhxhml.lnk is created to run at startup.

Figure 3: Screenshot of second stage AutoIt script.

The observed AutoIt script is a process injection loader. It reads an encrypted binary from /rauuq in APPDATA, then XOR-decodes every byte with the key 47 to reconstruct the payload in memory. Next, it silently launches the legitimate Windows app ‘charmap.exe’ (Character Map) and obtains a handle with full access. It allocates executable and writable memory inside that process, writes the decrypted payload into the allocated region, and starts a new thread at that address. Finally, it closes the thread and process handles.

The binary that is injected into charmap.exe is 64-bit Windows binary. On launch, it takes a snapshot of running processes and specifically checks whether Task Manager is open. If Task Manager is detected, the binary kills sigverif.exe; otherwise, it proceeds. Once the condition is met, NBMiner is retrieved from a Chimera URL (https://api[.]chimera-hosting[.]zip/frfnhis/zdpaGgLMav/nbminer%5B.%5Dexe) and establishes persistence, ensuring that the process automatically restarts if terminated. When mining begins, it spawns a process with the arguments ‘-a kawpow -o asia.ravenminer.com:3838 -u R9KVhfjiqSuSVcpYw5G8VDayPkjSipbiMb.worker -i 60’ and hides the process window to evade detection.

Figure 4: Observed NBMiner arguments.

The program includes several evasion measures. It performs anti-sandboxing by sleeping to delay analysis and terminates sigverif.exe (File Signature Verification). It checks for installed antivirus products and continues only when Windows Defender is the sole protection. It also verifies whether the current user has administrative rights. If not, it attempts a User Account Control (UAC) bypass via Fodhelper to silently elevate and execute its payload without prompting the user. The binary creates a folder under %APPDATA%, drops rtworkq.dll extracted from its own embedded data, and copies ‘mfpmp.exe’ from System32 into that directory to side-load ‘rtworkq.dll’. It also looks for the registry key HKCU\Software\kap, creating it if it does not exist, and reads or sets a registry value it expects there.

Zooming Out: Darktrace Coverage of NBMiner

Darktrace’s analysis of the malicious PowerShell script provides clear evidence that the payload downloaded and executed the NBMiner cryptominer. Once executed, the infected device is expected to attempt connections to cryptomining endpoints (mining pools). Darktrace initially observed this on the targeted device once it started making DNS requests for a cryptominer endpoint, “gulf[.]moneroocean[.]stream” [7], one minute after the connection involving the malicious script.

Figure 5: Darktrace Advanced Search logs showcasing the affected device making a DNS request for a Monero mining endpoint.

Though DNS requests do not necessarily mean the device connected to a cryptominer-associated endpoint, Darktrace detected connections to the endpoint specified in the DNS Answer field: monerooceans[.]stream, 152.53.121[.]6. The attempted connections to this endpoint over port 10001 triggered several high-fidelity model alerts in Darktrace related to possible cryptomining mining activity. The IP address and destination port combination (152.53.121[.]6:10001) has also been linked to cryptomining activity by several OSINT security vendors [8][9].

Figure 6: Darktrace’s detection of a device establishing connections with the Monero Mining-associated endpoint, monerooceans[.]stream over port 10001.

Darktrace / NETWORK grouped together the observed indicators of compromise (IoCs) on the targeted device and triggered an additional Enhanced Monitoring model designed to identify activity indicative of the early stages of an attack. These high-fidelity models are continuously monitored and triaged by Darktrace’s SOC team as part of the Managed Threat Detection service, ensuring that subscribed customers are promptly notified of malicious activity as soon as it emerges.

Figure 7: Darktrace’s correlation of the initial PowerShell-related activity with the cryptomining endpoint, showcasing a pattern indicative of an initial attack chain.

Darktrace’s Cyber AI Analyst launched an autonomous investigation into the ongoing activity and was able to link the individual events of the attack, encompassing the initial connections involving the PowerShell script to the ultimate connections to the cryptomining endpoint, likely representing cryptomining activity. Rather than viewing these seemingly separate events in isolation, Cyber AI Analyst was able to see the bigger picture, providing comprehensive visibility over the attack.

Figure 8: Darktrace’s Cyber AI Analyst view illustrating the extent of the cryptojacking attack mapped against the Cyber Kill Chain.

Darktrace’s Autonomous Response

Fortunately, as this customer had Darktrace configured in Autonomous Response mode, Darktrace was able to take immediate action by preventing  the device from making outbund connections and blocking specific connections to suspicious endpoints, thereby containing the attack.

