- Comparitech Stack Report
- Posts
- Cybersecurity Pros Charged with Hacking and Extortion in the US
Cybersecurity Pros Charged with Hacking and Extortion in the US
🔎 Cyber Watch 🔎
Two former cybersecurity pros charged with hacking and extortion
Two men, Kevin Tyler Martin and Ryan Clifford Goldberg, have been indicted for allegedly hacking U.S. firms and extorting millions. What makes it especially alarming: both previously worked at cybersecurity firms. Martin was with DigitalMint, which helps victims negotiate with ransomware actors. Goldberg worked at Sygnia, which simulates ransomware attacks for clients.
According to the indictment, they allegedly used ALPHV (BlackCat) ransomware in the attacks. Their alleged targets include a medical device manufacturer in Florida, a pharmaceutical company in Maryland, and a drone company in Virginia. Legal charges include “interference in interstate commerce through extortion” and “intentional damage to a protected computer.”
Key takeaway
Insider threats aren’t always about careless employees — sometimes the threat comes from the very people we think are guardians
🎙️ Tech Briefing On‑Air 🎙️
Anthropic’s AI APT report is a big deal
In this episode, the hosts break down a report from Anthropic on AI-driven Advanced Persistent Threats (APT). They explore how AI could transform the future of cyberattacks — not just in volume but in sophistication.
The discussion touches on how threat actors may increasingly leverage generative AI for new types of reconnaissance, automated phishing, or even decision support in planning complex operations. The hosts also debate the paradox: defenders are racing to build AI-powered security tools, while adversaries aim to weaponise the same technology to create sophisticated attacks.
Takeaways: As generative AI becomes more capable, the cyber risk landscape could shift — and this conversation helps listeners understand where cybersecurity might be headed.
🤝 Partner Intel 🤝
Check Point’s Secure Access Service Edge (SASE)
Check Point’s SASE platform brings several security functions together, including a business VPN, Zero-Trust Network Access, a secure web gateway, and firewall-as-a-service. It uses long-standing VPN technology as its core, which gives it a stable base for remote access. Admins can set detailed access rules, allowing teams to control which services users reach and how they connect. The platform is also easier to manage than many all-in-one security products, which can be helpful for IT teams that want strong protection without a steep setup curve.
🤖 AI Runtime 🤖
Cybersecurity teams lean heavily into automation and AI
AI is no longer optional in security operations — but adoption is not without its trade-offs.

According to a new Evolution of Cybersecurity Automation and AI Adoption Report from ThreatQuotient (a Securonix company), 97% of global cybersecurity professionals say automation is now “business-critical.” Even with growing budgets, 96% report significant challenges: lack of trust in automated outcomes, technical limits, and not enough time to deploy new systems.
Key metrics are shifting: over half (56%) prioritize Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) as core KPIs, instead of just employee satisfaction. Top use cases for AI include triage and analysis (both human-in-the-loop and fully automated), vulnerability assessments, and predictive decision support.
That said, leadership remains conflicted: while senior execs drive AI adoption, there are concerns around skills gaps, ethical issues, and algorithmic bias.
📊 By the Numbers 📊
1 in 7
Bitdefender’s 2025 Consumer Cybersecurity Survey shows that one in seven people fell victim to a scam in the past year. That accounts for almost 14% of users.
🗳️ Your Monday Take 🗳️
Cast your vote on our weekly poll.
As AI becomes more capable, which of these scenarios worries you most in a future cyber-threat landscape? |
📩 We’ll share the results in the Friday issue.
|
Until Wednesday’s edition - Let’s keep that zero-day count at zero!