- Cyber Safety
- Posts
- “Laundry Bear”, InCyber Forum & Veriti's Aqcuisition
“Laundry Bear”, InCyber Forum & Veriti's Aqcuisition
Think GDPR doesn’t apply to your small business? Think again. If you handle data from EU residents, the rules apply—and non-compliance could cost you up to €10 million or 2% of global revenue. This guide breaks down how to stay compliant without drowning in legal jargon.
• 8 data subject rights include the “right to be forgotten” and objection to processing
• GDPR demands clear consent, detailed data tracking, and role-based access control
• Compliance isn’t just about avoiding fines—it builds customer trust and sharpens your data strategy
👉 Learn how to stay compliant and protect your reputation.
Hire Ava, the Industry-Leading AI BDR
Your BDR team is wasting time on things AI can automate. Our AI BDR Ava automates your entire outbound demand generation so you can get leads delivered to your inbox on autopilot.
She operates within the Artisan platform, which consolidates every tool you need for outbound:
300M+ High-Quality B2B Prospects, including E-Commerce and Local Business Leads
Automated Lead Enrichment With 10+ Data Sources
Full Email Deliverability Management
Multi-Channel Outreach Across Email & LinkedIn
Human-Level Personalization

Spain is ramping up its cybersecurity efforts following a significant blackout that left the country in the dark for an entire day. Investigations are underway to determine whether a cyberattack on small electricity generators played a role. Key highlights include:
• Scrutiny of cybersecurity measures for small and medium-sized energy facilities, particularly solar and wind farms.
• A Technical Analysis Committee has been formed, focusing on cybersecurity and electrical system performance.
• A final report on the incident is expected by August, with an independent evaluation from the European Electricity Coordination Group.
As simple as it seems, the investigation is far from over!

A cybersecurity researcher has unearthed a staggering database exposing over 184 million login credentials, impacting users from major platforms like Google, Meta, and Apple.
Key Highlights:
• The database contained:
- 47.42GB of sensitive data including emails, usernames, and passwords
- Credentials for financial and health platforms, posing significant risks
• Its origin remains a mystery, linked to suspicious domain names
• Users are urged to change passwords and safeguard sensitive information
This alarming breach underscores the ongoing threat of infostealer malware and the black market for compromised data. Stay vigilant!

A recent Google Ads campaign has targeted software developers with malware disguised as a legitimate Homebrew package manager site. Here's a quick breakdown:
• Malicious ads redirect users from "brew.sh" to a fake site "brewe.sh."
• The deceptive site prompts users to install a command that downloads AmosStealer, an information-stealing malware.
• This malware can extract sensitive data from macOS systems, including cryptocurrency wallets.
While Google has removed the ads, experts warn that the sophistication of these types of attacks highlights significant vulnerabilities in online advertising platforms. Developers are urged to take precautionary measures to protect their assets.

The highly anticipated InCyber Forum, a major cybersecurity conference set for June in San Antonio, has been postponed due to a challenging U.S. policy climate. Organizers cited concerns affecting participation and economic stability, mirroring trends seen in multiple similar events recently.
Key highlights include:
• 5,000 expected attendees, enhancing San Antonio's status as a cybersecurity hub.
• Discussion of North American and global challenges within the cybersecurity landscape.
• Impact of U.S. immigration policies discouraging international attendance.
While a new date is still TBD, the forum remains a potential future option for the city.

Dutch intelligence has unveiled the activities of a previously unknown Russian cyber group, dubbed “Laundry Bear,” linked to significant breaches, including the Dutch police system. Key highlights include:
• Targeting Western Governments: Focused on NATO and EU states, seeking military procurement data.
• Technique: Utilizes a "pass-the-cookie" method to exploit stolen authentication tokens.
• Automation: Capable of conducting multiple attacks swiftly, enhancing their success rate.
• Public Disclosure: Dutch authorities are sharing Laundry Bear's methods to bolster collective cybersecurity defenses.
This revelation highlights the rising threat landscape, urging organizations to bolster their defenses against these sophisticated attacks.

Check Point Software Technologies is making waves by acquiring Veriti Cybersecurity for over $100 million, a move that enhances its automated threat exposure management in an era of escalating AI-driven cyber attacks. Key highlights include:
• Innovative Approach: Veriti introduces Preemptive Exposure Management (PEM), continuously identifying and remediating risks.
• Automation: Features automated cross-vendor virtual patching, reducing patching time from weeks to minutes.
• Strategic Partnership: Strengthens collaboration with cloud security leader Wiz for seamless multi-vendor defense.
CEO Nadav Zafrir emphasizes this acquisition as a leap toward their hybrid mesh security vision, enhancing Check Point's Infinity Platform.