Threat Landscape Briefing – July 2025
In this month’s briefing we explore:
- Car Hacking Tools Upgraded in Newest Kali Linux (00:43)
- Kali Linux has rolled out its second major update of the year (2025.2), delivering 13 new tools and a substantial overhaul of its car hacking toolkit.
- A popular JavaScript package was modified to deliver malware in a supply chain attack.
- Check out Info-Tech’s research, Threat Preparedness Using MITRE ATT&CK®.
- Kali Linux has rolled out its second major update of the year (2025.2), delivering 13 new tools and a substantial overhaul of its car hacking toolkit.
- Runtime Attacks at AI’s Front Door (05:42)
- A new report warns that runtime attacks on AI systems are becoming more frequent, more dangerous, and much easier to launch.
- Use Info-Tech’s Gen AI risk tools to find vulnerabilities in AI systems.
- A new report warns that runtime attacks on AI systems are becoming more frequent, more dangerous, and much easier to launch.
- Service Desk Under Siege (11:59)
- IT service desks have emerged as a top attack vector among cybercriminals, with hackers now employing sophisticated social engineering to evade traditional security controls better than before.
- Discover how Info-Tech can help: Assess and Govern Identity Security.
- IT service desks have emerged as a top attack vector among cybercriminals, with hackers now employing sophisticated social engineering to evade traditional security controls better than before.
- Mitigating the Modern Cloud Threat (19:54)
- A recent security report published in June highlights the growing risk of poor cloud storage practices by organizations and its associated threats.
- See Info-Tech's Build a Cloud Security Strategy research.
- New SmartAttack Exfiltrates Data From Air-Gapped Systems (25:39)
- A team of security researchers has developed a unique method to exfiltrate data from an air-gapped system.
- Explore Info-Tech’s guidance: Assess and Manage Security Risks.