Skip to content

Third Party Risk

Find below interesting blogs on third party risk management

Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches 11 Aug – 18 Aug, 2025

The week of August 11-18, 2025, witnessed an unprecedented escalation in cybersecurity threats, marking one of the most destructive periods for data security in recent history. This period was dominated by a sophisticated Salesforce-targeting campaign orchestrated by ShinyHunters, compromising over 275 million patient records across healthcare organizations, and multiple high-profile breaches affecting financial and HR… Read More »Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches 11 Aug – 18 Aug, 2025

Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 09-16, 2025

During the week under review, threat actors shifted from high-noise ransomware campaigns to quieter, precision intrusions abusing zero-day or recently patched vulnerabilities and abusing trusted cloud or software-supply-chain services. Fortinet’s FortiWeb, Citrix NetScaler ADC/Gateway and Wing FTP Server all saw in-the-wild exploits within 72 hours of public disclosure—highlighting the narrowing window between a patch release… Read More »Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 09-16, 2025

Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 02-09, 2025

Between July 2 and July 10, 2025, the cybersecurity landscape was marked by high-impact ransomware attacks, critical vulnerabilities in widely used platforms, and advanced persistent threat (APT) campaigns targeting government and enterprise sectors. This report provides an authoritative, technically exhaustive breakdown of each incident, strictly covering only those breaches and attacks that occurred within this… Read More »Weekly Cybersecurity Intelligence Report Cyber Threats & Breaches: July 02-09, 2025

Weekly Report: New Hacking Techniques and Critical CVEs: June 24-30, 2025

The final week of June 2025 witnessed an unprecedented escalation in sophisticated cyber warfare, with critical infrastructure bearing the brunt of state-sponsored espionage campaigns and financially motivated ransomware operations. This period was marked by the convergence of traditional cybercrime tactics with cutting-edge AI-powered attack vectors, presenting a complex threat landscape that challenges conventional security paradigms.… Read More »Weekly Report: New Hacking Techniques and Critical CVEs: June 24-30, 2025