Figure 9: Darktrace’s Autonomous Response actions automatically triggered based on the anomalous connections observed to suspicious endpoints.

Specifically, these Autonomous Response actions prevented the outgoing communication within seconds of the device attempting to connect to the rare endpoints.

Figure 10: Darktrace’s Autonomous Response blocked connections to the mining-related endpoint within a second of the initial connection.

Additionally, the Darktrace SOC team was able to validate the effectiveness of the Autonomous Response actions by analyzing connections to 152.53.121[.]6 using the Advanced Search feature. Across more than 130 connection attempts, Darktrace’s SOC confirmed that all were aborted, meaning no connections were successfully established.

Figure 11: Advanced Search logs showing all attempted connections that were successfully prevented by Darktrace’s Autonomous Response capability.

Conclusion

Cryptojacking attacks will remain prevalent, as threat actors can scale their attacks to infect multiple devices and networks. What’s more, cryptomining incidents can often be difficult to detect and are even overlooked as low-severity compliance events, potentially leading to data privacy issues and significant energy bills caused by misused processing power.

Darktrace’s anomaly-based approach to threat detection identifies early indicators of targeted attacks without relying on prior knowledge or IoCs. By continuously learning each device’s unique pattern of life, Darktrace can detect subtle deviations that may signal a compromise.

In this case, the cryptojacking attack was quickly identified and mitigated during the early stages of malware and cryptomining activity. Darktrace’s Autonomous Response was able to swiftly contain the threat before it could advance further along the attack lifecycle, minimizing disruption and preventing the attack from potentially escalating into a more severe compromise.

Credit to Keanna Grelicha (Cyber Analyst) and Tara Gould (Threat Research Lead)

Appendices

Darktrace Model Detections

NETWORK Models:

  • Compromise / High Priority Crypto Currency Mining (Enhanced Monitoring Model)
  • Device / Initial Attack Chain Activity (Enhanced Monitoring Model)
  • Compromise / Suspicious HTTP and Anomalous Activity (Enhanced Monitoring Model)
  • Compromise / Monero Mining
  • Anomalous File / Script from Rare External Location
  • Device / New PowerShell User Agent
  • Anomalous Connection / New User Agent to IP Without Hostname
  • Anomalous Connection / Powershell to Rare External
  • Device / Suspicious Domain

Cyber AI Analyst Incident Events:

  • Detect \ Event \ Possible HTTP Command and Control
  • Detect \ Event \ Cryptocurrency Mining Activity

Autonomous Response Models:

  • Antigena / Network::Significant Anomaly::Antigena Alerts Over Time Block
  • Antigena / Network::External Threat::Antigena Suspicious Activity Block
  • Antigena / Network::Significant Anomaly::Antigena Enhanced Monitoring from Client Block
  • Antigena / Network::External Threat::Antigena Crypto Currency Mining Block
  • Antigena / Network::External Threat::Antigena File then New Outbound Block
  • Antigena / Network::External Threat::Antigena Suspicious File Block
  • Antigena / Network::Significant Anomaly::Antigena Significant Anomaly from Client Block

List of Indicators of Compromise (IoCs)

(IoC – Type – Description + Confidence)

  • 45.141.87[.]195:8000/infect.ps1 – IP Address, Destination Port, Script – Malicious PowerShell script
  • gulf.moneroocean[.]stream – Hostname – Monero Endpoint
  • monerooceans[.]stream – Hostname – Monero Endpoint
  • 152.53.121[.]6:10001 – IP Address, Destination Port – Monero Endpoint
  • 152.53.121[.]6 – IP Address – Monero Endpoint
  • https://api[.]chimera-hosting[.]zip/frfnhis/zdpaGgLMav/nbminer%5B.%5Dexe – Hostname, Executable File – NBMiner
  • Db3534826b4f4dfd9f4a0de78e225ebb – Hash – NBMiner loader

MITRE ATT&CK Mapping

(Tactic – Technique – Sub-Technique)

