Cybersecurity Threat Intelligence Briefing: May 5, 2025

News By Daniel Michan Published on May 5


The events of May 5 paint a sobering picture for security leaders: ransomware is scaling like a venture-backed business, nation-states are leaning harder into digital aggression under the veil of plausibility, and even the protectors of infrastructure both technical and institutional are faltering.

This is not a week in review. This is a real-time briefing from the trenches, delivered on a day when the trust foundation of digital systems suffered multiple fractures.

Retail Breached, Trust Eviscerated

DragonForce, a known ransomware collective, has claimed responsibility for attacks on UK retail giants including Co-op, Marks & Spencer, and Harrods. Co-op confirmed data theft affecting millions of members, with loyalty and payment data likely compromised.

The significance here isn't just the target - it's the velocity and simultaneity. This was a campaign, not an incident. For CISOs, this reinforces a harsh truth: in sectors where consumer-facing innovation often outpaces infrastructure hardening, visibility and segmentation are not optional - they're oxygen.

Ransomware actors increasingly operate with corporate-like efficiency. They identify vulnerabilities in under-patched middleware or overlooked cloud assets, breach quietly, and strike for maximum public impact. This is more than economics. It's perception warfare. And retail's attack surface - from hybrid POS environments to sprawling third-party integrations - is a sitting duck without proactive threat hunting and rollback-capable architecture.

Commvault Exploit: Backup as Backdoor

CISA has raised alarms about an actively exploited vulnerability in Commvault backup software. This is a particularly unsettling development. Backups are supposed to be the safety net. When they become the breach vector, recovery planning collapses into irony.

Attackers know that backup systems often lag behind in patch cadence, run on legacy authentication, or are air-gapped in theory only. Security teams must reclassify backup environments not as passive insurance but as active critical assets requiring the same real-time telemetry, behavioral baselining, and hardening as frontline services.

If your backup is exploitable, your recovery plan is fiction.

TikTok: The $600 Million Signal

The European Union levied a $600 million fine against TikTok for transferring user data to China, violating GDPR provisions. But beneath the regulatory posture lies geopolitical subtext: data sovereignty is the new oil, and the EU is defending its pipeline.

CISOs must interpret this not as an isolated headline, but as a signal. Regulatory risk is converging with nation-state cyber risk. Your data flows, supplier origins, and model training datasets are no longer back-office concerns - they're potential exposure points in transnational chess matches. Organizations need legal, compliance, and infosec operating as a unified front to assess data residency, lawful processing, and international transfer risk dynamically.

The penalties are no longer hypothetical - and they're not capped at monetary loss.

CISA's Budget Cut: Incomprehensible Timing

In a move that reads like satire in strategic circles, the White House has proposed a $491 million cut to the Cybersecurity and Infrastructure Security Agency. This, in the same cycle as coordinated critical infrastructure attacks and growing threats from AI-augmented threat actors.

If approved, this reduction would force a federal cybersecurity cornerstone to retrench at the precise moment when nation-state adversaries are surging. It sends the wrong message to both allies and attackers. CISOs in both public and private sectors should expect broader implications: potential delays in NVD updates, slower STIX/TAXII sharing, reduced public-private collaboration initiatives, and ultimately, a weaker ecosystem.

You cannot "refocus" a mission by defunding the mission holder.

Kelly Benefits: Fallout Continues

The data breach at Kelly Benefits has now impacted over 400,000 individuals. This breach, while not as headline-grabbing as DragonForce's exploits, is operationally devastating. It includes exposure of deeply personal data: SSNs, medical information, and employment details. For HR tech, benefits, and healthcare sectors, this is another stark warning that trust is brittle.

Incident response must go beyond triage. Regulatory disclosures, identity monitoring, and customer communications must be tightly choreographed. But most importantly, executive leadership must treat "stewardship of data" not as a compliance phrase, but a reputational risk imperative. In 2025, every breach is also a marketing disaster.

SonicWall Vulnerabilities: Exploits Go Public

Two SonicWall zero-days have gone from obscure CVEs to fully weaponized exploits with proof-of-concept code now circulating publicly. SonicWall has long been embedded in midsized enterprise networks, and this changes the calculus. Every unpatched appliance is a risk multiplier - particularly in environments where segmentation is weak or MFA isn't enforced on management consoles.

For CISOs, the guidance is urgent: treat appliance vendors with the same scrutiny as code repositories. Scan for legacy firmware, disable WAN management ports, and initiate replacement planning for any edge device that lacks modern detection, isolation, or update pipelines.

Vendor inertia is no longer tolerable. If your edge protection is brittle, your whole architecture is porous.

Strategic Implications

These developments are not disconnected. They are a synchronized narrative of escalating pressure on enterprise resiliency. The common themes:

Data is both the prize and the weapon.

Whether through exfiltration (DragonForce), regulatory violation (TikTok), or backup compromise (Commvault), control of data defines power. Encryption and policy enforcement must follow the data - not just the device or user.

Supply chains remain the soft underbelly.

Whether software vendors, third-party integrations, or managed service providers, threat actors are targeting linkages - not just endpoints. Real-time SBOM validation and third-party risk monitoring must be elevated from compliance checks to operational norms.

Resilience beats prevention.

No stack is invulnerable. The differentiator is recovery time and containment depth. Organizations need to move beyond "mean time to patch" toward "mean time to isolate, reroute, and restore."

Cybersecurity is now geopolitical.

When regulators fine apps for data transfer to hostile jurisdictions, when government agencies suffer funding volatility, and when ransomware gangs operate like venture startups with nation-state cover, the CISO must evolve into a geopolitical strategist as much as a technical guardian.

Final Word to CISOs

If you're reading this, you likely already know that cyber risk is no longer confined to your SOC's walls. It's on your board's mind, your regulator's desk, your supplier's infrastructure, and your adversary's Telegram chat.

Today's headlines remind us: the threat actors are faster, the stakes are higher, and the margin for complacency is gone.

Your next incident won't ask for permission. But it will test your preparation. Make today the day you close the gap.