Menu

THE LATEST AND GREATEST CYBERSECURITY INFO

WEEKLY PREMIUM NEWSLETTER
MONTHLY FREE NEWSLETTER
NOW LIVE

ABOUT US

At Cybersecurity101, we believe that staying safe online shouldn’t be complicated. Our mission is to take the ever-changing world of cybersecurity and make it clear, simple, and accessible for everyone—whether you’re a student just starting out, a business owner protecting your company, or an everyday user who simply wants peace of mind.

We cut through the noise of technical jargon to deliver straightforward insights, practical tools, and real-time updates that keep you informed and prepared. From our free monthly newsletter to our premium breach alerts, every resource we create is designed to help you take control of your digital safety.

Our team is driven by one goal: to empower people with knowledge. We believe that cybersecurity isn’t just for experts—it’s for everyone. By making complex threats easy to understand and by providing actionable steps you can trust, Cybersecurity101 ensures you’re always one step ahead.

Cybersecurity101 — Monthly Newsletter (August 2025)

This month at a glance

  • Airlines and telecoms got hammered via third-party platforms and social-engineering (vishing).
  • Ransomware group WarLock keeps adding big telecom victims.
  • U.S. agencies warned about the Interlock ransomware variant.

Top breaches & incidents

1) Workday: data accessed via third-party CRM (social engineering)

What happened: Attackers phished their way into a CRM platform used by Workday. After discovery on Aug 6, Workday blocked access and disclosed on Aug 15.
Why it matters: A continuing wave of CRM-focused, voice-phishing campaigns. Review how your org authenticates staff over the phone.

2) Air France & KLM: customer-service platform breach

What happened: Data tied to a third-party customer-service system was accessed; impacted data includes contact details and loyalty info.
Why it matters: Another example of supplier compromise in travel—tighten vendor controls and customer-support data retention.

3) Orange Belgium: 850,000 customer accounts impacted

What happened: July attack exposed account data (e.g., phone numbers, SIM/PUK codes).
Why it matters: SIM/PUK details can aid SIM-swap attempts; add account PINs and watch for port-out alerts.

4) Colt Technology Services: WarLock claims breach

What happened: WarLock ransomware actors posted samples and auctioned internal Colt documents.
Why it matters: WarLock is ramping up against telecoms; suppliers are at elevated risk for extortion and exposure.


Trend watch: Third-party & vishing-led campaigns

Multiple summer breaches share a pattern: attackers phoned their way into helpdesks/CRMs, then exfiltrated support records. Treat your contact-center access like crown jewels: MFA, SSO, strict roles, session alerts.

Federal alert: Interlock ransomware

CISA/FBI/HHS issued a joint advisory on Interlock ransomware (Windows/Linux encryptors; VM targeting). Review backups, segmentation, and detection coverage.


What to do this month (5 quick wins)

  1. Kill vishing paths: No password resets or MFA changes done solely over voice; require ticket + callback.
  2. Lock down third-party CRMs: Enforce SSO + phishing-resistant MFA; least privilege roles; 7–30 day data caps.
  3. Harden mobile accounts: Add a carrier PIN, enable port-out locks, monitor for SIM-swap alerts.
  4. Email defense: DMARC/SPF/DKIM, train staff on callback-phishing.
  5. Backups & blast radius: Immutable/offline backups, test restores, segment hypervisors, EDR rules.

For individuals

  • Enable MFA everywhere, especially email and banking.
  • Use a password manager; rotate passwords reused at airlines/retail.
  • Be skeptical of phone calls claiming to be “IT” or “airline support”—hang up and call the official number.

Coming soon on Cybersecurity101

Password Tester Tool (beta): a safe way to evaluate password strength and learn how to upgrade weak ones—without sending us your actual password.