  • Vulnerabilities – RESOURCE DEVELOPMENT – T1588.006 – T1588
  • Exploits – RESOURCE DEVELOPMENT – T1588.005 – T1588
  • Malware – RESOURCE DEVELOPMENT – T1588.001 – T1588
  • Drive-by Compromise – INITIAL ACCESS – T1189
  • PowerShell – EXECUTION – T1059.001 – T1059
  • Exploitation of Remote Services – LATERAL MOVEMENT – T1210
  • Web Protocols – COMMAND AND CONTROL – T1071.001 – T1071
  • Application Layer Protocol – COMMAND AND CONTROL – T1071
  • Resource Hijacking – IMPACT – T1496
  • Obfuscated Files – DEFENSE EVASION – T1027            
  • Bypass UAC – PRIVILEGE ESCALATION – T1548.002
  • Process Injection – PRIVILEGE ESCALATION – T055
  • Debugger Evasion – DISCOVERY – T1622
  • Logon Autostart Execution – PERSISTENCE – T1547.009

Sources:

[1] https://www.darktrace.com/cyber-ai-glossary/cryptojacking#:~:text=Battery%20drain%20and%20overheating,fee%20to%20%E2%80%9Cmine%20cryptocurrency%E2%80%9D.

[2] https://coinmarketcap.com/

[3] https://www.ibm.com/think/topics/cryptojacking

[4] https://thehackernews.com/2025/07/3500-websites-hijacked-to-secretly-mine.html

[5] https://urlhaus.abuse.ch/url/3589032/

[6] https://www.logpoint.com/en/blog/uncovering-illegitimate-crypto-mining-activity/

[7] https://www.virustotal.com/gui/domain/gulf.moneroocean.stream/detection

[8] https://www.virustotal.com/gui/domain/monerooceans.stream/detection

[9] https://any.run/report/5aa8cd5f8e099bbb15bc63be52a3983b7dd57bb92566feb1a266a65ab5da34dd/351eca83-ef32-4037-a02f-ac85a165d74e

The content provided in this blog is published by Darktrace for general informational purposes only and reflects our understanding of cybersecurity topics, trends, incidents, and developments at the time of publication. While we strive to ensure accuracy and relevance, the information is provided “as is” without any representations or warranties, express or implied. Darktrace makes no guarantees regarding the completeness, accuracy, reliability, or timeliness of any information presented and expressly disclaims all warranties.

Nothing in this blog constitutes legal, technical, or professional advice, and readers should consult qualified professionals before acting on any information contained herein. Any references to third-party organizations, technologies, threat actors, or incidents are for informational purposes only and do not imply affiliation, endorsement, or recommendation.

Darktrace, its affiliates, employees, or agents shall not be held liable for any loss, damage, or harm arising from the use of or reliance on the information in this blog.

The cybersecurity landscape evolves rapidly, and blog content may become outdated or superseded. We reserve the right to update, modify, or remove any content without notice.

Deepgram’s Unfiltered Views on The Announcement From OpenAI

Posted in Commentary with tags on September 2, 2025 by itnerd

OpenAI just made an announcement titled, “Introducing gpt-realtime and Realtime API updates for production voice agents” found here: https://openai.com/index/introducing-gpt-realtime/

Scott Stephenson, CEO and Founder of Deepgram, would like to respectfully offer the following thoughts on this news:

“OpenAI’s new model shows progress, but the benchmarks make it clear: latency, turn-taking, and lack of control remain its Achilles’ heel in real conversations,” said Scott Stephenson, CEO and Founder, Deepgram. “When you measure what makes conversations actually work — speed, politeness, and turn-taking — Deepgram still leads the pack. The benchmarks confirm what users feel: conversations with Deepgram just flow more naturally.”

Stephenson continued, “Why does this matter? In real-world deployments, people don’t judge a voice agent by its feature set — they judge it by how the conversation feels. Latency and turn-taking aren’t technical footnotes; they’re the difference between a helpful interaction and a frustrating one. That’s why benchmarks that measure conversational flow, not just functionality, are the true indicator of readiness for production.”

Benchmarks That Back It Up 

  • #1 across all tests: Deepgram ranked highest under every VAQI weighting — equal, politeness-heavy, and latency-heavy.
  • Politer conversations: Fewest interruptions, meaning agents don’t talk over users. 
  • Faster responses: Sub-second average latency (0.85s) vs. OpenAI’s 2.55s. 
  • Smarter timing: Strong turn-taking with a competitive miss rate (0.427). 
  •  Consistent edge: Even when benchmarks shifted priorities, results held — Deepgram stayed on top. 

