News

September 9, 2021

The ReX-Files: CyberHerd Documentary

Photos from the CyberHerd documentary premiere at USF on September 24, 2025

Rex Wilson, brand manager for Cyber Florida

Watch the CyberHerd documentary on the Cyber Florida YouTube channel!

The ReX-Files: The Episode where Rex talks about producing the CyberHerd documentary

More than a competition story, The Making of a Defender shows how solving the nation’s cybersecurity challenges is becoming a pillar of the Tampa Bay community and beyond. As CyberBay grows, this story becomes one of its cornerstones.

In anyone’s professional career, there are only a handful of opportunities to truly elevate people in a lasting way. I’m not talking about the small but powerful kindnesses we practice daily—thank you, Mister Rogers, for teaching us that. I mean something bigger, something rare, where the timing, circumstances, and people all align. Last year, I was given that kind of opportunity.

Just over a year ago, I noticed that the USF CyberHerd (Ya Herd!—they know what I mean) was quietly making big waves in cybersecurity competitions. Despite sharing a home with them at USF, I hadn’t followed them closely. If anything, I was more familiar with their long-dominant Orlando rivals, Hack UCF. But as I dug in, I discovered that the CyberHerd wasn’t just competing with them—they were winning.

That’s when I thought, “Maybe there’s a story here.”

I pitched the idea to my supervisor, Kate Whitaker, and our director, Ernie Ferraresso. They believed in it, brought it to leadership, and just like that, we were greenlit.

With the talented team at Two Stories Media, I began documenting the CyberHerd’s journey for a full year—competitions, practices (so much practice), and everything in between. Anyone who has ever made a documentary knows: you don’t get to script the ending. Sometimes you land the perfect Cinderella moment, other times the pumpkin explodes and lands on your head. This story had a little of both.

What I didn’t expect, though, was how much I would learn along the way. I began to see these students not just as competitors but as something closer to elite athletes—driven, resilient, and focused. Sitting front-row, I realized my job wasn’t just to record their journey; it was to elevate it. To make sure their hard work, sacrifice, and brilliance weren’t lost in the shuffle but instead woven into USF history and the broader CyberBay movement.

The story of the 2024–25 CyberHerd now lives beyond me. It’s captured, told, and preserved as part of something much larger than any one of us. To Waseem, Jacob, Jack, Michelle, Coach Marbin, Sriram, and the rest of the CyberHerd family—thank you for letting me in.

Am I proud of this project? Strangely, no. Pride isn’t the word. What I feel instead is something deeper: gratitude. Gratitude for the chance to help tell your story. Gratitude for the friendships formed. And gratitude for the knowledge that this story will outlast us all.

Your friend in cyber competitions,

Rex Wilson

P.S. – Thank you to our friends at USF Communications and Marketing for publishing this excellent article about the CyberHerd documentary.

The ReX-Files: CyberHerd Documentary2025-09-30T14:20:06-04:00

DeMarcus Williams — Starbucks’ Security Pro Went from Cyber Competitions to Corporate Red Teaming

Episode 64 — DeMarcus Williams

DeMarcus Williams — Starbucks’ Security Pro Went from Cyber Competitions to Corporate Red Teaming2025-09-29T08:52:48-04:00

CyberBay 2025 Report: Securing the Future Together

CyberBay Summit 2025

Survey reveals cost, complexity, talent shortages are leaving SMBs and public sector organizations dangerously under-protected

Tampa Bay, FL — September 25, 2025 — Cyber threats are escalating in scale and sophistication. Yet our defenses remain siloed, expensive, and out of reach for a wide range of organizations. The newly released 2025 CyberBay Report, based on insights from hundreds of IT and cybersecurity professionals, sounds the alarm and issues an urgent call to action for the private sector, educators, and cyber defenders to step forward and lead.

Download the 2025 CyberBay Report.

As artificial intelligence accelerates digital integration, the risks to and both private- and public-sector organizations are intensifying. Small- and medium-sized businesses (SMBs), which serve as the backbone of the economy, are left with tools they can’t afford, talent they can’t find, and systems that can’t keep up.

