May's Blog

✨ Written with help of AI

If Ghost in the Shell taught us anything, it’s that attackers don’t kick down the front door when they can whisper to the system. 2025 is feeling a lot like that—less smash-and-grab, more social engineering, identity abuse, and supply chain whispers that echo through everything. University roundups of “top cybersecurity threats” (like USD’s) consistently hit the big pillars—ransomware, phishing/BEC, supply chain, cloud misconfigurations, IoT/OT, insider threats, and now AI-enabled attacks. Let’s go deeper: what these actually look like on the ground, how they’re evolving, and what controls move the needle without wrecking your sprint velocity.

What’s Really Biting in 2025

Controls That Actually Move the Needle

You don’t need a dragon-slayer sword; you need a disciplined build. Here’s the 80/20:

1 Identity hardening (phishing-resistant MFA and session security)

Quick win: publish a strict DMARC policy to cut off spoofed email

2 Patch by threat, not by hope

3 Backups and recovery that aren’t fan fiction

4 Cloud and container guardrails

Example: verify an image with cosign

5 API defense-in-depth

6 Email and endpoint basics that still matter

7 Supply chain security that’s more than an SBOM PDF

Open-source tools I actually like for all this

Two Practical Snippets You Can Use Today

1 A tiny Sigma rule for suspicious MFA pushes (adapt to your IdP logs)

 1title: Multiple MFA Push Denials Indicating Fatigue Attack
 2logsource:
 3  product: okta
 4  service: authentication
 5detection:
 6  selection:
 7    eventType: user.authentication.factor.reject
 8  timeframe: 10m
 9  condition: selection | count() by user >= 5
10level: high
11tags: attack.credential_access, attack.t1110

2 An OPA/Gatekeeper policy to block public S3 buckets via Terraform tags (conceptual)

1package s3.public.block
2deny[msg] {
3  input.resource.type == "aws_s3_bucket"
4  input.resource.public == true
5  msg := sprintf("Public S3 bucket blocked: %s", [input.resource.name])
6}

Why This List Looks the Way It Does

Security Considerations for AI (Because Everyone’s Shipping It)

Community and Open-Source Angle

Some of the most impactful progress is coming from the community:

Strategic Bets for the Next 12 Months

A Quick Anime Aside

In Attack on Titan, the walls felt safe—until they weren’t. Perimeters in 2025 are your IAM policies, your CI pipelines, your API gateways. The “Titans” are already inside if your identity hygiene is weak. Train like the Survey Corps: drills, gear checks, and team comms beat bravado.

Wrapping Up: Where Do You Strengthen First? If you’re time-crunched this quarter, do these three: