<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GuardStreet</title>
	<atom:link href="https://guardstreet.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://guardstreet.com</link>
	<description></description>
	<lastBuildDate>Tue, 12 May 2026 01:08:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Shadow AI Explained: Cybersecurity Risks, AI Tools &#038; Business Protection &#124; Guard Street Podcast</title>
		<link>https://guardstreet.com/shadow-ai-explained-cybersecurity-risks-ai-tools-business-protection-guard-street-podcast/</link>
					<comments>https://guardstreet.com/shadow-ai-explained-cybersecurity-risks-ai-tools-business-protection-guard-street-podcast/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Tue, 12 May 2026 01:08:24 +0000</pubDate>
				<category><![CDATA[Podcast]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3639</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="fusion-video fusion-youtube" style="--awb-max-width:600px;--awb-max-height:350px;"><div class="video-shortcode"><div class="fluid-width-video-wrapper" style="padding-top:58.33%;" ><iframe title="YouTube video player 1" src="https://www.youtube.com/embed/OViAKWJgqpU?wmode=transparent&autoplay=0" width="600" height="350" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture;"></iframe></div></div></div>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/shadow-ai-explained-cybersecurity-risks-ai-tools-business-protection-guard-street-podcast/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What Is a Letter of Attestation, and Why Does Your Business Need One?</title>
		<link>https://guardstreet.com/what-is-a-letter-of-attestation-and-why-does-your-business-need-one/</link>
					<comments>https://guardstreet.com/what-is-a-letter-of-attestation-and-why-does-your-business-need-one/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 00:57:03 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3630</guid>

					<description><![CDATA[You are closing a deal with an enterprise client. The procurement team sends over a security questionnaire and buried in the list of requirements is a request for a Letter of Attestation for your penetration test. Maybe you have seen this before. Maybe it is the first time. Either way, you need to know what it is, what it should say and how  [...]]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">You are closing a deal with an enterprise client. The procurement team sends over a security questionnaire and buried in the list of requirements is a request for a Letter of Attestation for your penetration test. Maybe you have seen this before. Maybe it is the first time. Either way, you need to know what it is, what it should say and how to get one without holding up the deal.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<p><span data-contrast="auto">We’ll break it down in plain terms.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<h4 aria-level="1"><b><span data-contrast="none">What Is a Letter of Attestation?</span></b><span data-ccp-props="{&quot;335559738&quot;:320,&quot;335559739&quot;:160}"> </span></h4>
<p><span data-contrast="auto">A Letter of Attestation (LoA) is a formal document issued by an independent cybersecurity firm confirming that a security control has been pursued and typically it demonstrates proof that a professional penetration test was conducted on your systems. It is written for external audiences including the client reviewing your vendor application, the auditor checking your compliance posture and the insurer evaluating your risk profile.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<p><span data-contrast="auto">It confirms that a qualified third party tested your systems, what standards governed that testing and that findings were addressed. The full technical report stays internal. The LoA is what you share externally.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<h4 aria-level="2"><b><span data-contrast="none">Who Is Asking for This?</span></b><span data-ccp-props="{&quot;335559738&quot;:280,&quot;335559739&quot;:120}"> </span></h4>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Enterprise clients vetting vendors before signing contracts.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Healthcare and financial sector partners requiring compliance proof.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">SOC 2, ISO 27001 and several other audit frameworks.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Government contractors and procurement offices.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Cyber insurers assessing risk before issuing or renewing a policy.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<h4 aria-level="1"><b><span data-contrast="none">What a Letter of Attestation Includes</span></b><span data-ccp-props="{&quot;335559738&quot;:320,&quot;335559739&quot;:160}"> </span></h4>
<p><span data-contrast="auto">If someone is asking you for an LoA for a penetration test, here is what a legitimate one contains. This is also useful to know when evaluating whether what you have already received from a testing firm is complete:</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="6" data-aria-level="1"><b><span data-contrast="auto">Final Statement: </span></b><span data-contrast="auto">A formal declaration that penetration testing was performed by a qualified third party.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="7" data-aria-level="1"><b><span data-contrast="auto">Scope of Testing: </span></b><span data-contrast="auto">The scope of what was tested, including systems, applications, and networks covered.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="8" data-aria-level="1"><b><span data-contrast="auto">Methodology: </span></b><span data-contrast="auto">The methodology used, such as OWASP Top 10, NIST SP 800-115, or PTES.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="9" data-aria-level="1"><b><span data-contrast="auto">Finding Summary: </span></b><span data-contrast="auto">Depending on the purpose (for example if requested by an auditor), a high-level summary of findings categorized by severity: Critical, High, Medium, and Low.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="10" data-aria-level="1"><b><span data-contrast="auto">Remediation Confirmation: </span></b><span data-contrast="auto">Confirmation that critical and high findings were remediated prior to issuance.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="11" data-aria-level="1"><b><span data-contrast="auto">Signature and Firm Credentials: </span></b><span data-contrast="auto">A formal signature from the testing firm, establishing accountability.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<h3 aria-level="1"></h3>
<h4 aria-level="1"><b><span data-contrast="none">Why There Is No Letter Grade</span></b><span data-ccp-props="{&quot;335559738&quot;:320,&quot;335559739&quot;:160}"> </span></h4>
<p><span data-contrast="auto">A question that comes up frequently is “Why does an LoA not just give a score or a grade?” If a penetration test was performed, why not summarize it as a B+ or an 87 out of 100 and call it a day?</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<p><span data-contrast="auto">The short answer is that a grade would actually make the document less useful and more dangerous. Here is why.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<h4 aria-level="2"><b><span data-contrast="none">A Grade Does Not Reflect What Was Actually Tested</span></b><span data-ccp-props="{&quot;335559738&quot;:280,&quot;335559739&quot;:120}"> </span></h4>
<p><span data-contrast="auto">Every penetration test is bound by time and agreed-upon scope. A three-day test of one application looks the same on a graded scale as a three-week test of your full infrastructure. The grade removes that context, and without context, it is misleading to anyone reading it.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<h4 aria-level="2"><b><span data-contrast="none">A Grade Can Create Problems for You</span></b><span data-ccp-props="{&quot;335559738&quot;:280,&quot;335559739&quot;:120}"> </span></h4>
<p><span data-contrast="auto">If your LoA shows a B+ and a breach occurs later, that grade becomes a liability. Stakeholders may point to it as evidence that you represented your security as stronger than it was. A penetration test is a point-in-time assessment and framing it as a score implies something closer to a certification, which it is not.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<h4 aria-level="2"><b><span data-contrast="none">The Industry Measures Risk by Severity, Not Score</span></b><span data-ccp-props="{&quot;335559738&quot;:280,&quot;335559739&quot;:120}"> </span></h4>