A System Under Siege

The CyberBay Report found that:

  • 80.1% report a shortage of skilled professionals
  • 81.3% cite organizational gaps in policy, behavior, and security culture
  • 74.5% say undergraduate curricula are missing essential job-ready content
  • 80.2% say cybersecurity tools are too expensive
  • 71.9% find tools fragmented and poorly integrated
  • 62.9% say professional training programs fall short of evolving demands

The results provide a strategic blueprint for filling gaps in the cybersecurity ecosystem. To protect our infrastructure, economy, and future, we must shift from isolated fixes to system-level transformation.

1. Democratize Cybersecurity Solutions

Affordability and usability are no longer optional. We must build scalable, AI-augmented defenses that even the smallest organizations can deploy.

2. Prioritize Cyber Defense as a Business Imperative

The private sector must lead—not with gated solutions, but with open collaboration, public-private partnerships, and investment in real-world resilience.

3. Elevate Education as a Strategic Asset

Cybersecurity education must evolve from theory-heavy programs to hands-on, threat-ready training that begins early and mirrors real-world challenges. Certification bodies, continuing education platforms, and vocational pipelines must align with the pace of escalating risk.

4. Activate a Culture of Readiness

Cybersecurity requires both the right toolset and the right mindset. Every organization needs policies, leadership buy-in, and cultural norms that reinforce vigilance. Readiness must replace awareness as the new standard.

CyberBay: The Movement Begins in Tampa

CyberBay, the Tampa-based cybersecurity collaborative, is proactively addressing the issue. By unifying private, public, and government sectors, CyberBay is democratizing cyber defense, prioritizing readiness over awareness, and training the next generation to meet the moment.

The inaugural CyberBay 2025 Summit will bring this mission to life. From October 13–15 in Tampa, FL, cybersecurity leaders, educators, technologists, and public sector champions will gather to build the future of cyber defense.

Register now at CyberBay.org and be part of the transformation.

Media Contacts:

Jennifer Kleman
Cyber Florida
jennifer437@cyberflorida.org

Christina Pandapas
Longview Strategies
cpandapas@longviewstrategies.com

printable version of press release

CyberBay 2025 Report: Securing the Future Together2025-09-25T10:00:28-04:00

Strengthen Virtual Currency Investigation Skills with CI240

FirstLine

Virtual currencies are playing an ever-growing role in criminal activity—and investigators need the right tools to keep up. NW3C’s CI240 Intermediate Cyber Investigations: Virtual Currency equips professionals with the knowledge and hands-on experience to investigate crimes involving digital assets.

This immersive course explores:

  • Virtual currency basics
  • Blockchain technology
  • Leading cryptocurrencies (Bitcoin®, Ethereum®, Monero)
  • Stablecoins, DeFi, and NFTs
  • Investigative techniques for tracking, documenting, seizing, and securing cryptocurrency

Participants also practice real-world skills through exercises like opening a Bitcoin wallet, tracing transactions on the blockchain, and identifying services with free/open-source tools.

Why it matters:
Graduates report immediate impact in their work. One investigator tracked fraudulently received funds across the blockchain using only the skills gained in this course. Another has since frozen millions in virtual currency assets and worked closely with NW3C trainers for expert guidance.

Course Details:

  • 1.0 point toward 3CE and 3CI certifications
  • 100% participation required, including an 80%+ post-test score and all in-class exercises
  • Closed captioning available, plus live speech-to-text translation in 100+ languages

Who can attend:
This training is offered at no cost to U.S. state, local, tribal, and territorial criminal justice agencies through U.S. Department of Justice funding. Criminal justice and regulatory professionals worldwide are also welcome through other funding sources.