Source: VAQI Benchmark, August 2025

Deepgram published a blog today with further details: https://deepgram.com/learn/vaqi-openai-gpt-realtime-test-with-sensitivity-analysis

Hisense Sets New Standard in Home Entertainment with Introduction of Trichroma Laser TV L9Q

Posted in Commentary with tags on September 2, 2025 by itnerd

Hisense is redefining the home cinema experience with the official launch of its TriChroma Laser TV L9Q, an innovated product that combines cinematic intensity, rich audio and an award-winning design to transform any space into an unforgettable personal theatre.

The L9Q features 5,000 ANSI lumens of brightness and contrast ratio of 5000:1, producing incredibly vivid images with deep blacks and sharp detail — even in well-lit rooms. With precision light control and vibrant colour accuracy from triple laser technology, every frame comes alive with cinematic intensity.

The L9Q is built for versatility, supporting screen sizes from 80 inches up to a massive 200 inches to turn any room into an epic home theatre. To ensure a perfect picture no matter the light, Hisense pairs the L9Q with an Ambient Light Rejection (ALR) screen, which is available in a variety of sizes and delivers brilliant images even in bright rooms.

Thanks to its IMAX Enhanced and Dolby Vision certifications, the L9Q presents visuals with extraordinary clarity and scale. This technology guarantees stunning, studio-grade immersion, whether enjoying a blockbuster film or binge-watching a favourite series. For audio that truly matches the stunning visuals, the L9Q features the exclusive Opéra de Paris | Devialet edition. Its 6.2.2 channel speaker system with Dolby Atmos creates rich, multidimensional sound that fills the entire room, making it perfect for both movies and music.

With an Ultra Short Throw (0.18 Throw Ratio) design, the L9Q can project a ginormous screen from just inches away, simplifying setup to fit into any space. Beyond its technical performance, the L9Q is a work of art. Its design, inspired by the circular structure of the Royal Opera House and the acoustic chambers of Roman theaters, reflects Hisense’s philosophy of “Timeless Artistry Meets Dynamic Technology.” This iconic design has been recognized with both the 2024 Red Dot and 2025 iF Design Awards, elevating the home cinema experience in both form and function.

According to Omdia Q1 2025 data, Hisense ranked No.1 globally in Laser TV volume share (69.6 per cent), extending its leadership for six consecutive years. As Hisense’s most advanced laser model, the L9Q reflects Hisense’s vision to help users Own the Moment — transforming everyday experiences, from family movie nights to solo concerts and game-day thrills, into unforgettable memories.

The L9Q will be available soon in Canada at authorized retailers.

For more information, please visit hisense-canada.com.

August Saw Ransomware Attacks Increasing AND First-of-a-Kind Statewide Attack Says Comparitech

Posted in Commentary with tags on September 2, 2025 by itnerd

Today, Comparitech researchers released a study looking at the state of global ransomware attacks in August 2025. 

Ransomware attacks continued to climb again in August, rising from 473 in July to 506 last month. August also saw a first-of-a-kind attack on the State of Nevada. While hundreds of US government organizations have suffered ransomware attacks, this is the first-ever statewide attack.

Rebecca Moody, Head of Data Research at Comparitech, commented:

“If we needed a reminder of how dominant a threat ransomware is, August’s statistics provide it. Not only did we see a steady increase in attacks but we also witnessed a first-of-its-kind attack on the State of Nevada. The latter in particular highlights how no one, not even a multi-billion-dollar government organization, is immune to these types of attacks. And, even though numerous countries and governments are looking to ban public entities from making ransom payments, this is doing little to deter hackers.”

“Why? It’s likely due to a number of reasons. Firstly, these attacks are often random, e.g. because the hackers start exploiting a known vulnerability or a staff member happens to click on or download something they shouldn’t. Second, even if the hackers don’t receive the ransom, they’re most certainly going to gain notoriety when they make their claim on the State of Nevada. So, when another entity finds itself facing an attack from the same organization, they’ll instantly recognize the group’s name and may be more inclined to pay up before the attack escalates any further. Finally, it’s more than likely that the hackers will have stolen data in this attack on Nevada, so they’ll always have this to sell on the dark web if needed.”

“While banning public entities from making ransom payments may be a step toward reducing ransomware attacks, it isn’t the silver bullet. Rather, it should be part of a multi-pronged approach and one that makes sure the basics are covered. This includes patching any vulnerabilities as soon as they are flagged, making sure systems are regularly updated, carrying out frequent backups, investing in employee training, and having a step-by-step plan in place should an attack occur.”