<p><span data-contrast="auto">Security findings are categorized as Critical, High, Medium or Low based on how exploitable they are and what the business impact would be. That framework is precise and consistent. A Remote Code Execution vulnerability is Critical regardless of who assesses it. A grade introduces subjectivity where there should not be any.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<h4 aria-level="2"><b><span data-contrast="none">The LoA and the Technical Report Serve Different Purposes</span></b><span data-ccp-props="{&quot;335559738&quot;:280,&quot;335559739&quot;:120}"> </span></h4>
<p><span data-contrast="auto">The LoA is a clean external document. The technical report is the detailed internal record. Putting a grade on the LoA blurs that line and risks surfacing internal details in a document that was never meant to carry them.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<p><span data-contrast="auto">Your clients and auditors are not looking for a score. They want confirmation that real testing happened and that problems were fixed. A well-written LoA does that more clearly than any grade could.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<h4 aria-level="1"><b><span data-contrast="none">When Should You Get One?</span></b><span data-ccp-props="{&quot;335559738&quot;:320,&quot;335559739&quot;:160}"> </span></h4>
<p><span data-contrast="auto">Any time a client, auditor, or insurer needs proof that security testing happened, an LoA is what they are asking for. The most common triggers:</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="12" data-aria-level="1"><span data-contrast="auto">A client or prospect requires security documentation as part of vendor onboarding.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="13" data-aria-level="1"><span data-contrast="auto">You are pursuing SOC 2, ISO 27001, or a similar compliance certification.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="14" data-aria-level="1"><span data-contrast="auto">A past security incident requires documented proof of remediation.</span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" data-aria-posinset="15" data-aria-level="1"><span data-contrast="auto">Company leadership / board requires one each year. </span><span data-ccp-props="{&quot;335559738&quot;:80,&quot;335559739&quot;:80}"> </span></li>
</ul>
<h4 aria-level="1"><b><span data-contrast="none">How Guard Street Can Help</span></b><span data-ccp-props="{&quot;335559738&quot;:320,&quot;335559739&quot;:160}"> </span></h4>
<p><span data-contrast="auto">If a client or partner is asking for a Letter of Attestation and you are not sure where to start, or if you want to make sure your security program is documented in a way that holds up to real scrutiny, Guard Street can help.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
<p><span data-contrast="auto">Visit </span><a href="http://www.guardstreet.com/connect"><span data-contrast="none">www.guardstreet.com/connect</span></a><span data-contrast="auto"> to discuss what your business needs and how to get there.</span><span data-ccp-props="{&quot;335559738&quot;:100,&quot;335559739&quot;:160}"> </span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/what-is-a-letter-of-attestation-and-why-does-your-business-need-one/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The LiteLLM Compromise: What the Biggest AI Supply Chain Attack of 2026 Means for Your Business</title>
		<link>https://guardstreet.com/the-litellm-compromise-what-the-biggest-ai-supply-chain-attack-of-2026-means-for-your-business/</link>
					<comments>https://guardstreet.com/the-litellm-compromise-what-the-biggest-ai-supply-chain-attack-of-2026-means-for-your-business/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 17:12:02 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3625</guid>

					<description><![CDATA[On the morning of March 24th, tens of thousands of developers building AI-powered applications went about their normal routines. They pulled software packages, ran builds, and shipped code. What most of them did not realize was that one of the most widely used tools in the AI ecosystem had been quietly weaponized overnight. LiteLLM is  [...]]]></description>
										<content:encoded><![CDATA[<p>On the morning of March 24th, tens of thousands of developers building AI-powered applications went about their normal routines. They pulled software packages, ran builds, and shipped code. What most of them did not realize was that one of the most widely used tools in the AI ecosystem had been quietly weaponized overnight.</p>
<p>LiteLLM is an open-source Python library that acts as a universal gateway to over 100 large language model providers, including OpenAI, Anthropic, Google, and Amazon. On March 24th, a threat group called TeamPCP used stolen credentials to upload two poisoned versions of the package to PyPI (Python Package Index), the public repository that developers worldwide depend on. Those compromised versions sat there for roughly three hours before anyone caught it.</p>
<p>Three hours does not sound like much. But for a package with an estimated 95 million monthly downloads, that window was more than enough to cause serious damage.</p>
<h3>Why This One Is Different</h3>
<p>LiteLLM is not some obscure utility buried deep in a codebase. Its entire purpose is to sit between your applications and your AI providers and manage the API keys, credentials and access tokens for all of them in one place. Compromising LiteLLM does not give an attacker one key. It gives them <em>every</em> key.</p>
<p>The malware embedded in the compromised versions was engineered to sweep up the entire credential surface of a modern AI deployment: cloud provider keys for AWS, GCP and Azure; SSH keys; Docker configurations; CI/CD tokens; database credentials; and even cryptocurrency wallets. All of it was encrypted before being shipped to an attacker-controlled server.</p>
<p>In plain terms: if your organization was running one of the affected versions, the attackers potentially walked away with the keys to your entire digital infrastructure. Not just your AI tools, but everything connected to them.</p>
<h3>The Lucky Break</h3>
<p>The attack was not discovered by a monitoring system or a security audit. It was thankfully caught because of a bug in the malware itself. A researcher named Callum McMahon was testing an unrelated tool that happened to pull in LiteLLM automatically as a hidden dependency. The malicious code had a flaw that caused it to spawn processes uncontrollably until it consumed all available memory and crashed his machine.</p>
<p>McMahon investigated the crash, traced it to LiteLLM, and reported it. Within hours, the compromised packages were pulled. But as AI researcher Andrej Karpathy pointed out publicly: if the attackers had not made that coding mistake, the malware could have run undetected for weeks, silently collecting credentials from organizations around the world.</p>
<p>The difference between a contained incident and a prolonged credential harvest across the global AI development community came down to sloppy code written by the attackers themselves.</p>
<h3>The Ripple Effect</h3>
<p>What makes this especially alarming is that LiteLLM is not just installed directly by developers. It gets pulled in automatically as a hidden dependency by a large number of major AI frameworks. Projects including Microsoft GraphRAG, Google ADK, DSPy, MLflow, CrewAI, and OpenHands all depended on LiteLLM. Over 600 public repositories had unprotected LiteLLM dependencies at the time of the compromise.</p>
<p>Consequently, organizations using those tools may have been exposed without anyone on their team ever directly installing LiteLLM. If your company runs AI workloads of any kind, there is a real chance that LiteLLM is somewhere in your software supply chain whether your team put it there or not.</p>
<h3>What This Means for Your Organization</h3>
<p>You do not need to be a technology company to be affected by this. If your organization uses AI-powered tools, chatbots, automation, analytics, or any application that connects to large language models, you are part of the ecosystem that was just compromised. A few questions worth asking:</p>
<p><strong>Do you know what your AI tools depend on? </strong>Most organizations have adopted AI tooling quickly without applying the same supply chain scrutiny they would to other critical software. If you cannot answer the question &#8220;what open-source packages does our AI stack rely on,&#8221; that is a gap that needs attention.</p>
<p><strong>Are your software dependencies locked to verified versions? </strong>The difference between installing a package with an open version range and locking it to a specific, reviewed version is the difference between a door with a deadbolt and a door propped open with a brick.</p>