🔗 Register now: NW3C: Class Details

Strengthen Virtual Currency Investigation Skills with CI2402025-09-25T08:18:09-04:00

Protecting Against Elder Fraud and Scams – Portuguese

Este recurso apresenta etapas práticas para ajudar a proteger pessoas 60+ e seus familiares, amigos e cuidadores contra fraudes cibernéticas. Pessoas 60+ são cada vez mais alvo de criminosos digitais que exploram a confiança, a falta de familiaridade com a tecnologia e a vulnerabilidade financeira. De golpes de phishing (mensagens falsas que tentam enganar a pessoa para roubar informações) a fraudes de suporte técnico e roubo de identidade, esses ataques frequentemente resultam em danos emocionais e financeiros significativos.

Confira neste guia informações sobre os golpes mais comuns que atingem pessoas 60+, as melhores práticas para manter os dados pessoais protegidos e onde e como denunciar uma fraude cibernética. Compartilhe este guia com sua comunidade!

Guide created by the Cyber Florida Security Operations Center.
Contributing Security Analysts: Lara Radovanovic, Zahid Rahman, Waratchaya Luangphairin
Translated by: Dra. Michelle Angelo-Rocha, Lara Radovanovic, Waratchaya Luangphairin, Zahid Rahman
Protecting Against Elder Fraud and Scams – Portuguese2025-10-08T10:42:53-04:00

Protecting Against Elder Fraud and Scams – Arabic

هذا المورد يقدّم خطوات عملية للحماية من “احتيال كبار السن الإلكتروني”. المحتالون يستغلّون الثقة، عدم الألفة بالتقنية، والضعف المالي. من رسائل التصيّد، إلى دعم فني مزيّف، إلى سرقة الهوية—النتيجة قد تكون خسارة مال وضرر نفسي.

ستجد هنا أشهر الأساليب، أفضل الممارسات لحماية المعلومات، وكيف وأين تُبلّغ.

Guide created by the Cyber Florida Security Operations Center.
Contributing Security Analysts: Lara Radovanovic, Zahid Rahman, Waratchaya Luangphairin
Translated by Zahid Rahman, Waratchaya Luangphairin, Sanae Elmachhour
Protecting Against Elder Fraud and Scams – Arabic2025-10-08T10:35:38-04:00

Protecting Against Elder Fraud and Scams – Spanish

Este recurso presenta pasos prácticos para ayudar a proteger a las personas mayores de 60 años y a sus familiares, amigos y cuidadores contra el fraude cibernético. Las personas mayores de 60 años son cada vez más un objetivo para los delincuentes digitales que explotan la confianza, la falta de familiaridad con la tecnología y la vulnerabilidad financiera. Desde estafas de phishing (mensajes falsos que intentan engañar a la persona para robarle información) hasta fraudes de soporte técnico y robo de identidad, estos ataques a menudo resultan en daños emocionales y financieros significativos.

En esta guía, encontrarás información sobre las estafas más comunes que afectan a las personas mayores de 60 años, las mejores prácticas para mantener los datos personales protegidos y dónde y cómo denunciar un fraude cibernético. ¡Comparte esta guía con tu comunidad!

Guide created by the Cyber Florida Security Operations Center.
Contributing Security Analysts: Lara Radovanovic, Zahid Rahman, Waratchaya Luangphairin
Translated by: Lara Radovanovic, Waratchaya Luangphairin, Zahid Rahman, Dr. Michelle Angelo-Rocha
Protecting Against Elder Fraud and Scams – Spanish2025-10-08T10:43:28-04:00

Protecting Against Elder Fraud and Scams: A Cybersecurity Guide

This resource offers practical steps to help protect older adults and those who support them against cyber elder fraud. Older adults are increasingly targeted by cybercriminals who exploit trust, unfamiliarity with technology, and financial vulnerability. From phishing scams to tech support fraud and identity theft, these attacks often result in significant emotional and financial harm.

Read through for information on common elder scams, best practices for keeping personal information protected, and where and how to report a cyber elder fraud.

Guide created by the Cyber Florida Security Operations Center. Contributing Security Analysts: Lara Radovanovic, Zahid Rahman, Waratchaya Luangphairin

Protecting Against Elder Fraud and Scams: A Cybersecurity Guide2025-09-18T12:02:35-04:00

Scattered Spider Threat Report

I. Introduction

Scattered Spider is a large and loosely affiliated cybercrime group also referred to as UNC3944 or Octo Tempest. This group is made up of teens and young adults who primarily target companies in the U.S. and U.K. for financial gain (CISA, 2025).

