
Blumira Briefings
Staying on top of security news shouldn't be another full-time job.
Enter Blumira Briefings, our weekly panel series where security experts break down the headlines you might have missed, and explain what they actually mean for your security practice! ๐
Each week, join a lineup of different Blumira experts (and sometimes special guests!) who will:
- Share the top threats, suspects, and risks we're seeing across our detection and response platform
- Discuss significant security stories and what they mean for YOU
- Provide practical advice you can actually implement right away
โขโขKeep it conversational, informative, and under 30 minutes
Blumira Briefings
๐ฆ Blumira Briefings Ep. 10: Critical Chrome Release, Identity-Based Attacks, Cookie Security Risks
๐ Welcome to Blumira Briefings! This week, we're joined by Michael Kellar, Chris Furner, and Justin Kikani to break down the week's most important security headlines with expert context you can actually use. ๐
What We Cover This Week:
๐ NEW FORMAT! Instead of our usual top trends, we're highlighting the rarest findings in our environments - with insights on what makes these unusual detections worth your attention
๐ Critical Chrome vulnerabilities with active exploits in the wild - what makes use-after-free and out-of-bounds write bugs so dangerous
๐ ๏ธ ConnectWise ScreenConnect and other vulnerabilities added to CISA's Known Exploited Vulnerabilities list
๐ช OneDrive File Picker flaw giving third-party apps broader permissions than users expect
๐ช NordVPN's alarming research on 94 billion stolen cookies for sale on dark web marketplaces
๐ญ Deep dive into Scattered Spider's sophisticated help desk social engineering tactics
๐ก Quick tip of the week: Consider conducting periodic, scheduled reboots for your organization's devices - this helps clear browser sessions, refresh security policies, and force application updates like Chrome to install critical patches.
Plus, Expert Insights On:
- Why auditing third-party app permissions is crucial for cloud security
- Why infostealer attacks are on the rise
- Practical strategies for protecting help desk teams from social engineering
- The rising trend of identity-focused attacks vs. traditional device targeting
- How to implement proper controls for remote workers using home network equipment
๐ LINKS:
Prowler - Cloud security assessment tool: https://github.com/prowler-cloud/prowler
SilentPush research on Scattered Spider: https://www.silentpush.com/blog/scattered-spider-2025/
Blumira blog on SocGholish: https://www.blumira.com/blog/socgholish-malware-recent-trends-and-effective-detection-strategies
๐ฐ SOURCES:
Chrome Zero-Day Vulnerability: https://www.securityweek.com/google-researchers-find-new-chrome-zero-day/
ConnectWise and CISA KEV Update: https://www.bleepingcomputer.com/news/security/cisa-warns-of-connectwise-screenconnect-bug-exploited-in-attacks/
OneDrive File Picker Vulnerability: https://hackread.com/onedrive-file-picker-apps-full-access-user-drives/
Stolen Cookies Research: https://www.theregister.com/2025/05/29/billions_of_cookies_available
Scattered Spider Analysis: https://thehackernews.com/2025/06/scattered-spider-understanding-help.html