<p><strong>How are credentials managed across your AI infrastructure? </strong>Tools like LiteLLM concentrate API keys and cloud credentials into a single point. If that point is compromised, the blast radius extends across every provider and system those credentials touch.</p>
<p><strong>Are your own security tools introducing risk? </strong>This entire chain of events started with a compromised security scanner. The tools your team relies on to protect your environment can themselves become the entry point if they are not properly verified and maintained.</p>
<h3>The Bigger Picture</h3>
<p>The era of blindly trusting open-source AI infrastructure is over. Organizations everywhere have rushed to adopt AI tools, and in that rush, many have skipped the supply chain diligence they would apply to any other critical piece of software. That gap is now being actively exploited by sophisticated threat actors who understand exactly where the weak points are.</p>
<p>At Guard Street, we have been having these conversations with business and technology leaders for months. The rapid adoption of AI has created entirely new categories of risk that most existing security programs were not built to handle. If your organization is treating AI infrastructure like any other software dependency, without dedicated scrutiny, it is time for a reassessment.</p>
<p>The LiteLLM compromise is a wake-up call. Whether your organization responds to it now or learns the lesson the hard way is a decision that is being made today, whether anyone in the room realizes it or not.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/the-litellm-compromise-what-the-biggest-ai-supply-chain-attack-of-2026-means-for-your-business/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Russian Military Hackers Just Hijacked 18,000 Routers. Is Yours One of Them?</title>
		<link>https://guardstreet.com/russian-military-hackers-just-hijacked-18000-routers-is-yours-one-of-them/</link>
					<comments>https://guardstreet.com/russian-military-hackers-just-hijacked-18000-routers-is-yours-one-of-them/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 19:14:15 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3620</guid>

					<description><![CDATA[On April 7th, over 18,000 home and small business routers in 120 countries were penetrated by a Russian military intelligence operation, which the FBI, NSA, Department of Justice, and law enforcement partners from 15 nations declared they had stopped on April 7. Codenamed Operation Masquerade, the operation targeted infrastructure under the control of APT28, a  [...]]]></description>
										<content:encoded><![CDATA[<p>On April 7th, over 18,000 home and small business routers in 120 countries were penetrated by a Russian military intelligence operation, which the FBI, NSA, <a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4453919/nsa-supports-fbi-in-highlighting-russian-gru-threats-against-routers/">Department of Justice, and law enforcement partners from 15 nations declared they had stopped on April 7.</a> Codenamed Operation Masquerade, the operation targeted infrastructure under the control of APT28, a Russian GRU hacking outfit that has been operational for more than 20 years. They may also go by the titles Forest Blizzard or Fancy Bear.</p>
<p>Malware in the conventional sense was not installed by the attackers. They altered the DNS settings of the devices by taking use of known flaws in consumer-grade TP-Link routers. They were able to covertly reroute internet traffic from all of the network&#8217;s devices through servers under their control thanks to that one modification. They then collected emails, passwords, login tokens, and other private information. The end user did not need to interact with the assault. The majority of victims were unaware that something was amiss.</p>
<p>Microsoft found that the campaign affected 5,000 individual devices and more than 200 organizations. Governmental organizations, military personnel, defense contractors, operators of vital infrastructure, and telecom companies in North America, Europe, Africa, Central America, and Southeast Asia were among the targets. After casting a broad net, the GRU filtered for intelligence targets with high value.</p>
<p>In order to prevent the attackers from regaining access, the FBI responded by issuing court-authorized commands to hacked routers located within the United States to reset their DNS settings. The operation did not gather user data or interfere with regular router operation. However, the fact that the FBI had to remotely intervene in devices sitting in American homes and offices should tell you something about the scale of the problem.</p>
<h3>Why Routers Are the Weakest Link</h3>
<p>Home routers have been attacked by nation-states before, and this won&#8217;t be the last. A Chinese botnet that had taken control of hundreds of similar devices was stopped by the FBI in 2024. It was the Cyclops Blink botnet in 2022. VPNFilter in 2018 came before that. Because routers are the most overlooked component of security infrastructure in the majority of households and companies, the trend continues to recur.</p>
<p>This continues to occur for several reasons:</p>
<p><strong>Firmware updates are manual and invisible. </strong>Most routers don&#8217;t update automatically, in contrast to your laptop or phone. Most users have never seen the admin panel they must log into in order to update. Automatic updates are rarely released by manufacturers, and many older devices no longer receive any updates at all.</p>
<p><strong>Default credentials are everywhere. </strong>How many users have altered the default admin password on their router? Every study that has ever been done on the subject has found that the response is far from sufficient.  Many routers still ship with credentials like &#8220;admin/admin&#8221; or publicly documented defaults that attackers can look up in seconds.</p>
<p><strong>Remote management is often enabled by default. </strong>Anybody can try to access the admin panel from anywhere in the globe because some routers come with remote administration interfaces that are open to the internet. The majority of users are unaware that this feature even exists, much less that it need to be disabled.</p>
<p><strong>Nobody monitors router activity. </strong>Laptops and servers are safeguarded by endpoint security technologies. Inboxes are protected by email security measures. However, very few people are keeping an eye on what the router is doing. There was no alarm when APT28 altered DNS settings on hacked routers. All of the network&#8217;s devices were silently affected by the modification.</p>
<p><strong>End-of-life devices stay in service for years. </strong>Unlike phones, which are replaced every few years, routers are not. Hardware that was long since discontinued by the manufacturer is still in use in many homes and businesses. These devices continue to be linked to the internet and trusted to manage all network traffic, but they will never get another security patch.</p>
<h3>The Remote Work Problem</h3>
<p>This issue has significantly worsened due to the transition to remote and hybrid work. Prior to 2020, corporate networks with specialized firewalls, intrusion detection systems, and IT professionals keeping an eye on traffic handled the majority of sensitive business data. Nowadays, a large amount of that same data passes through consumer-grade routers that staff members purchased from a big-box retailer and mindlessly plugged in.</p>
<p>This is particularly mentioned in the NSA&#8217;s advice, which advises companies that use telework to examine their policies for employee access to sensitive data, including the usage of VPNs and hardened application setups. The reason for this suggestion is that the agency recognizes what this attack showed: when a home router is compromised, the attacker does not simply see the router. They perceive everything that is related to it. The fraudulent DNS settings are passed down to any device connected to that Wi-Fi network. Every email, file transfer, and login from every device in the house passes through infrastructure under the attacker&#8217;s control.</p>
<p>This implies that your security perimeter now encompasses each employee&#8217;s home network if your company employs remote workers. Additionally, you typically have little visibility into what&#8217;s going on there.</p>
<h3>What You Should Do</h3>
<p>The good news is that self-defense measures are simple. Unfortunately, the majority of individuals and institutions have not adopted them. Here are our recommendations based on the FBI, NSA, and CISA guidelines:</p>