For full details, the August ransomware roundup can be found here: https://www.comparitech.com/news/ransomware-roundup-august-2025/

Guest Post – Bringing the Human Back into Cybersecurity: What Values-Based Education Teaches Us About Digital Mindfulness

Posted in Commentary with tags on September 2, 2025 by itnerd

By Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4

Inda Sahota, Group Cybersecurity Office (GCSO) Cyber Culture & Training – Fresenius

Recently, I had the pleasure of speaking with Inda Sahota, the dynamic and deeply empathetic force behind cybersecurity awareness at Fresenius Group. What struck me most wasn’t just her deep understanding of human-centric security, it was how naturally she bridges the gap between personal values and professional practice.

Inda brings her whole self into her work: her empathy, intuition, and a grounding in values passed down from her parents, progressive thinkers and first generation Punjabi Indian immigrants to the UK. They instilled in her and her sisters a quiet but powerful sense of agency. When cultural voices around them suggested that girls were somehow less capable than boys, her father would respond with a deceptively simple challenge:“But you can eat, can’t you?”

His way of creating initial confusion sparked critical thinking, and a gentle dismantling of limiting beliefs that, if left unchecked, could have developed into lifelong insecurities.

Our conversation got us thinking about the intersection of critical thinking, values-based education, self-efficacy, and digital mindfulness, especially in a world where we are exposed to online manipulation on a daily basis. 

From Awareness to Agency

In security awareness design, we often focus on rules: don’t click this, don’t trust that, don’t reuse your password. But what if we focused instead on values? On presence. And on the cultivation of agency and critical thinking, the kind that Inda’s father nurtured in her from a young age? Psychologist Albert Bandura’s concept of self-efficacy, the belief in one’s capacity to act in the face of challenges, is central here (Bandura, xx). Research shows that self-efficacy is a strong predictor of behaviour change, and it has been linked to improving cybersecurity awareness attitude, knowledge, and behaviour (Arachchilage & Love, 2014; Zainal et al., 2021).

As Inda put it:“Resilience is like water. You need to be able to flow.”

In other words, we need to prepare, not just protect, our people. Whether we’re speaking to employees, children, or our broader communities, we need to teach them how to adapt fluidly, not just obey. How to stay present, not just paranoid. “This is about more than cybersecurity,” Inda notes. “It’s about helping people reclaim their agency in a world designed to exploit their attention and emotions. This fluid resilience allows individuals to:

  • Recognise when they’re being emotionally manipulated
  • Pause before responding to urgent digital demands
  • Stay centred when algorithms try to steal their attention
  • Respond with intention, rather than react impulsively

Presence vs. Performance: The Cost of Multitasking

One of the biggest threats to cybersecurity by the way, isn’t malware. It’s human error, often linked to distraction, overwhelm and media multitasking. And attention is one of our most compromised assets. Studies show that frequent multitasking reduces cognitive control, impairs memory, and increases difficulty in impulse control (Ophir, 2009; Baumgartner, 2014). And people who engage in high media multitasking engage in riskier cybersecurity behaviours compared to the low multitaskers (Hadlington & Murphy, 2018).

This fragmentation of attention doesn’t just make us less productive, it makes us more vulnerable. Scammers, phishers, and social engineers exploit us best when we’re rushed, distracted, over-stimulated or overwhelmed without realising. As a result, mindfulness becomes a cybersecurity imperative, not just a wellness buzzword.

Habits that Shape the Mind

Digital hygiene, like brushing your teeth, only becomes effective when it’s habitual. But forming habits, particularly in high-distraction environments, requires deliberate design. If we want people to pause before clicking a link or question a seemingly friendly DM, we need to design cues and rewards that reinforce critical thinking. This is where digital mindfulness practices can play a critical role in training the brain.

What Inda’s father modeled for her was a form of cognitive scaffolding. He didn’t control her environment or scare her into obedience. Instead, he provided intuitive frameworks for situational self-awareness, such as: “Have eyes at the back of your head.”

This is a powerful metaphor for living with conscious awareness and for being both vigilant and empowered. And those are precisely the qualities we need to foster in our digital citizens. So how can we apply this to our digital spaces?

Here are 5 practical ways to build digital resilience starting today.

1. Question, Don’t Lecture

Instead of explaining all the dangers of the internet, ask questions that help think critically:

  • “What do you notice about how you feel after scrolling for an hour?”
  • “What is the intent behind this narrative, article or social media post?”
  • “What emotions are triggered by the narrative?”