Their attacks are heavily reliant on social engineering. Common tactics include bombarding employees with repeated MFA prompts (“push bombing”), hijacking phone numbers through SIM-swap attacks, and impersonating IT help desk staff to steal credentials. Once inside, they use “everyday” administrative tools and legitimate remote access applications to move quietly through networks, steal sensitive data, and in many cases deploy ransomware such as DragonForce [1, 2]. Scattered Spider is a serious concern because they adapt quickly, move across multiple industries, and combine human manipulation with technical persistence. [2, 7]

In today’s fast-paced technological and cybersecurity environment, staying ahead of the game is critical, and members of the Scattered Spider understand this well. They take advantage of the newest technologies, quickly identifying vulnerable areas and exploiting them for attack. For this reason, they have gained reputation as one of the most dangerous threat groups active today.

This report will outline who they target, the tactics they use, indicators of compromise, and how different roles can defend against them.

II. Target

Scattered Spider’s targets span across multiple industries, with the most recent being retail, insurance companies, and aviation. These incidents have impacted many countries worldwide and are most heavily hit in the U.S. and U.K. They go after large companies exploiting help desks and compromising third-party vendors such as customer support platforms, IT contractors, or cloud services. The following examples highlight major attacks between April and July 2025.

  • April 2025
    • Marks and Spencer (Retail, U.K.) – Struck by a ransomware attack that disrupted operations, cut into sales, and exposed customer and employee data. Attackers gained access through social engineering that targeted IT help desks, a tactic characteristic of Scattered Spider [3].
    • Co-op (Retail, U.K.) – Experienced ransomware attacks causing data loss and service outages, negatively affecting company revenue and stock. Investigators revealed that access was granted through the impersonation of support staff and later passed to a ransomware-as-a-service (RaaS) operator, methods closely matching Scattered Spider’s standard techniques [4].
  • May 2025
    • Victoria’s Secret (Retail, U.S.) – Forced to shut down their website and in-store services following a security breach that was part of a wider campaign targeting retail [5].
    • Adidas (Retail, Germany, global) – Confirmed theft of company and customer contact information through a third-party customer service provider [6].
  • June 2025
    • AFLAC (Insurance, U.S.) – Confirmed a data breach with Scattered Spider’s use of social engineering suspected for initial access.
    • Philadelphia Indemnity Insurance (Insurance, U.S.) – Suffered a data breach linked to Scattered Spider’s use of Multi-Factor-Authentication (MFA) fatigue attacks.
    • WestJet (Aviation, Canada) – Data centers breached along with their Microsoft Cloud environment. Scattered Spider gained their initial access through password reset on an employee account and using MFA to gain further access.
    • Hawaiian Airlines (Aviation, U.S.) – Believed to have also been attacked by Scattered Spider, although investigations are ongoing and see similarities in tactics to other airline attacks.
  • July 2025
    • Qantas (Aviation, Australia) – Suffered significant data breach through a third-party customer service platform affecting nearly 6 million customers. Members of the Scattered Spider are believed to be responsible through targeting an IT call center.
    • Azpiral (Loyalty Program Provider, U.K.) – Loyalty program provider for Co-op UK, disclosed a cyberattack extending impact beyond the retail company itself [7].

III. Tactics and Techniques

Scattered Spider incorporates a wide range of Tactics, Techniques, and Procedures (TTPs) to get what they want. They consistently rely on social engineering, most commonly impersonation of IT or Helpdesk personnel to deceive employees into revealing credentials, approving MFA prompts, or granting remote access.

The following list shows their tactics and techniques, along with the corresponding MITRE ATT&CK technique IDs.

IV. Adversary Tools and Services

Scattered Spider relies on social engineering and trusted IT tools rather than custom malware. This helps them stay undiscovered in corporate environments [4].

