Shadow IT – Getting Riskier Part 1
Published Jun 27 2025 8:40 AM
Shadow IT is taking on new dimensions as Software as a Service or cloud-based applications gain in popularity. But with the benefits of SaaS come increased risks for the enterprise. This Insight looks at the growth of Shadow IT and the associated risks.
Shadow IT grows in risk
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
Published Jun 27 2025 8:36 AM
A serious vulnerability rated at 9.2 out of 10 is currently being exploited in Citrix NetScaler ADC. It allows attackers to gain access to the entire network when the device is configured as a gateway. Very dangerous! Patch as soon as possible.
Vulnerability gives full network access
Millions of Brother Printers Hit by Critical, Unpatchable Bug
Published Jun 27 2025 8:32 AM
Researchers found many bugs in printer systems. Brother is the one with the most bugs by far. Some are patchable and at least one very serious bug is not patchable. What will be done remains to be seen.
Unpatchable bug found
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
Published Jun 27 2025 8:29 AM
Microsoft Exchange servers are a popular target of cyberattackers and they have been hit again. Keyloggers that record all keystrokes infected the servers to steal credentials.
MS Exchange Servers hit with with keyloggers
Sim-swap fraud rises by 1,000% as criminals seek to exploit growth of two-factor authentication
Published Jun 27 2025 8:24 AM
SIM (Subscriber Identity Module) swap is a technique where a cybercriminal convinces a mobile carrier to transfer an existing mobile number to a new SIM in a new device. That new SIM and device then get all the calls and texts intended for the original owner. It can be very difficult to convince a carrier that you are the real owner and to transfer the number back to you.
SIM Swap grows significantly
Fake Information Is Getting Harder to Detect
Published Jun 20 2025 8:43 AM
Think you can spot fake information and not click on bad links? Most people believe they can. But experience shows most people can’t identify fake information. Cybercriminals are using AI to make things even harder to detect. Fake information is a powerful force in phishing.
Fake information is not easy to detect
A million SMS two-factor authentication codes were intercepted; here’s what to do
Published Jun 20 2025 8:36 AM
Two factor authentication is intended to make things safer than a password alone. However, the TFA codes sent by SMS, also called text messages, are not very safe. Over a million were captured.
TFA by SMS not secure
Social media is now the top news source in the U.S.
Published Jun 20 2025 8:33 AM
Social Media has now topped television and other news sources as the most popular source of news. This obviously affects many companies that advertise on TV. But more worrisome is how easy it is to create fake SM accounts for people and bots and how successful they are at influencing public opinion, even by with completely false information.
Social Media new top news source
Google pins weekend outage on "unexercised" feature
Published Jun 20 2025 8:31 AM
Some of Google’s cloud servers were knocked out last weekend affecting their own customers. Google attributed the downed services to new features which were not tested thoroughly before being released.
Incomplete testing = Google outage
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign
Published Jun 20 2025 8:27 AM
GitHub is a repository used by countless developers for tools and common code. Attackers have launched a complex attack corrupting repositories and offering free pen testing tools to get developers to download the infected files. The corrupt files deliver malware giving attackers the ability to do data exfiltration, remote access, and long-term persistence on the compromised systems.
GitHub corruption delivers malware
Cyber Cash Scams
Published May 2 2025 9:51 AM
Cybercriminals like cash as much as any legitimate business. It is immediate and can’t be stopped like a check or a chargeback filed like with a credit card. This Insight looks at some of the current cash scams.
Cash scams abound
SAP patches zero day rated 10.0 in NetWeaver
Published May 2 2025 9:48 AM
A new zero day vulnerability has been found in NetWeaver. It was assigned a CVSS score of 10 out of 10 meaning very dangerous. Be sure to install the patch as soon as possible.
NetWeaver zero-day, patch now!
Microsoft Office 365 MFA targeted by ‘SessionShark’ phishing kit
Published May 2 2025 9:46 AM
MFA, Multi-Factor Authentication, is supposed to provide additional security beyond a username and password. But cybercriminals claim to have found a way around the M365 MFA and avoid detection. It is being sold as a tool to attackers.
Microsoft MFA bypass
Xfinity Scam Might Explain Similar Scams
Published May 2 2025 9:44 AM
Callers pretending to be from your mobile phone service provider offer special savings plans. They have enough information about your account to gain credibility. All you have to do is pay the money in advance which will be refunded as the special offer gets validated. Of course it was a scam.
Scam callers have much private information
OpenAI hits rewind on a ChatGPT feature after users notice strange behavior
Published May 2 2025 9:39 AM
AI companies are racing to enhance their systems to gain more users and customers. But the rush to release features doesn’t always help. ChatGPT company OpenAI had to remove a feature after numerous reports of unexpected and unwanted behavior.
ChatGPT update undo