Insights

AI Will Take Notes-Do You Mind?

Artificial Intelligence, AI, offers an automated way to take meeting notes without burdening any participant or having someone attend just to take notes. A definite benefit. However, it is not without certain drawbacks. This Insight looks at the pros and cons. 

 

AI for meeting minutes


Phishing campaign targets Microsoft device-code authentication flows

An advanced phishing campaign exploits weaknesses in the authentication process for devices that cannot complete it with the authentication web flow. It steals the authentication code sent to the user and with it gains access to applications and date. Be careful if you receive a login or authentication request. 

 

Phishing targets Microsoft authentication


'Darcula' Phishing Kit Can Now Impersonate Any Brand

A phishing kit just introduced a new version with significantly improved features. Now all you need do is input the website you wish to use in the phishing messages. The software copies the site and allows you to change any part of it. This creates a very real looking site but may have a new page that requests your login credentials or credit card information. Sadly, very powerful in its ability to fool people.  

 

Phishing kit updated to be more threatening


North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

Freelancers need to stay busy and look for opportunities. This scam uses fake employment opportunities on to lure people to apply.  These may be posted on job or freelancer sites or through ads on social media sites. The goal is to deploy malware and steal login and passwords from the browsers. cryptocurrency. Cryptocurrency wallets are a final target. 

 

Freelance developers targeted 

 


Xerox Printer Vulnerabilities Enable Credential Capture

Printers may not be the first thing thought of when considering cyber safety. But printers are on the network and can be reached by almost all devices on the network. This attack exploits a flaw in Xerox printers to accomplish its goal. 

 

Printers exploited in cyberattack


AI Inspired Bank Scams

Artificial Intelligence, AI, is all the rage now offering help in so many areas. Sadly, it also offers help to cybercriminals who exploit its power to perpetrate more effective attacks. 

 

AI helps attackers with bank scams


Microsoft's February Patch a Lighter Lift Than January's

Last month Microsoft issued over 150 patches. Far less this month but still some very important ones. Two zero-days and others addressing serious vulnerabilities. Review them then install the ones applicable to you. 

 

Microsoft patches zero-days and more


Adobe Plugs 45 Software Security Holes, Warn of Code Execution Risks

Adobe has also issued a number of patches. Please be sure to install the ones for the packages you have. 

 

Adobe issues patches, install now!


DeepSeek AI Fails Multiple Security Tests, Raising Red Flag for Businesses

DeepSeek made the headlines recently for delivering leading functionality at a far lower cost than competitors. However, it is not very secure. Be very careful! 

 

DeepSeek not safe


New Gmail Security Alert For 2.5 Billion Users As AI Hack Confirmed

Gmail users are under active attack, 2.5 billion of them. In an AI enhanced attack cybercriminals put all Gmail users at risk. 

 

AI enhanced attack on Gmail

 


Smartphones – A Growing Target

We all carry smartphones. But few realize that they are a significant target for cyberattackers. Phishing is the preferred form of attack. This Insight looks at the attacks, why smartphones are a target and what you can do to be safer. 

 

Smartphones-favorite phishing target


MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

An attack on BOINC, the open-source network computing platform from UC Berkley is distributing the StealC infoastealer when Boinc is downloaded. 

 

Boinc compromise delivers infostealer


For $50, Cyberattackers Can Use GhostGPT to Write Malicious Code

Cybercriminals are now offering access to their AI system on a rental basis making it available to a much wider audience. The attackers will use the AI system to improve their attack code and make it more successful and harder to detect. 

 

Cyberattackers offer AI for rent


Actively Exploited Fortinet Zero-Day Gives Attackers Super-Admin Privileges

Fortinet, a firewall company, was compromised recently. The compromise allowed attackers into the firewall with Super-Admin privileges. That means they could do anything they want. Install the patch as soon as possible. 

 

Fortinet patches vulnerability


Google Bans 158,000 Malicious Android App Developer Accounts in 2024

Attackers go after high value targets. Infecting Android apps spreads their malware far and wide. Be careful what you use and download. 

 

Malicious Android apps banned