<ol>
<li><strong>Change your router’s admin credentials. </strong>If your router’s login is still set to the factory default, change it immediately. Use a strong, unique password. This is the single most impactful step you can take.</li>
<li><strong>Update your router’s firmware. </strong>Log into your router’s admin panel and check for available updates. If you do not know how, your manufacturer’s website will have instructions. If your router is no longer receiving updates from the manufacturer, it is time to replace it.</li>
<li><strong>Disable remote management. </strong>Unless you have a specific reason to manage your router from outside your network, turn this feature off. It is one of the primary ways attackers gain initial access.</li>
<li><strong>Replace end-of-life hardware. </strong>If your router is old enough that the manufacturer has stopped issuing security updates, it is a liability. No amount of configuration hardening can protect a device with known, unpatched vulnerabilities.</li>
<li><strong>Pay attention to certificate warnings. </strong>The NSA specifically flagged this. If your browser or email client starts showing certificate warnings that it did not show before, do not ignore them. A DNS hijacking attack can trigger these warnings because traffic is being routed through an untrusted server.</li>
<li><strong>Review your remote work policies. </strong>If your organization has employees working from home, you need to address the security of their home networks. At a minimum, require VPN usage for accessing sensitive systems. Better yet, provide guidance or support for employees to secure their home routers.</li>
</ol>
<h3>The Bigger Picture</h3>
<p>Since 2018, the FBI has now carried out four significant operations to combat nation-state router breaches. Every time, the assailants broadened their scope and changed their strategies. Unmanaged, unmonitored, unpatched consumer networking equipment at the edge of networks handling sensitive data was the underlying vulnerability in each case.</p>
<p>These hazards are not hypothetical. Before this operation was stopped, Russian military intelligence secretly collected credentials from infected routers for at least two years. Over 200 organizations and 120 countries were impacted by the program. And this is the only one that we are aware of.</p>
<p>&nbsp;</p>
<p>At Guard Street, we collaborate with companies to find and fill precisely these kinds of gaps. One of the most neglected aspects of most security programs is router and edge device protection, and events like Operation Masquerade serve as a reminder that the dangers are genuine, active, and aimed at companies of all sizes.</p>
<p>The FBI advises getting in touch with your local field office or submitting a report to the Internet Crime Complaint Center at ic3.gov if you think your router has been compromised.</p>
<p><em><strong>Guard Street</strong> provides cybersecurity advisory, threat intelligence, and strategic risk management for organizations navigating an evolving threat landscape. To learn how we can help your organization assess and strengthen its security posture, visit guardstreet.com.</em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/russian-military-hackers-just-hijacked-18000-routers-is-yours-one-of-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Iranian Cyberattacks Are Here. Is Your Organization Next? </title>
		<link>https://guardstreet.com/iranian-cyberattacks-are-here-is-your-organization-next/</link>
					<comments>https://guardstreet.com/iranian-cyberattacks-are-here-is-your-organization-next/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 01:28:17 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3608</guid>

					<description><![CDATA[Last week, Stryker, one of the world's largest medical device companies with over $25 billion in revenue and operations in 61 countries was hit with a cyberattack.   The Iran-linked hacktivist group Handala claimed responsibility, alleging they wiped data from more than 200,000 systems and servers, forcing Stryker's offices across 79 countries to shut down. Investigators believe the attackers gained access to Stryker's Microsoft  [...]]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="auto">Last week, Stryker, one of the world&#8217;s largest medical device companies with over $25 billion in revenue and operations in 61 countries was hit with a cyberattack. </span><span data-ccp-props="{&quot;335559739&quot;:200}"> </span></p>
<p><span data-contrast="auto">The Iran-linked hacktivist group Handala claimed responsibility, alleging they wiped data from more than 200,000 systems and servers, forcing Stryker&#8217;s offices across 79 countries to shut down. Investigators believe the attackers gained access to Stryker&#8217;s Microsoft Intune management console, then used it to wipe corporate devices back to factory settings. A devastating result that required no ransomware, no malware. Just administrative access turned against the company itself.</span><span data-ccp-props="{&quot;335559739&quot;:200}"> </span></p>
<p><b><span data-contrast="auto">This is what modern nation-state warfare looks like.</span></b><span data-ccp-props="{&quot;335559739&quot;:280}"> </span></p>
<h3 data-ccp-border-between="0px none #000000" data-ccp-padding-between="0px" aria-level="2"></h3>
<h4 data-ccp-border-between="0px none #000000" data-ccp-padding-between="0px" aria-level="2"><b><span data-contrast="none">The Threat Is Escalating Fast</span></b><span data-ccp-props="{&quot;335559738&quot;:280,&quot;335559739&quot;:140,&quot;335572071&quot;:0,&quot;335572072&quot;:0,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:0,&quot;335572076&quot;:0,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:0,&quot;335572080&quot;:0,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:0,&quot;335572084&quot;:0,&quot;335572085&quot;:4278190080,&quot;335572087&quot;:0,&quot;335572088&quot;:0,&quot;335572089&quot;:4278190080,&quot;469789798&quot;:&quot;nil&quot;,&quot;469789802&quot;:&quot;nil&quot;,&quot;469789806&quot;:&quot;nil&quot;,&quot;469789810&quot;:&quot;nil&quot;,&quot;469789814&quot;:&quot;nil&quot;}"> </span></h4>
<p><span data-contrast="auto">Iran has historically relied on cyber operations as a primary tool of retaliation, precisely because it lacks the conventional military reach to strike back symmetrically against the United States and Israel. Since the U.S.-Israel military campaign began in late February, that calculus has shifted dramatically.</span><span data-ccp-props="{&quot;335559739&quot;:200}"> </span></p>
<p><span data-contrast="auto">Multiple Iranian state-aligned groups have formed under a coordinated &#8220;Electronic Operations Room,&#8221; with Handala, linked directly to Iran&#8217;s Ministry of Intelligence and Security, claiming attacks against energy companies, payment systems, and now American critical infrastructure.</span><span data-ccp-props="{&quot;335559739&quot;:200}"> </span></p>
<p><span data-contrast="auto">The Stryker attack is not an isolated incident, but the first of likely many. This is a signal to the US.</span><span data-ccp-props="{&quot;335559739&quot;:280}"> </span></p>
<h3 data-ccp-border-between="0px none #000000" data-ccp-padding-between="0px" aria-level="2"></h3>
<h4 data-ccp-border-between="0px none #000000" data-ccp-padding-between="0px" aria-level="2"><b><span data-contrast="none">Who Needs to Be on Guard</span></b><span data-ccp-props="{&quot;335559738&quot;:280,&quot;335559739&quot;:140,&quot;335572071&quot;:0,&quot;335572072&quot;:0,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:0,&quot;335572076&quot;:0,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:0,&quot;335572080&quot;:0,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:0,&quot;335572084&quot;:0,&quot;335572085&quot;:4278190080,&quot;335572087&quot;:0,&quot;335572088&quot;:0,&quot;335572089&quot;:4278190080,&quot;469789798&quot;:&quot;nil&quot;,&quot;469789802&quot;:&quot;nil&quot;,&quot;469789806&quot;:&quot;nil&quot;,&quot;469789810&quot;:&quot;nil&quot;,&quot;469789814&quot;:&quot;nil&quot;}"> </span></h4>