2. Build Self-Efficacy Through Practice

Research by Dr. BJ Fogg at Stanford’s Behavior Design Lab shows that lasting behavioral change happens through tiny habits that feel easy to do. In the digital realm, this might mean:

  • Pause for three seconds before clicking on links
  • Creating simple rituals around device usage – i.e. no screens at meals, or in bedroom
  • Play critical thinking games, illusions and logic riddles
  • Phishing tests and “spot the phish” or “spot the deepfake” games

The key is making these practices feel natural rather than imposed. Creating safe opportunities for people to practice digital decision-making and learning from mistakes also helps building self-efficacy.

3. Model Mindful Technology Use

We learn more from what we observe than what we’re told. You can model mindful technology use by:

  • Putting devices away during conversations
  • Thinking out loud when you encounter suspicious emails
  • Demonstrating how you fact-check information before sharing
  • Try the 5-minute rule. Tell yourself: “If I still need to check this in 5 minutes, I will.” This pattern interrupt helps break unhealthy autopilot impulses.

4. Develop Emotional Regulation Skills

Social media platforms and cybercriminals alike exploit our emotional responses to drive behaviour. They create artificial urgency, leverage fear of missing out, and use variable reward schedules that mirror addictive behaviours. Training should show how to recognise when one is being emotionally manipulated by technology. Simple practices like taking three deep breaths before responding can activate the prefrontal cortex and reduce reactive behaviour.

5, Create an emotionally safe environment 

People need to feel psychologically safe to slow down. Create environments where questioning is welcomed, where “Let me verify this first” is praised, not criticised. When it’s okay to ask “Does this seem right to you?” without fear of looking incompetent, people actually become more vigilant, not less.

Bringing the Being into the Human

One of Inda’s most poetic expressions stayed with me:
“We need to bring the human back into the being, and the being into the human.”

What if we saw our intuition and self-awareness as cybersecurity superpowers? What if we cultivated presence alongside password hygiene? We might just build a digital culture where security isn’t only about understanding the risks, but about knowing ourselves.

Guest Post – Beyond Borders: How AI is Making Global Collaboration Simpler, Faster, and More Human

Posted in Commentary with tags on September 2, 2025 by itnerd

Written by Loïe Favre (https://www.smartcat.com/authors/lfh_speaker_loie_favre/)

The ability to communicate and collaborate across languages and cultures is no longer a luxury but a necessity. A new generation of intelligent AI translation tools is breaking down old barriers, turning complex, fragmented global workflows into seamless engines for connection and growth. By making life easier and boosting productivity, these tools are not just changing how businesses operate—they are helping people connect on a global scale more effectively than ever before.

This article explores how these AI tools are delivering tangible benefits, highlights key applications across different professional fields, and looks at the emerging trends that will shape our future.

A New Era of Productivity and Connection

The most immediate impact of AI translation tools on global teams is a dramatic boost in speed and efficiency, which translates into more time for meaningful work. For any organization operating globally, this shift is transformative.

  • Reduced Cycle Time: Tasks that previously took weeks, such as localizing a global marketing campaign or updating training materials in multiple languages, can now be completed in days or even hours. This acceleration allows ideas to reach a global audience while they are still relevant and impactful.
  • Fewer Handoffs: Intelligent automation eliminates many of the repetitive, manual tasks that slow teams down—like copying content between systems, reformatting files, and managing endless review cycles. This frees up human talent to focus on strategy, creativity, and building relationships.
  • Lower Operational Costs: By streamlining processes and reducing reliance on manual, third-party interventions for every task, organizations can operate more efficiently. The 2025 Stanford AI Index Report highlights these gains, with companies reporting significant cost savings in service operations (49%), supply chain management (43%), and software engineering (41%).

Ultimately, this efficiency is about more than just the bottom line. It’s about removing friction. When teams can scale their work globally without the usual roadblocks of delays and cultural silos, they can spend more energy on innovation and connection. As Ivan Smolnikov, CEO of Smartcat, puts it, “every enterprise dreams of scaling globally without the usual roadblocks—global campaign delays, cultural silos, and bottlenecks in transferring expertise.”

The best systems achieve this through a powerful partnership between AI and human expertise. By letting AI handle the initial heavy lifting and empowering human reviewers to refine and approve the work, this “human-in-the-loop” approach delivers both speed and quality, achieving better outcomes than either AI or humans could alone.

