19.10.2025 | Eric Wolf

Insider Threats and MFA Fatigue: What the BBC Ransomware Attempt Reveals

What the BBC Ransomware Attempt Reveals It started with a message that looked more like a bribe than a breach. In September 2025, BBC cyber correspondent Joe Tidy became the target of every CISO’s nightmare: a sophisticated insider recruitment attempt by the Medusa ransomware gang. What began as an encrypted message on Signal quickly escalated […]

08.10.2025 | Ariel Zamir

When Authentication Isn’t Enough: Lessons from Microsoft’s CVE-2025-55241

Lessons from Microsoft’s CVE-2025-55241 In July 2025, organizations learned a harsh truth: even the most advanced identity systems can fail catastrophically when attackers forge tokens that look legitimate, turning trusted infrastructure into an open door. Microsoft’s Graph API vulnerability (CVE-2025-55241) wasn’t just another security flaw, it was a masterclass in how modern identity systems can […]

03.10.2025 | Ariel Zamir

Less Is More: The Power of Just Enough Access (JEA)

Less Is More: The Power of Just Enough Access (JEA)   When Sarah moved from the finance team to marketing three years ago, no one thought to revoke her access to the company’s financial database. She was a trusted employee and it didn’t feel urgent. Last month, Sarah’s credentials were compromised in a phishing attack. […]

Ready to See Ray Security in Action?