<p><span data-contrast="auto">Threat analysts and ratings agencies are warning that the current environment puts local governments, critical infrastructure providers, and major U.S. companies at heightened risk. Attacks range from DDoS to financially motivated intrusions to full data-wiping operations. Currently, the sectors with the greatest exposure include:</span><span data-ccp-props="{&quot;335559739&quot;:160}"> </span></p>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="none">Healthcare and medical technology</span></b><span data-contrast="none"> &#8212; as Stryker demonstrates, patient-care disruptions create maximum pressure.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335572071&quot;:0,&quot;335572072&quot;:0,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:0,&quot;335572076&quot;:0,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:0,&quot;335572080&quot;:0,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:0,&quot;335572084&quot;:0,&quot;335572085&quot;:4278190080,&quot;335572087&quot;:0,&quot;335572088&quot;:0,&quot;335572089&quot;:4278190080,&quot;469789798&quot;:&quot;nil&quot;,&quot;469789802&quot;:&quot;nil&quot;,&quot;469789806&quot;:&quot;nil&quot;,&quot;469789810&quot;:&quot;nil&quot;,&quot;469789814&quot;:&quot;nil&quot;}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="none">Energy and utilities</span></b><span data-contrast="none"> &#8212; Iranian state-sponsored actors have repeatedly targeted water and energy sector networks and industrial control systems.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335572071&quot;:0,&quot;335572072&quot;:0,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:0,&quot;335572076&quot;:0,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:0,&quot;335572080&quot;:0,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:0,&quot;335572084&quot;:0,&quot;335572085&quot;:4278190080,&quot;335572087&quot;:0,&quot;335572088&quot;:0,&quot;335572089&quot;:4278190080,&quot;469789798&quot;:&quot;nil&quot;,&quot;469789802&quot;:&quot;nil&quot;,&quot;469789806&quot;:&quot;nil&quot;,&quot;469789810&quot;:&quot;nil&quot;,&quot;469789814&quot;:&quot;nil&quot;}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="none">Financial services</span></b><span data-contrast="none"> &#8212; U.S. security officials have specifically warned that the financial sector has historically been a target for Iranian-aligned groups during periods of elevated tension.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335572071&quot;:0,&quot;335572072&quot;:0,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:0,&quot;335572076&quot;:0,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:0,&quot;335572080&quot;:0,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:0,&quot;335572084&quot;:0,&quot;335572085&quot;:4278190080,&quot;335572087&quot;:0,&quot;335572088&quot;:0,&quot;335572089&quot;:4278190080,&quot;469789798&quot;:&quot;nil&quot;,&quot;469789802&quot;:&quot;nil&quot;,&quot;469789806&quot;:&quot;nil&quot;,&quot;469789810&quot;:&quot;nil&quot;,&quot;469789814&quot;:&quot;nil&quot;}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="none">Defense and aerospace</span></b><span data-contrast="none"> &#8212; defense industrial base companies, particularly those with ties to Israeli research and defense firms, are at increased risk</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335572071&quot;:0,&quot;335572072&quot;:0,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:0,&quot;335572076&quot;:0,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:0,&quot;335572080&quot;:0,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:0,&quot;335572084&quot;:0,&quot;335572085&quot;:4278190080,&quot;335572087&quot;:0,&quot;335572088&quot;:0,&quot;335572089&quot;:4278190080,&quot;469789798&quot;:&quot;nil&quot;,&quot;469789802&quot;:&quot;nil&quot;,&quot;469789806&quot;:&quot;nil&quot;,&quot;469789810&quot;:&quot;nil&quot;,&quot;469789814&quot;:&quot;nil&quot;}"> </span></li>
</ul>
<ul>
<li aria-setsize="-1" data-leveltext="•" data-font="" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;•&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" data-aria-posinset="5" data-aria-level="1"><b><span data-contrast="none">Every U.S. multinational</span></b><span data-contrast="none"> &#8212; as one former CIA official put it plainly: every American company operating internationally should be briefing its overseas personnel right now</span><span data-ccp-props="{&quot;335559739&quot;:280,&quot;335572071&quot;:0,&quot;335572072&quot;:0,&quot;335572073&quot;:4278190080,&quot;335572075&quot;:0,&quot;335572076&quot;:0,&quot;335572077&quot;:4278190080,&quot;335572079&quot;:0,&quot;335572080&quot;:0,&quot;335572081&quot;:4278190080,&quot;335572083&quot;:0,&quot;335572084&quot;:0,&quot;335572085&quot;:4278190080,&quot;335572087&quot;:0,&quot;335572088&quot;:0,&quot;335572089&quot;:4278190080,&quot;469789798&quot;:&quot;nil&quot;,&quot;469789802&quot;:&quot;nil&quot;,&quot;469789806&quot;:&quot;nil&quot;,&quot;469789810&quot;:&quot;nil&quot;,&quot;469789814&quot;:&quot;nil&quot;}"> </span></li>
</ul>
<h3 data-ccp-border-between="0px none #000000" data-ccp-padding-between="0px" aria-level="2"></h3>
<h4 data-ccp-border-between="0px none #000000" data-ccp-padding-between="0px" aria-level="2"><strong>What This Means for Your Organization </strong></h4>
<p><span data-contrast="auto">The Stryker attack succeeded not because of exotic zero-day exploits, but because of access. Specifically, privileged administrative access to a device management platform. This is a pattern we see repeatedly with Iranian threat actors: they find the door you left unlocked, walk in, and use your own tools against you.</span><span data-ccp-props="{&quot;335559739&quot;:200}"> </span></p>
<p><span data-contrast="auto">The fundamentals matter now more than ever: hardened identity and access management, endpoint visibility, rapid detection of abnormal administrative activity, and a tested incident response plan. Nation-state actors do not announce themselves. By the time you know they are in, the damage is often already done.</span><span data-ccp-props="{&quot;335559739&quot;:200}"> </span></p>
<p><span data-contrast="auto">At Guard Street, we work with organizations every day who believe a sophisticated attack will not happen to them, until it does. The Stryker breach is a reminder that no sector, no size, and no geography makes you immune. The question is not whether you are a target. The question is whether you are ready.</span><span data-ccp-props="{&quot;335559739&quot;:280}"> </span></p>
<p><b><span data-contrast="auto">Ready to assess your exposure? Let&#8217;s talk.</span></b></p>
<p><strong>Visit </strong><strong><a href="https://guardstreet.com/connect">https://guardstreet.com/connect</a> </strong>or<strong> call 1-800-811-9130 </strong>to talk with our experts about building a strategic security plan for your organization.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/iranian-cyberattacks-are-here-is-your-organization-next/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beyond the Ransom Note: What Triple Extortion Means for Your Business</title>
		<link>https://guardstreet.com/beyond-the-ransom-note-what-triple-extortion-means-for-your-business/</link>
					<comments>https://guardstreet.com/beyond-the-ransom-note-what-triple-extortion-means-for-your-business/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 06:42:22 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3601</guid>

					<description><![CDATA[When most business owners think about ransomware, they picture locked files and a ransom demand. But today's cybercriminals have evolved far beyond this single-threat model. Modern attacks now involve multiple layers of extortion that can devastate even well-prepared organizations. The Evolution of Extortion Ransomware attacks have transformed from a single threat into a multi-layered nightmare.  [...]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">When most business owners think about ransomware, they picture locked files and a ransom demand. But today&#8217;s cybercriminals have evolved far beyond this single-threat model. Modern attacks now involve multiple layers of extortion that can devastate even well-prepared organizations.</span></p>
<h3><span style="font-weight: 400;">The Evolution of Extortion</span></h3>
<p><span style="font-weight: 400;">Ransomware attacks have transformed from a single threat into a multi-layered nightmare. Here&#8217;s how the tactics have escalated:</span></p>
<p><b>Traditional Ransomware:</b><span style="font-weight: 400;"> Attackers encrypt your files and demand payment for the decryption key. If you have good backups, you might think you&#8217;re safe.</span></p>
<p><b>Double Extortion:</b><span style="font-weight: 400;"> Not so fast. Before encrypting your data, attackers now exfiltrate copies of your most sensitive information. Even if you restore from backups, they threaten to leak your proprietary data, customer information, and confidential records to the public or worse, to your competitors and regulators.</span></p>