A key innovation driving this partnership is adaptive AI translation. Unlike static models, adaptive AI tools learn in real-time from every correction made by a human reviewer. When a linguist adjusts a phrase for tone or accuracy, for example, the system instantly absorbs that feedback, ensuring it won’t make the same mistake again in future content. This creates a powerful feedback loop where the AI becomes a continuously improving student of your brand’s unique voice.

Uniting a Global Voice: Consistency Across Cultures

Maintaining a clear and consistent message across dozens of languages is a monumental challenge. AI tools are proving instrumental in solving this, ensuring that an organization’s core identity and values resonate universally.

These AI translation systems act as guardians of brand consistency, applying the same rules, terminology, and brand guidelines to all content, regardless of the target language. Through features like centralized glossary management, they ensure that critical terms, from product names to compliance language, are used correctly everywhere. More advanced AI translation tools take this a step further by incorporating AI-driven quality estimation. This feature automatically scans translated text, flagging sentences that may sound awkward or deviate from the source’s meaning. This allows human reviewers to focus their attention on the small fraction of content that needs refinement instead of manually checking every word, dramatically accelerating the quality assurance process. This prevents the kind of linguistic inconsistencies that can confuse customers, dilute a brand’s message, and erode trust.

This synergy between AI-driven consistency and human oversight empowers global teams to maintain high standards of quality while moving at an unprecedented pace, fostering a unified brand presence that speaks authentically to every market.

Practical Applications: AI Tools at Work

Across industries, intelligent AI software is already delivering powerful results. These real-world applications show how these tools are making work easier and more impactful today.

1. Marketing and Global Communications Marketing teams use AI translation tools to create, localize, and launch global campaigns with remarkable speed. In fact, nearly 70% of companies are already using cloud-based generative AI, according to Statista research on AI tool usage. Teams can now create content in multiple languages simultaneously, ensuring that a single, cohesive message is adapted for local nuances and ready for a global launch in days, not weeks. Nicole DiNicola, VP of Marketing of Smartcat, who has also led AI implementations for her teams at major brands, notes that, “marketing has always been about impact. AI agents give us a chance to have more of it, with less friction.”

  • Example applications: Global product launches, multilingual email campaigns, website localization, and social media content.

2. Learning & Development (L&D) AI translation now makes it possible for L&D professionals to create and update corporate training programs for a global workforce in a fraction of the time. This is especially vital for compliance training, where accuracy is non-negotiable. When regulations change, updates can be rolled out instantly across all language versions, keeping the entire organization aligned.

  • Example applications: Employee onboarding, compliance training, product knowledge courses, and skills development programs.

3. E-commerce and Retail Operations For e-commerce businesses, AI is accelerating the process of localizing vast product catalogs. By integrating directly with Product Information Management (PIM) systems, AI can ingest product data, apply translation and glossary rules, and sync updates automatically. This keeps online stores and retail partners perfectly aligned without cumbersome spreadsheets. Companies using this approach have reported dramatic reductions in turnaround time, with tasks that once took hours now completed in mere minutes.

The Road Ahead: What’s Next for AI Translation

The AI landscape is evolving at a breathtaking pace. Key trends point toward even deeper integration and broader adoption in the near future.

  • From Niche Tool to Workplace Staple: AI is rapidly moving from specialized departments to enterprise-wide implementation. Gartner forecasts that by 2028, approximately one-third of all enterprise software applications will have these intelligent capabilities embedded within them.
  • The Power of an Integrated Ecosystem: Standalone tools are giving way to integrated platforms where multiple AI agents work together to automate end-to-end processes. By connecting with CRM, CMS, and LMS tools through APIs, these ecosystems create seamless workflows across the entire organization.
  • Smarter, More Capable AI: The underlying large language models are becoming exponentially more powerful. Research shows that the length of complex tasks AI can handle is doubling roughly every seven months. When applied to business, this means AI can tackle specialized content like legal documents and technical manuals that once required extensive human effort.

A More Connected Future

AI translation technology has moved beyond hype to deliver tangible outcomes. Teams are more productive, brands are more consistent, and global operations are more efficient. But the real story is a human one. By automating the mundane and accelerating collaboration, these tools are empowering people to connect more effectively across linguistic and cultural divides. The future of work is emerging as a partnership between human talent and technology, building a world where great ideas are shared, understood, and embraced by everyone, everywhere.

The U.S. leads with over 2M breached accounts in the first half of 2025

Posted in Commentary with tags on September 2, 2025 by itnerd

Cybernews’ latest overview of the first half of 2025 reveals that the total number of breached accounts fell by 20 times compared to the same period in 2024, according to Cybernews’ Personal Data Leak Checker tool.

