The Real Cyber Risks
Published Jan 17 2025 9:11 AM
The news tends to blame hackers for cyber breaches. But research shows there is another cause for over 80% of breaches. This Insight looks at that cause, how it occurs, and suggests ways to be safer.
Hacking not the real cause of breaches
New malware justifies Appleās locked-down security strategy
Published Jan 17 2025 9:08 AM
Apple aims to keep tight control over its environment. This has led to lawsuits to force acceptance of app stores other than Apple’s. In this case browser extension apps in the other stores were corrupted. Anyone downloading apps from the non-Apple store got malware in the app that could steal your data.
Apple's tight security vindicated
Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days
Published Jan 17 2025 9:05 AM
Ransomware attackers are exploiting Amazon Web Services own encryption to encrypt user data. If the demanded ransom is not paid within 7 days, the data is deleted by the attackers.
AWS encryption exploited by ransomware attackers
Woe Daddy: FTC raps hosting giant GoDaddy for security lapses
Published Jan 17 2025 9:01 AM
Go Daddy, a popular web hosting platform, has been warned by the FTC to improve their cyber security or face stiff fines.
Go Daddy lax on security
4.2 million internet hosts hijacked via bugs in tunneling protocols
Published Jan 17 2025 8:51 AM
Tools used to keep us safer don’t always do the job. In this case attackers exploited a vulnerability in VPNs and more.
Tunneling protocols exploited
How Safe Are Passkeys?
Published Jan 10 2025 10:50 AM
Are they really safer than passwords as much publicity says? This Insight looks at how they work and their pros and cons. Spoiler alert, they are safer than passwords alone.
Passkeys - pros and cons
New Banshee Stealer Variant Bypasses Antivirus with Apple's XProtect-Inspired Encryption
Published Jan 10 2025 10:47 AM
Using Apple’s Xprotect encryption techniques allows this infostealer to avoid detection. Hackers are getting better. Stay up to date to be safe.
Attackers exploit Apple encryption technique
Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure
Published Jan 10 2025 10:43 AM
Serious Ivanti flaw, rated at CVSS 9.0, is being exploited. Be sure to patch now and have the most current version.
Serious Ivanti flaw being exploited
Unconventional Cyberattacks Aim to Take Over PayPal Accounts
Published Jan 10 2025 10:40 AM
In a new attack, Microsoft 365 is being used to send payment requests. If the user then logs into their PayPal account the attacker steals the credentials and takes over the account. Be sure before logging in.
New attack steals PayPal details
PhishWP Plug-in Hijacks WordPress E-Commerce Checkouts
Published Jan 10 2025 10:38 AM
WordPress is a popular platform for website publishing and now e-commerce. This fake app impersonates payment service sites like Stripe to steal the payment processing information from people using real sites. .
WordPress plugin steals details
Search Engine Results Can Be Dangerous
Published Dec 20 2024 2:22 PM
Search engine use is a daily occurrence for many people. But many do not know how the results can be manipulated to direct you to corrupt sites. This Insight looks at how that occurs and suggests ways to be safer.
Search may come with malware
Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign
Published Dec 20 2024 2:19 PM
All users of calendar apps are familiar with invitations for meetings. But attackers have found a way to spoof Google Calendar invites to steal credentials. Malicious calendar invites were getting flagged and blocked so attackers found a way around that by using spoofing the invite and using Google Drawings and Google Forms to disguise things. Confirm the invite form the supposed sender before accepting it.
Spoofed Google Calendar Invites = Danger
Does Desktop AI Come With a Side of Risk?
Published Dec 20 2024 2:17 PM
AI systems are proliferating. Now a number of desktop systems, Microsoft 365 Copilot, Google Gemini, and Apple Intelligence include AI capabilities. But as we have written many times before, AI systems have many risks. These systems bring it to the desktop and possibly beyond the ability of IT to control. This can be very dangerous to any company or organization.
Desktop AI very risky
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
Published Dec 20 2024 2:14 PM
Two Rspack npm packages in the repository have been compromised and deliver malware in every download. Both have been pulled from the repository. Fortunately, there is a newer package, version 1.1.8 that is safe. If you use version 1.1.6 or version 1.1.7 replace them immediately.
Replace compromised Rspack package now
Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2
Published Dec 20 2024 2:11 PM
Apache Struts 2 is an older framework for building Java applications. But it is still in use especially for legacy systems. The problem is serious, CVSS 9.5. But how old it is creates problems and a simple patch won’t fix it.
Serious Apache Struts 2 problem