<p><b>Triple Extortion:</b><span style="font-weight: 400;"> The newest evolution adds a particularly insidious layer. Attackers don&#8217;t just threaten you; they go directly to your clients, customers, and partners, informing them that their data is at risk and pressuring them to convince you to pay.</span></p>
<p><span style="font-weight: 400;">This progression isn&#8217;t theoretical. It&#8217;s happening to businesses across every industry, and the financial and reputational stakes have never been higher.</span></p>
<h2></h2>
<h3><span style="font-weight: 400;">Why Traditional Defenses Fall Short</span></h3>
<p><span style="font-weight: 400;">The assumption that backups provide complete protection is dangerously outdated. While backups remain an essential component of any security strategy, they only address one aspect of modern ransomware attacks: the encryption.</span></p>
<p><span style="font-weight: 400;">What backups can&#8217;t solve:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Data that&#8217;s already been stolen and is now in the hands of criminals.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The reputational damage from a public data leak.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Regulatory penalties for failing to protect sensitive information.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The loss of competitive advantage when proprietary information is exposed.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Direct threats to your business relationships when attackers contact your customers.</span></li>
</ul>
<p><span style="font-weight: 400;">Organizations that rely solely on backup and recovery strategies are leaving themselves exposed to the most damaging aspects of modern cyberattacks.</span></p>
<h2></h2>
<h3><span style="font-weight: 400;">The Gap Between Assessment and Action</span></h3>
<p><span style="font-weight: 400;">One of the most common patterns we see is organizations that have done the work to identify their vulnerabilities but haven&#8217;t prioritized implementation. They commission security assessments, receive detailed reports highlighting gaps in their defenses, and then those recommendations sit in a drawer while daily business takes precedence.</span></p>
<p><span style="font-weight: 400;">This gap between knowing and doing creates a false sense of security. Leadership believes they&#8217;re addressing cybersecurity because they&#8217;ve invested in assessments. But attackers don&#8217;t care about your good intentions or your budget constraints. They care about exploitable vulnerabilities.</span></p>
<p><span style="font-weight: 400;">Common gaps we see:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Multi-Factor Authentication not enabled across all access points.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Endpoint Protection with a 24/7 Security Operations Center and log monitoring either absent or not actively reviewed.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Privileged access controls not properly segmented.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Incident response plans that exist on paper but haven&#8217;t been tested.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Password management practices that rely on user discipline rather than enforced policies.</span></li>
</ul>
<h2></h2>
<h3><span style="font-weight: 400;">The Secondary Attack Risk</span></h3>
<p><span style="font-weight: 400;">Here&#8217;s a troubling reality that doesn&#8217;t get enough attention: organizations that suffer a ransomware attack face a dramatically elevated risk of a second attack in the immediate aftermath. Statistics show an 80% likelihood of re-victimization within 30 days if the underlying vulnerabilities aren&#8217;t immediately addressed.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Why does this happen? Attackers often maintain access even after the initial attack is discovered. They may have installed backdoors, created additional admin accounts, or compromised credentials that remain valid. Additionally, word spreads within criminal networks when an organization pays a ransom, marking them as a willing payer.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">The crisis mentality that follows an attack often leads to hasty, incomplete remediation. Organizations focus on getting back online quickly rather than comprehensively closing the security gaps that enabled the breach in the first place. This creates a dangerous cycle where each attack is followed by another.</span></p>
<h3></h3>
<h3><span style="font-weight: 400;">Building a Defensible Posture</span></h3>
<p><span style="font-weight: 400;">Effective cybersecurity isn&#8217;t about perfection or unlimited budgets. It&#8217;s about building a defensible posture that makes you a harder target than your competitors. Here&#8217;s what that looks like in practice:</span></p>
<p><b>Multi-Factor Authentication (MFA):</b><span style="font-weight: 400;"> This remains the single most impactful control you can implement. The vast majority of credential-based attacks fail when MFA is properly deployed everywhere possible, especially with email and VPN. It&#8217;s not optional anymore; it&#8217;s foundational.</span></p>
<p><b>Least Privilege Access:</b><span style="font-weight: 400;"> Every employee should have access only to the systems and data necessary for their specific role. This principle dramatically limits an attacker&#8217;s ability to move laterally through your network once they gain initial access. Overly permissive access rights are one of the most common findings in security assessments, and one of the easiest to exploit.</span></p>
<p><b>Active Monitoring with 24/7 SOC:</b><span style="font-weight: 400;"> Attackers typically spend days or even weeks inside a network before executing their attack. During this time, they&#8217;re conducting reconnaissance, elevating privileges, and exfiltrating data. Without active log monitoring and analysis, these activities go completely unnoticed. You can&#8217;t respond to what you can&#8217;t see.</span></p>
<p><b>Strategic Risk-Based Planning:</b><span style="font-weight: 400;"> Cybersecurity shouldn&#8217;t be a reactive exercise where you chase the latest headline threat or respond to every vendor&#8217;s sales pitch. A Quantified Risk Assessment gives you a clear, prioritized roadmap based on your actual risk profile. This allows you to budget intelligently over an 18-to-24-month timeline, focusing resources where they&#8217;ll have the most impact.</span></p>
<p><b>Immutable Backups:</b><span style="font-weight: 400;"> Standard backups are necessary but not sufficient. Modern ransomware specifically targets backup systems for encryption or deletion. Immutable backups that cannot be altered or deleted, even by administrators, provide a last line of defense.</span></p>
<p><b>Tested Incident Response Plans:</b><span style="font-weight: 400;"> Having a plan on paper is meaningless if it hasn&#8217;t been practiced. Regular tabletop exercises reveal gaps in your procedures, clarify decision-making authority, and ensure your team knows their roles during a crisis.</span></p>
<h2></h2>
<h3><span style="font-weight: 400;">The Real Cost of Inaction</span></h3>
<p><span style="font-weight: 400;">Triple extortion attacks amplify every dimension of risk:</span></p>
<p><b>Financial Impact:</b><span style="font-weight: 400;"> The direct costs extend far beyond any ransom payment. Incident response services, forensic investigation, legal fees, regulatory fines, customer notification, credit monitoring services, and potential lawsuits all add up quickly. For many organizations, the total cost of a breach is 10-20 times the ransom demand itself.</span></p>
<p><b>Reputational Damage:</b><span style="font-weight: 400;"> When your clients and partners learn that their data was compromised while in your care, especially if they hear it directly from the attackers rather than from you, trust evaporates. These relationships often take years to build and moments to destroy.</span></p>
<p><b>Operational Disruption:</b><span style="font-weight: 400;"> Even with good backups, recovery takes time. Every hour of downtime translates to lost revenue, missed deadlines, and frustrated customers. For some businesses, extended downtime can be existential.</span></p>
<p><b>Regulatory Consequences:</b><span style="font-weight: 400;"> Data breaches trigger mandatory notification requirements and often invite regulatory scrutiny. Depending on your industry and the nature of the data involved, penalties under HIPAA, PCI DSS, GDPR, or state privacy laws can be substantial.</span></p>
<p><b>Competitive Disadvantage:</b><span style="font-weight: 400;"> When proprietary information, customer lists, pricing strategies, or intellectual property falls into competitors&#8217; hands, the damage compounds over time in ways that are difficult to quantify but impossible to ignore.</span></p>