However, while breaches have dropped significantly compared to last year, several countries remain highly vulnerable as millions of accounts remain exposed. The top three countries with the highest number of breaches in 2025 are the U.S., with 2.5 million breached accounts, France, with 1.8 million breached accounts, and India, with 1.2 million breached accounts.

This report offers key insights into global data breach trends in the first half of 2025, highlighting that unsafe online practices such as subscriptions to suspicious websites and weak password reuse remain the leading causes of breaches.

Key findings of this research:

  • The first six months of 2025 recorded 15.8 million breached accounts globally.
  • The top five countries most breached worldwide in the first six months of 2025 are the U.S., France, India, Russia, and Venezuela.
  • January has the highest number of breached accounts in 2025 so far.
  • Countries experienced a spike in breach numbers in March, making it the second most breached month in the first six months of 2025. 
  • The second quarter of 2025 saw a 77% dip in breached accounts.
  • Despite a 20-fold drop compared to 2024, breach density per capita shows the U.S. remains the most affected nation, with 8 in every 1,000 internet users impacted.

To read the full research, please click here.

September Is Insider Threat Awareness Month

Posted in Commentary on September 1, 2025 by itnerd

In recognition of September’s Insider Threat Awareness Month, here are some insights from Ryan Sherstobitoff, Chief Threat Intelligence Officer at SecurityScorecard

“Insider Threat Awareness Month serves as a timely reminder that some of the most damaging breaches often originate from within. Whether it’s a misstep by a well-meaning employee or a malicious actor with privileged access, insider threats often bypass traditional defenses and go undetected for weeks. This is especially true in hybrid environments where visibility is fragmented across endpoints, cloud services, and third-party vendors. 

To combat this threat, organizations should prioritize continuous monitoring and behavioral analytics. This means having tools in place to watch for unusual activity, such as an employee accessing sensitive data outside of normal work hours or attempting to bypass security controls. Organizations must also have a clear, documented incident response plan for insider threats, including who to contact and what steps to take. This plan should involve human resources, legal, and IT teams. Lastly, a crucial step is to encourage employees to report suspicious behavior via a clearly defined anonymous process. 

That effort must extend to the systems and vendors with access to your own environment, where risk often hides in plain sight. Surfacing these signals early helps prevent escalation into full-blown incidents. 

As insider threats grow more complex, blending human error with credential misuse and social engineering, smarter detection methods are essential. Insider Threat Awareness Month is not just about awareness, it is a call to action. The organizations that act now will be best equipped to protect their data, their people, and their reputation.” 

Today Is International Women In Cyber Day

Posted in Commentary on September 1, 2025 by itnerd

With International Women in Cyber Day being today here’s some commentary from female cybersecurity experts, including Outpost24’s newly appointed CISO. 

Olivia Brännlund, CISO at Outpost24: 

“Cybersecurity is one of the most dynamic and rewarding industries to be in today. It is constantly evolving, shaped by new technologies, emerging threats, and shifting regulations. That pace of change can feel relentless, but it also means there is always something new to learn and an opportunity to make a tangible impact. As a female CISO, I am also encouraged to see more women entering leadership positions across the industry, although there is still work to be done to improve representation and diversity.”

Anna Collard, SVP of Content Strategy and Evangelist at KnowBe4: 

“As someone who never quite fit into a single mold, I’ve found strength in being a multi-disciplined ‘amateur’, dabbling across art, mental health, yoga, podcasts, cartoons and – of course – cybersecurity. It’s the fusion of varied interests that fuels creativity in this exciting field.”

“Launching a cybersecurity training product by sketching cartoons on a beach, getting feedback from peers before building it and finally turning that into a real learning tool taught me the power of true connection from the very beginning. After all, understanding users is what guides relevance and impact, especially when it comes to cybersecurity.”

“I have also learned that diversity, from hiring across backgrounds, and ruthlessly avoiding distractions like vanity metrics, helps build stronger, more meaningful connections. When you get this balance right, you’ll see a natural and progressive improvement in cyber and organizational resiliency, as people are ultimately the best line of defence against cyberthreats.”

“On International Women in Cyber Day, I celebrate the non-linear paths, the multi-passion journeys, diversity and the power of bringing heart, creativity and mindfulness into cybersecurity. Because when we do, we build safer systems that are richer, more inclusive and ultimately, far more effective.”