Did you know? The U.S. Secret Service has a library of 15,000 different types of ink. Why? Because historically, catching a thief meant following the scent of the money.
▶ Did you receive this newsletter? Click here to subscribe.
Byte Sized Reads
🔗 Interesting case study of newly discovered malware that exploits Ivanti ConnectSecure.
🔗 The difference between two and three legged OAUTH.
🔗 OpenClaw Personal Assistant goes Viral (and so do your secrets)

Why We Need to Think Like a Money Launderer: A Review of Rinsed by Geoff White
(Deep review here, summary below)
In the cyber world, we spend a massive amount of time dissecting the "how" of an attack. We talk about ransomware entry points, encryption speeds, and zero-day vulnerabilities. But we often stop short of the most interesting part of the lifecycle: The "So What?"
What do criminals actually do once they have the illicit gains?
I just finished Geoff White’s Rinsed, and it’s a brilliant deep dive into the maturing convergence of cybersecurity, fraud, and money laundering. If you’re in this profession, this isn't just a "true crime" read—it’s a manual for understanding the criminal mindset and the evolution of risk.

The Criminal’s Problem is Just Beginning
We tend to think that once the data is stolen or the ransom is paid, the criminal has "won." White shows us that for the bad guys, the real headache is just starting. Converting "dirty" digital assets into "clean" spendable cash is a massive logistical hurdle.
By understanding their "cashing out" problems, we can identify indicators that help us thwart future activity. If we can't stop the initial breach, we might be able to stop the "rinse."
Rinsed is another highly recommended book to add to your library.
While you’re waiting for it to arrive, read the more in depth book review here to glean the key themes behind each fascinating scene.
Resilience in the Age of Geopolitical Shockwaves
1) Revisit “Shields Up” guidance from the U.S. Department of Homeland Security. Both corporate leaders and operational teams should review recommended defensive measures, validate incident response plans, and ensure executive-level visibility into current risk posture.
2) Anticipate supply chain disruption — including talent disruption. Geopolitical events don’t just affect infrastructure; they affect people. For example, when more than 70,000 reservists in Israel were recently called up, many left civilian roles that support global technology ecosystems — from software development to back-office operations. Those temporary gaps can cascade into service delays, patching backlogs, or third-party support challenges that impact organizations worldwide.
Resilience today means thinking beyond your perimeter. It requires understanding how geopolitics, workforce mobilization, and interdependent supply chains can shape your cyber risk tomorrow.
Don’t Let the Grind Erase the Wins: Leadership Moment
When we’re in the middle of daily battles, it’s easy to feel stuck — like we’re pushing hard but not moving forward. The constant flow of issues, deadlines, and decisions can blur progress into routine.
Pause.
Step back and deliberately list your meaningful accomplishments. Not just tasks completed — but impact delivered. Risks reduced. Teams strengthened. Problems prevented. Growth achieved.
Perspective is a leadership discipline.
Even more important: do this for your team. They rarely see the full scoreboard. They feel the pressure but don’t always see the progress. Hearing their leader articulate wins — clearly and specifically — can reset morale, restore energy, and reinforce purpose.
I had this exact conversation recently, and it made a measurable difference.

In case you missed it
Thank you Secure World for publishing my article! https://www.secureworld.io/industry-news/sandworm-cyber-geopolitics-strategic-leadership
Help us keep sharing real stories
▶ Know someone who’d love this? Forward it their way.
▶ Did you receive this newsletter? Click here to subscribe.
Views expressed are informational only and not official advice. No warranties are made; readers assume all risk and should consult authoritative sources before acting.
