Measuring Fatigue, CPTD, and Burnout in Cybersecurity: Insights from BSidesAugusta 2025

Understanding the Hidden Threat of Burnout In the high-stakes world of cybersecurity, professionals - particularly those in SOC teams and cyber operations - can face relentless stress. Chronic fatigue, hypervigilance, and compassion fatigue are not just buzzwords - they're realities that quietly undermine team performance, resilience, and well-being. Yet too often, organizations lack the tools to measure or address these pressures effectively. A Practical Solution: The Copenhagen Burnout Inventory At BSidesAugusta 2025, Patrick Kelley, Founder and CEO of Léargas Security and Critical Path Security, will introduce an adapted version of the Copenhagen Burnout Inventory (CBI) tailored for cybersecurity teams. This open-source framework isn't theoretical-it's a usable, validated tool designed specifically for analysts, incident responders, and blue teams working in Managed SOC environments. What You'll Gain from the Session Attending this session provides practical value that organizations can act on immediately: Quantify BurnoutLearn how to measure fatigue, compassion fatigue (CPTD), and…

0 Comments

Guarding the Gateway: Strengthening Cybersecurity Hygiene in CRM Platforms

CRM Security: The Overlooked Risk At Critical Path Security, we're seeing the same dangerous pattern across industries: companies pour money into CRM platforms to power sales and marketing-but don't secure them like they do other business-critical systems. Your CRM isn't "just" a sales tool. It's a vault of customer identities, contact details, purchase history, contracts, and sometimes payment data. That makes it one of the most valuable targets for cybercriminals. When CRM security is overlooked, the consequences can be financial, reputational, and operational. Recent Breaches That Prove the Point Google Salesforce Breach via Vishing (June 2025)ShinyHunters (UNC6040) targeted Google with a voice-phishing campaign against employees with Salesforce access. Staff were tricked into installing a tampered Data Loader app, giving attackers access to SMB contact data. The breach was quickly contained-but it's proof that even the most secure companies can fall to targeted social engineering. Salesforce Integration Misconfigurations (2023)Several companies exposed…

0 Comments

Compliance with Emergency Directive 25-02: Essential Steps for Mitigating Microsoft Exchange Vulnerability

Introduction The Cybersecurity and Infrastructure Security Agency's (CISA) Emergency Directive 25-02 has been issued to address a critical post-authentication vulnerability (CVE-2025-53786) affecting Microsoft Exchange hybrid-joined configurations. This directive requires immediate action from federal agencies to prevent lateral movement attacks from on-premises Exchange servers to the Microsoft 365 (M365) cloud environment. The urgency and mandatory compliance mean that all agencies must complete the outlined actions by August 11, 2025, as failing to do so, could expose sensitive information to malicious actors. Background CISA is alerting agencies about a vulnerability that allows an attacker with administrative access to the on-premises Exchange server to move laterally into the M365 cloud environment. The vulnerability is particularly severe for hybrid configurations that have not yet applied April 2025 patch guidance. Hence, the need for immediate mitigation is highlighted. Required Actions Agencies are required to follow this schedule: By 9:00 AM EDT on Monday, August 11,…

0 Comments

Microsoft and CISA Issue Urgent Warning on New Zero-Day Vulnerabilities: What You Need to Know

In the latest development in cybersecurity, Microsoft and the Cybersecurity and Infrastructure Security Agency (CISA) have issued an urgent warning about yet another set of zero-day vulnerabilities affecting Windows systems. These vulnerabilities, patched in the May 2025 Patch Tuesday update, have been identified as actively exploited in the wild. The potential impact is severe, with these flaws threatening the integrity of personal and organizational data. Vulnerabilities at a Glance The vulnerabilities in question include: CVE-2025-30400: A use-after-free flaw in the Windows Desktop Window Manager (DWM) Core Library that could lead to privilege escalation, potentially giving attackers SYSTEM-level access. CVE-2025-32701: Another use-after-free bug in the Windows Common Log File System (CLFS) driver, facilitating local privilege escalation to SYSTEM. CVE-2025-32706: A heap-based buffer overflow vulnerability in the CLFS driver, which similarly facilitates local privilege escalation. CVE-2025-30397: A type confusion vulnerability in the Microsoft Windows Scripting Engine that enables remote code execution through…

0 Comments