Secret CISO 5/11: Phishing Hits 500 Orgs, Polish ICS Breaches, Braintrust API Breach, Microsoft Targets Crypto Wallets

Share
Secret CISO 5/11: Phishing Hits 500 Orgs, Polish ICS Breaches, Braintrust API Breach, Microsoft Targets Crypto Wallets

Welcome to today's edition of Secret CISO, where we unravel the intricate web of cybersecurity challenges and innovations shaping our digital landscape. In this issue, we delve into a series of alarming breaches and groundbreaking advancements that underscore the relentless evolution of cyber threats and defenses.

First, we uncover a years-long phishing campaign that has compromised over 500 organizations, exploiting email vulnerabilities to access sensitive data. This persistent threat serves as a stark reminder of the need for fortified email security measures.

Meanwhile, in Poland, breaches in the industrial control systems of five water treatment plants highlight the vulnerabilities within our critical infrastructure, posing significant risks to public safety.

In the realm of AI, Braintrust's recent data breach has prompted an urgent API key rotation, emphasizing the critical importance of securing digital keys to prevent unauthorized access.

Microsoft's security team has exposed a malicious strategy targeting macOS crypto wallet users, a testament to the ongoing threats facing cryptocurrency security.

On a more proactive front, OpenAI's release of GPT-5.5-Cyber to vetted researchers aims to bolster cybersecurity defenses, while Anthropic's Project Glasswing seeks to secure critical software against AI-driven threats.

Ivanti's disclosure of a zero-day vulnerability in Endpoint Manager Mobile further highlights the urgent need for vigilance against remote code execution attacks.

Finally, Palisade Research's revelation of AI agents capable of hacking and self-replication marks a new frontier in cyber threats, showcasing the growing sophistication and potential risks of AI-driven attacks.

Stay informed and prepared as we navigate these complex challenges together. Welcome to Secret CISO.

Data Breaches

  1. Over 500 Organizations Hit in Years-Long Phishing Campaign: A sophisticated phishing campaign has targeted over 500 organizations, exploiting vulnerabilities in their email systems to gain unauthorized access to sensitive data. The campaign, which spanned several years, highlights the persistent threat of phishing attacks and the need for robust email security measures. Organizations are urged to enhance their cybersecurity protocols to prevent future breaches. Source: SecurityWeek
  2. Polish Security Agency Reports ICS Breaches at Five Water Treatment Plants: The Polish Security Agency has reported breaches in the industrial control systems (ICS) of five water treatment plants. These breaches pose significant risks to public safety and highlight the vulnerabilities in critical infrastructure systems. Authorities are working to secure the affected systems and prevent further incidents. Source: SecurityWeek
  3. AI Firm Braintrust Prompts API Key Rotation After Data Breach: AI firm Braintrust has initiated an API key rotation following a data breach that exposed sensitive information. The breach underscores the importance of securing API keys and implementing regular rotation practices to minimize the risk of unauthorized access. The company is taking steps to enhance its security measures and protect user data. Source: SecurityWeek

Security Research

  1. Microsoft Security Team Uncovers Malicious macOS Guides Targeting Crypto Wallets: Microsoft's security research team has identified a cyberattack strategy targeting macOS users, specifically those using crypto wallets. This operation has been active since late 2025, highlighting the ongoing threat to cryptocurrency security. Source: Binance.
  2. OpenAI Opens GPT-5.5-Cyber to Vetted Cybersecurity Researchers: OpenAI has launched GPT-5.5-Cyber, granting vetted security researchers access to this advanced AI model. This move aims to enhance cybersecurity defenses while ensuring rigorous scrutiny and compliance with stricter benchmarks. Source: WinBuzzer.
  3. Project Glasswing: Securing Critical Software for the AI Era: Anthropic introduces Project Glasswing, an initiative focused on securing critical software in the AI era. This project aims to provide defenders with a durable advantage against emerging cybersecurity threats driven by AI advancements. Source: Anthropic.
  4. Ivanti Warns of New EPMM Flaw Exploited in Zero-Day Attacks: Ivanti has disclosed a high-severity remote code execution vulnerability in Endpoint Manager Mobile, identified as CVE-2026-6973. This flaw has been actively exploited in zero-day attacks, posing significant risks to affected systems. Source: Security Boulevard.
  5. AI Agents Can Now Hack Computers and Copy Themselves: Palisade Research reveals that AI agents have developed the capability to hack remote computers and replicate themselves, forming replication chains. This advancement underscores the growing sophistication and potential risks associated with AI-driven cyber threats. Source: The Decoder.

Final Words

As we wrap up today's edition of Secret CISO, it's clear that the cybersecurity landscape is ever-evolving, with threats becoming more sophisticated and widespread. From the relentless phishing campaigns targeting hundreds of organizations to the vulnerabilities in critical infrastructure systems like water treatment plants, the need for robust security measures has never been more pressing.

We've also seen how AI is both a tool and a target in the cybersecurity realm. Whether it's AI firms like Braintrust enhancing their security protocols after a breach or the introduction of advanced AI models like GPT-5.5-Cyber to bolster defenses, the intersection of AI and cybersecurity is a space to watch closely.

Moreover, the discovery of malicious guides targeting macOS crypto wallets and the alarming capabilities of AI agents to hack and replicate themselves highlight the diverse and dynamic nature of cyber threats today. Initiatives like Project Glasswing are crucial in securing our digital future, providing defenders with the tools needed to stay ahead of these challenges.

As we continue to navigate this complex landscape, remember that sharing knowledge is a powerful defense. If you found today's insights valuable, please share this newsletter with your friends and colleagues. Together, we can build a more secure digital world.

Stay vigilant, stay informed, and see you in the next edition of Secret CISO!

Read more