<h2></h2>
<h3><span style="font-weight: 400;">From Reactive to Proactive</span></h3>
<p><span style="font-weight: 400;">The most effective cybersecurity programs share a common characteristic: they&#8217;re proactive rather than reactive. Instead of responding to incidents after they occur, they focus on preventing incidents in the first place.</span></p>
<p><span style="font-weight: 400;">This shift requires a change in mindset. Cybersecurity can&#8217;t be viewed as a cost center or a compliance checkbox. It needs to be understood as business enablement. The organizations that grow confidently, pursue new opportunities, and build lasting customer relationships are the ones that have built trust through demonstrated security practices.</span></p>
<p><span style="font-weight: 400;">A strategic approach to cybersecurity:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Understand your current risk profile through comprehensive assessment.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Prioritize remediation based on your critical assets and actual business impact, not just technical severity.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement controls systematically over a realistic timeline.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Validate effectiveness through testing and continuous monitoring.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Adapt as your business and the threat landscape evolve.</span></li>
</ol>
<h2></h2>
<h3><span style="font-weight: 400;">Moving Forward</span></h3>
<p><span style="font-weight: 400;">The evolution from single extortion to triple extortion ransomware represents a fundamental shift in the threat landscape. Attackers have adapted to overcome traditional defenses like backups, and they&#8217;ve found ways to apply maximum pressure through multiple threat vectors simultaneously.</span></p>
<p><span style="font-weight: 400;">But this doesn&#8217;t mean organizations are helpless. The controls needed to defend against these attacks are well understood and achievable. What&#8217;s required is commitment to implementation, not just assessment.</span></p>
<p><span style="font-weight: 400;">Guard Street specializes in helping businesses build practical, cost-effective cybersecurity programs that address these evolving threats. From Quantified Risk Assessments to 24/7 monitoring and incident response, we provide the layered defense modern businesses need.</span></p>
<p><span style="font-weight: 400;">For a detailed look at how triple extortion attacks unfold in real-world scenarios, check out our recent discussion on WJOB Radio: </span><a href="https://guardstreet.com/double-triple-extortion-ransomware-in-action/"><span style="font-weight: 400;">https://guardstreet.com/double-triple-extortion-ransomware-in-action/</span></a></p>
<p><b>Ready to strengthen your cyber posture?</b><span style="font-weight: 400;"> Visit </span><a href="https://guardstreet.com/connect"><span style="font-weight: 400;">https://guardstreet.com/connect</span></a><span style="font-weight: 400;"> or call 1-800-811-9130 to talk with our experts about building a strategic security plan for your organization.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/beyond-the-ransom-note-what-triple-extortion-means-for-your-business/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Double &#038; Triple Extortion Ransomware in Action</title>
		<link>https://guardstreet.com/double-triple-extortion-ransomware-in-action/</link>
					<comments>https://guardstreet.com/double-triple-extortion-ransomware-in-action/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 07:49:21 +0000</pubDate>
				<category><![CDATA[Podcast]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3596</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="fusion-video fusion-youtube" style="--awb-max-width:600px;--awb-max-height:350px;"><div class="video-shortcode"><div class="fluid-width-video-wrapper" style="padding-top:58.33%;" ><iframe title="YouTube video player 2" src="https://www.youtube.com/embed/HZC5N8QKJaY?wmode=transparent&autoplay=0" width="600" height="350" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture;"></iframe></div></div></div>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/double-triple-extortion-ransomware-in-action/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Rising Cost of Ransomware in 2026: Real-World Impact and Prevention Strategies</title>
		<link>https://guardstreet.com/the-rising-cost-of-ransomware-in-2026-real-world-impact-and-prevention-strategies/</link>
					<comments>https://guardstreet.com/the-rising-cost-of-ransomware-in-2026-real-world-impact-and-prevention-strategies/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 06:21:28 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3590</guid>

					<description><![CDATA[Ransomware continues to be one of the most persistent and costly threats facing organizations. In 2026, mid-market companies (typically 100 to1,000 employees) are seeing average recovery costs climb into the $200,000 to $2.5 million range per incident, often driven more by extended downtime and operational disruption than by ransom payments themselves. While the numbers can  [...]]]></description>
										<content:encoded><![CDATA[<p>Ransomware continues to be one of the most persistent and costly threats facing organizations. In 2026, mid-market companies (typically 100 to1,000 employees) are seeing average recovery costs climb into the $200,000 to $2.5 million range per incident, often driven more by extended downtime and operational disruption than by ransom payments themselves.</p>
<p>While the numbers can feel daunting, the good news is that ransomware is increasingly preventable and manageable with the right preparation. This article outlines the current landscape of ransomware costs, what drives those figures and practical steps organizations can take to reduce both likelihood and impact.</p>
<p>&nbsp;</p>
<h4>Why Ransomware Costs Keep Rising</h4>
<p>Several trends are pushing costs higher in 2026:</p>
<ol>
<li><strong>Double and Triple Extortion Tactics:</strong> Attackers don’t just encrypt data, they exfiltrate it first, then threaten public release or contact customers directly. This multi-layered pressure increases negotiation complexity and reputational risk.</li>
<li><strong>Targeting of Backups and Recovery Systems:</strong> Sophisticated groups now specifically seek out and encrypt or delete backups. When recovery takes longer, business interruption costs (lost revenue, employee idle time, customer impact) skyrocket.</li>
<li><strong>Supply Chain and Third-Party Entry Points:</strong> A single compromised vendor can lead to widespread infection. Mid-market firms often lack the resources to fully vet every partner, creating hidden vulnerabilities.</li>
<li><strong>Regulatory and Insurance Fallout:</strong> Stricter incident reporting rules (e.g., SEC requirements, state laws) and cyber insurance carriers demanding higher deductibles or denying coverage for unprepared organizations add financial strain.</li>
</ol>
<p>&nbsp;</p>
<h4>Quantifying the Real Impact</h4>
<p>A useful framework for understanding ransomware risk is Annualized Loss Expectancy (ALE):</p>
<p>● <strong>Single Loss Expectancy (SLE):</strong> Estimated cost of one successful incident (downtime, recovery, legal, PR, etc.)</p>
<p>● <strong>Annual Rate of Occurrence (ARO):</strong> How often you expect an incident in a given year (e.g., 0.1 = once every 10 years)</p>
<p>● <strong>ALE = SLE × ARO</strong></p>
<p>For many mid-market organizations, even a conservative estimate shows ALE in the hundreds of thousands to millions annually, making proactive investment in prevention and resilience far more cost-effective than reacting after an attack.</p>
<p>&nbsp;</p>
<h4>Practical Prevention and Resilience Strategies</h4>
<p>Here are actionable steps that mid-market teams can implement without massive budgets or overhauls:</p>
<ol>
<li><strong>Implement the 3-2-1 Backup Rule (and Test It)</strong>:
<ul>
<li>Three copies of data</li>
<li>On two different media types</li>
<li>One copy offsite and immutable test monthly restores—unverified backups are a common failure point.</li>
</ul>
</li>
<li><strong>Segment Networks Aggressively:</strong> Isolate critical systems (finance, HR, customer data) so that one compromised endpoint cannot spread laterally. Use micro-segmentation where possible.</li>
<li><strong>Adopt Multi-Factor Authentication (MFA) Everywhere:</strong> Prioritize hardware keys or biometrics for admin accounts and remote access. Phishing resistant MFA blocks the majority of initial entry points.</li>