Based on the recently published reports by CISA (2025) and CrowdStrike (2025), they use the following tools and services to maintain their persistence in the compromised systems:

  1. Remote Access Tools: AnyDesk, TeamViewer, Teleport.sh, and ScreenConnect provide persistent remote connectivity by tunneling over the internet [1].
  2. Cloudflare Tunnels: Cloudflare’s trycloudflare creates encrypted tunnels that bypass company firewalls and VPNs without raising suspicion. [9].
  3. Communication Platforms: Slack, Microsoft Teams and even SMS platforms would be exploited for social engineering, impersonating IT staff and targeting privileged users [9].
  4. Cloud Storage and Databases: Mega.nz, and Amazon S3, and Snowflake are mishandled for large-scale data exfiltration. Thousands of rapid queries would be used to pull out huge amounts of data in a very short time [9].
  5. Living off the Land Tools: PsExec, Powershell and Remote Desktop Protocol (RDP) allows for stealthy command execution, credential theft, and lateral movement disguised as routine I activity [9, 10].
  6. Malware and Ransomware (less common): AveMaria/WareZone (RAT), Racoon and Vidar (stealers), and ALPHV/BlackCat or DragonForce (ransomware) are deployed occasionally for persistence, theft, and extortion [1, 12].

V. Indicators of Compromise (IOCs)

Because Scattered Spider is known for blending in with legitimate user activity, this makes spotting them challenging. To stay ahead of them, defenders should look for subtle anomalies that give away their presence rather than just the tools themselves [11]. These clues, when pieced together, can help identify an attack even before major damage is done.

1. Impersonation Domains: Fake login/helpdesk sites. These domains typically impersonate corporate login or IT helpdesk pages, making them appear trustworthy to targets.

  • In the past they have used: [1]
    • targetsname-sso[.]com,
    • targetsname-servicedesk[.]com,
    • targetsname-okta[.]com,
    • targetsname-helpdesk[.]com,
    • oktalogin-targetcompany[.]com

2. Remote Access Abuse: Unexpected installation of remote access tools like AnyDesk, TeamViewer, Teleport.sh, and ScreenConnect (mentioned above) or unusual connections to unknown domains.

3. Tunneling Traffic: Repeated connections to trycloudflare domains that bypass VPN/firewalls.

4. Abnormal Data Exfiltration Patterns: Bursts of SQL queries executed against databases, large uploads to Mega.nz or Amazon S3 buckets outside of normal workflow [8], or high-volume outbound traffic from accounts or servers that don’t usually transfer large datasets.

5. Credential and Privilege Abuse: Repeated failed login attempts followed by successful access from a new or foreign IPs, unexpected privilege escalations or password resets, and MFA bypass attempts via helpdesk calls (vishing) or SIM swaps [13].

VI. Recommendations

Scattered Spider has impacted a wide range of individuals within targeted organizations by exploiting both human behavior and weaknesses in cloud identity systems. Their tactics allow them to compromise accounts across all levels of a company. Because their attacks touch so many different roles, a one-size-fits-all approach to mitigation would be insufficient.

This report breaks down mitigation strategies by role group, focusing on the four most frequently targeted groups: IT Support and Help Desk Personnel, Identity & Access Administrators, Executives & High-Privilege Users, and Standard Users across the Organization. Each section highlights who these groups are, how they are attacked, and what can be done to reduce the exposure to the attack, boosting resilience to a group whose playbook is to exfiltrate victims’ data and extort them for financial gain.

1. IT Support & Help Desk Personnel: Front-liners responsible for password resets, multi-factor authentication setup/resets, as well as employee account recovery. Scattered Spider targets this group the most by frequently impersonating employees calling IT support and Help desk personnel during after-hours (A time when not many people are around to verify legitimacy) requesting an “authentication reset” to gain remote access on that employee’s device.

How to Defend:

    • Be trained in detecting social engineering, especially during after-hours or peak times when there are multiple requests in short windows.’
    • Create a process that can be implemented for out of band authorization, meaning that if an employee calls saying they have lost their password and phone, be able to differentiate between a legitimate employee calling and a threat actor, like Scattered Spider, calling in to gain initial access.
    • Log and audit all reset/MFA enrollment and reset requests.
    • Block unauthorized Remote Monitoring and Management tools.
    • Use fallback verification channels, such as alternate phone numbers, to confirm identity.

2. Identity & Access Management Administrators: Control who can log into systems and what they can access. IAM Administrators manage passwords, multi-factor authentication, cloud access, and application permissions. They essentially hold the keys to everything. If an attacker compromises an IAM account, they can access multiple systems, escalate privileges to gain even more control, disable protections like MFA, remain hidden longer, exfiltrate sensitive data, or launch larger attacks.

How to Defend:

  • Have strong conditional access policies. Conditional access policies let you restrict logins to known IPs, managed devices, and geofenced locations, as well as specify token lifetimes to be short enough so even if it was stolen it will not work [14].
  • Use stronger multi-factor authentication for admins, such as hardware-based tokens or NFC connections. Hardware tokens are highly resistant to phishing and are not reliant on mobile devices [15].
  • Implement passkeys for employee authentication. Passkeys are cryptographic keys stored directly to a specific device and cannot be linked or synced to other devices [16].
  • Don’t let admin access be “always on.” Give admin access only when necessary, not all the time. (This is also called “just-in-time” access.)
  • Implement allow-listing and block known applications used by Scattered Spider and only allowing specific internal tools used within the company [17].
  • Watch for suspicious activity. Flag whenever someone logs in from a new device or location, or if a login token gets reused.
  • Clean up unused integrations. Disconnect old logins and apps that are no longer used, as they are an easy way to get in.

3. Executives & High-Privilege Users: Individuals with access to extremely valuable data, such as sensitive financial, legal, or insurance information. They are the prime targets for extortion and leveraging attacks due to having broader system privileges across the organization.

Why they are targeted: Offers high-value access with minimal friction. Executives often have direct access to confidential documents; their accounts typically have higher internal trust, and if compromised, could be used to trick others within the organization. Executive accounts are also often over-permissioned and interwoven in multiple high-risk systems, so one compromise can rapidly destruct laterally.

How to Defend:

  • Be phishing savvy.
  • Use hardware-based multi-factor authentication to prevent SIM-swaps and push bombing, a method used to overwhelm a user with repeated multi-factor authentication push notifications in hopes that the user will eventually approve out of annoyance.

4. Standard Users Across the Organization: Everybody else using email, SaaS (Software-As-A-Service, software solutions delivered over the internet on a subscription basis) apps, and cloud tools.

How they are targeted: Phishing, smishing, and multi-factor authentication attacks

How to Defend:

  • Partake in ongoing training with phishing and smishing simulations and report suspicious MFA prompts.
  • Use strong passwords, including no reuse, no hints, and use of password managers.
  • Disable email-based onetime passwords as this can be leveraged to gain onwards authentication.
  • Enable account lockouts after failed login attempts to limit brute-force access.
  • Block unauthorized software, especially remote access or monitoring tools.
  • Update devices and software regularly.
  • Be cautious when uploading or sharing files in cloud platforms like SharePoint, Slack, or email.

VII. References

[1] Scattered spider: Cisa. Cybersecurity and Infrastructure Security Agency CISA. (2025, July 31). https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a

[2] Scattered spider. Scattered Spider, Roasted 0ktapus, Octo Tempest, Storm-0875, Group G1015 | MITRE ATT&CK®. (2024, April 4). https://attack.mitre.org/versions/v17/groups/G1015/

[3] Tidy, J. (2025, May 21). M&S and co-op hacks: Scattered spider is focus of police investigation. BBC News. https://www.bbc.com/news/articles/ckgnndrgxv3

[4] Poston, H. (2022, March 21). £300m gone: How scattered spider hit the UK’s biggest retailers. Hack The Box. https://www.hackthebox.com/blog/scattered-spider-insurance-retail-attacks