<li><strong>Run Regular Incident Response Tabletop Exercises:</strong> Simulate a ransomware scenario with your leadership team quarterly. These sessions clarify roles, reduce panic, and uncover gaps in communication and decision-making—often more valuable than technology alone.</li>
<li><strong>Conduct an Independent Quantified Risk Assessment Annually:</strong> A knowledgeable cybersecurity company understand the right questions to ask to address changes in your environment (technically and non-technically) and can update the risk quantification for your organization. This is essential in helping prioritize your focus and spending (e.g., spending $40K on better backups and training could reduce ALE by $300K).</li>
</ol>
<p>&nbsp;</p>
<h4>Looking Ahead with Confidence</h4>
<p>Ransomware in 2026 is serious, but it is not inevitable. Organizations that prepare thoughtfully, quantify their risks and focus on resilience rather than reaction are far better positioned to weather incidents with minimal disruption.</p>
<p>As a cybersecurity boutique, Guard Street specializes in a tailored approach with quantification and AI strategic considerations to deliver vulnerability assessments, tabletop exercises, and compliance guidance as your dedicated cybersecurity partner. Connect with us for a complimentary consultation to map these strategies to your environment.</p>
<p>We’d be happy to discuss how these approaches could apply to your organization. Feel free to reach out for a complimentary conversation.</p>
<p><em><strong><a href="http://guardstreet.com/connect">Connect with Guard Street</a></strong></em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/the-rising-cost-of-ransomware-in-2026-real-world-impact-and-prevention-strategies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2026 Cybersecurity Landscape: Key Threats and Proactive Strategies</title>
		<link>https://guardstreet.com/2026-cybersecurity-landscape-key-threats-and-proactive-strategies/</link>
					<comments>https://guardstreet.com/2026-cybersecurity-landscape-key-threats-and-proactive-strategies/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Thu, 15 Jan 2026 18:44:52 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3569</guid>

					<description><![CDATA[The new year brings a cybersecurity environment shaped by rapid technological advances and persistent, evolving risks. For mid-market organizations, the focus remains on practical measures that deliver meaningful protection without unnecessary complexity. This overview highlights four key threats anticipated in 2026 and actionable strategies to address them, grounded in current trends and real-world data.    [...]]]></description>
										<content:encoded><![CDATA[<p>The new year brings a cybersecurity environment shaped by rapid technological advances and persistent, evolving risks. For mid-market organizations, the focus remains on practical measures that deliver meaningful protection without unnecessary complexity. This overview highlights four key threats anticipated in 2026 and actionable strategies to address them, grounded in current trends and real-world data.</p>
<p>&nbsp;</p>
<h4>1. AI-Enhanced Social Engineering and Phishing</h4>
<p>AI tools are enabling attackers to craft highly personalized phishing emails, deepfake voice calls and videos, and adaptive malware that evades traditional detection. Reports indicate a 30-50% rise in AI-assisted phishing attempts in late 2025, targeting supply chains and remote workers.</p>
<p><strong>Proactive Steps:</strong></p>
<ul>
<li>Implement multi-factor authentication (MFA) across all accounts, prioritizing hardware keys or biometrics for high-risk users.</li>
<li>Conduct monthly phishing simulations with immediate, non-punitive feedback to build team awareness.</li>
<li>Use AI-powered email filters that analyze behavioral patterns, not just signatures, for early anomaly detection.</li>
</ul>
<p>These steps create a human-technical hybrid defense, reducing breach likelihood by up to 99% according to recent NIST guidelines.</p>
<p>&nbsp;</p>
<h4>2. Ransomware Targeting Backup and Recovery Systems</h4>
<p>Ransomware groups continue to evolve, with 2025 seeing increased attacks on cloud backups and immutable storage. Mid-market firms face average recovery costs of $200K-$2.5M per incident, often driven by downtime rather than ransom payments.</p>
<p>Proactive Steps:</p>
<ul>
<li>Maintain 3-2-1 backups: three copies, two media types, one offsite/immutable, tested monthly for restorability.</li>
<li>Perform annualized loss expectancy (ALE) calculations to quantify ransomware impact.
<ul>
<li>Multiply single loss expectancy (SLE) by annual rate of occurrence (ARO) for prioritized budgeting.</li>
</ul>
</li>
<li>Segment networks to limit lateral movement, ensuring critical systems remain isolated during an attack.</li>
</ul>
<p>Preparation like this minimizes disruption, allowing most organizations to recover in hours rather than days.</p>
<p>&nbsp;</p>
<h4>3. Supply Chain and Third-Party Vulnerabilities</h4>
<p>Interconnected ecosystems amplify risks, as seen in 2025 supply chain breaches affecting thousands of mid-market vendors. Weak access controls in SaaS tools and unpatched third-party APIs remain common entry points.</p>
<p><strong>Proactive Steps:</strong></p>
<ul>
<li>Adopt a zero-trust model: Verify every access request with least-privilege principles, regardless of user location.</li>
<li>Review vendor contracts quarterly for shared security responsibilities, focusing on SOC2 Type II reports and incident response SLAs.</li>
<li>Map your supply chain digitally and run automated scans for known exploited vulnerabilities (e.g., via tools aligned with CISA&#8217;s KEV catalog).</li>
</ul>
<p>This approach extends your security perimeter effectively, without requiring a full infrastructure overhaul.</p>
<p>&nbsp;</p>
<h4>4. Evolving Compliance and Regulatory Pressures</h4>
<p>Frameworks like SOC2, CMMC, PCI, and cyber insurance mandates are tightening, with Q4 renewals driving 40% of mid-market audits. Non-compliance risks include 20-30% premium hikes or coverage denials.</p>
<p><strong>Proactive Steps:</strong></p>
<ul>
<li>Create a compliance roadmap aligning NIST CSF 2.0 with your industry (e.g., CMMC Level 2 for DoD contractors, HIPAA for healthcare-adjacent firms).</li>
<li>Automate control evidence collection for audits, focusing on high-impact areas like data encryption and incident logging.</li>
<li>Schedule annual gap assessments to track maturity, turning compliance into a competitive edge for insurance negotiations.</li>
</ul>
<p>Forward planning here not only avoids penalties but strengthens overall resilience.</p>
<p>&nbsp;</p>
<h4>Moving Forward Thoughtfully</h4>
<p>Cybersecurity in 2026 rewards organizations that prioritize preparation over reaction. By quantifying risks through models like ALE, layering defenses thoughtfully, and aligning with compliance realities, mid-market teams can protect operations with confidence.</p>
<p>As a cybersecurity boutique, Guard Street specializes in a tailored approach with quantification and AI strategic considerations to deliver vulnerability assessments, tabletop exercises, and compliance guidance as your dedicated cybersecurity partner. Connect with us for a complimentary consultation to map these strategies to your environment.</p>
<p><em><strong><a href="http://guardstreet.com/connect">Connect with Guard Street</a></strong></em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/2026-cybersecurity-landscape-key-threats-and-proactive-strategies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Cyber War Against The US</title>
		<link>https://guardstreet.com/the-cyber-war-against-the-us/</link>
					<comments>https://guardstreet.com/the-cyber-war-against-the-us/#respond</comments>
		
		<dc:creator><![CDATA[Peter Mazza]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 21:47:52 +0000</pubDate>
				<category><![CDATA[Podcast]]></category>
		<guid isPermaLink="false">https://guardstreet.com/?p=3442</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<div class="fusion-video fusion-youtube" style="--awb-max-width:600px;--awb-max-height:350px;"><div class="video-shortcode"><div class="fluid-width-video-wrapper" style="padding-top:58.33%;" ><iframe title="YouTube video player 3" src="https://www.youtube.com/embed/EqAnuLbVl88?wmode=transparent&autoplay=0" width="600" height="350" allowfullscreen allow="autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture;"></iframe></div></div></div>
]]></content:encoded>
					
					<wfw:commentRss>https://guardstreet.com/the-cyber-war-against-the-us/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