[5] Silberstein, N. (2025, June 13). Update: May cyber attack expected to cost victoria’s secret $20 million. Retail TouchPoints. https://www.retailtouchpoints.com/topics/security/data-security/victorias-secret-latest-hit-in-growing-swath-of-retail-cyber-attacks

[6] Beek, K. (2025, May 27). Adidas falls victim to third-party Data Breach. https://www.darkreading.com/vulnerabilities-threats/adidas-victim-third-party-data-breach

[7] Scattered spider targets tech companies for help-desk exploitation. ReliaQuest. (2025, June 23). https://reliaquest.com/blog/scattered-spider-cyber-attacks-using-phishing-social-engineering-2025/

[8] Fadilpašić, S. (2025, July 30). FBI, CISA warn of more scattered spider attacks to come. TechRadar. https://www.techradar.com/pro/security/fbi-cisa-warn-of-more-scattered-spider-attacks-to-come

[9] Scattered spider escalates attacks across industries. CrowdStrike. (n.d.). https://www.crowdstrike.com/en-us/blog/crowdstrike-services-observes-scattered-spider-escalate-attacks/

[10] Yasir, S. (2025, July 7). Inside the scattered Spider Attack: How a UK retail giant was breached and what it means for… Medium. https://medium.com/@shaheeryasirofficial/inside-the-scattered-spider-attack-how-a-uk-retail-giant-was-breached-and-what-it-means-for-e3e94a7ce5bf

[11] Richardson, J. (2025, July 29). Scattered spider: The looming shadow over U.S. cybersecurity. Medium. https://medium.com/@the-prototype/scattered-spider-the-looming-shadow-over-u-s-cybersecurity-e8ce141185a5

[12] Tahir. (2025, May 2). Unmasking the scattered Spider Threat actor. Medium. https://medium.com/@tahirbalarabe2/%EF%B8%8Funmasking-the-scattered-spider-threat-actor-6435c2439ed7

[13] Doyle, A., & Langley, M. (2025, June 9). Scattered spider: A web of social engineering – threat actors. Daily Security Review. https://dailysecurityreview.com/resources/threat-actors-resources/scattered-spider-a-web-of-social-engineering/

[14] Shastri, V. (2025, January 15). What is conditional access?. CrowdStrike. https://www.crowdstrike.com/en-us/cybersecurity-101/identity-protection/conditional-access/

[15] Horn, P. (2025, July 11). Passkeys vs Hardware Tokens: Phishing-resistant MFA. Accutive Security – The IAM + Crypto Products and Services Company. https://accutivesecurity.com/guide-to-passkeys-and-hardware-security-tokens-yubikeys/

[16] Passkeys: Passwordless authentication. FIDO Alliance. (2025, July 24). https://fidoalliance.org/passkeys/

[17] What is allowlisting?: Broadcom. Broadcom Inc. (n.d.). https://www.broadcom.com/topics/allowlisting

Threat Advisory created by The Cyber Florida Security Operations Center. Contributing Security Analysts: Waratchaya Luangphairin (June), Taylor Alvarez, Lara Radovanovic, Sneha Lama

To learn more about Cyber Florida visit: www.cyberflorida.org

Scattered Spider Threat Report2025-09-12T13:13:50-04:00

The Making of A Defender | A Documentary Premiere

You’re invited to the world premiere!

Cyber Florida and the University of South Florida are proud to invite you to the premiere of The Making of a Defender, a documentary film.

Event Details

🗓️ Wednesday, September 24
⏰ 6:00pm
📍 USF Oval Theater

This yearlong story follows USF’s cybersecurity competition team—the CyberHerd—from upstart challengers to national prominence. Tampa has always loved an underdog and a champion (ChampaBay, anyone?), and the CyberHerd embodies both.

More than a competition story, The Making of a Defender shows how solving the nation’s cybersecurity challenges is becoming a pillar of the Tampa Bay community and beyond. As CyberBay grows, this story becomes one of its cornerstones.

The Making of A Defender | A Documentary Premiere2025-09-25T09:43:39-04:00