Insights

Search Engine Results Can Be Dangerous

Search engine use is a daily occurrence for many people. But many do not know how the results can be manipulated to direct you to corrupt sites. This Insight looks at how that occurs and suggests ways to be safer. 

 

Search may come with malware


Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign

All users of calendar apps are familiar with invitations for meetings. But attackers have found a way to spoof Google Calendar invites to steal credentials. Malicious calendar invites were getting flagged and blocked so attackers found a way around that by using spoofing the invite and using Google Drawings and Google Forms to disguise things.  Confirm the invite form the supposed sender before accepting it. 

 

Spoofed Google Calendar Invites = Danger


Does Desktop AI Come With a Side of Risk?

AI systems are proliferating. Now a number of desktop systems, Microsoft 365 Copilot, Google Gemini, and Apple Intelligence include AI capabilities. But as we have written many times before, AI systems have many risks. These systems bring it to the desktop and possibly beyond the ability of IT to control. This can be very dangerous to any company or organization. 

 

Desktop AI very risky

 


Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack

Two Rspack npm packages in the repository have been compromised and deliver malware in every download. Both have been pulled from the repository. Fortunately, there is a newer package, version 1.1.8 that is safe. If you use version 1.1.6 or version 1.1.7 replace them immediately.  

 

Replace compromised Rspack package now


Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2

Apache Struts 2 is an older framework for building Java applications. But it is still in use especially for legacy systems. The problem is serious, CVSS 9.5. But how old it is creates problems and a simple patch won’t fix it. 

 

Serious Apache Struts 2 problem


Social Engineering Is the Biggest Risk

Research shows that social engineering, or tricking people into clicking a link or doing some other questionable action, is the leading cause of breaches. Yet little of the cybersecurity budget is spent on training to reduce this risk. This Insight looks at some successful examples of social engineering and the consequences.   

 

Social Engineering-bigger risk than thought


New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools

The widespread use of Microsoft products makes them a major target for cyberattackers. In another case, attackers are able to bypass protections and use the UI Framework to evade detection. 

 

MS products used to bypass protections


Critical ‘AuthQuake’ bug let attackers bypass Microsoft MFA

Multi-Factor Authentication, MFA, is supposed to be safer than passwords alone. But cybercriminals have found a way around Microsoft’s MFA to gain access to a user account and Outlook emails, OneDrive files, Teams chats, and the Azure Cloud

 

Microsoft MFA defeated


New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

Malware recently detected is a rootkit for Linux based systems. It is serious in its abilities to elude detection, hide its files and directories, escalate its privileges and more. Very serious. Be sure to install a patch as soon as its available.  

 

New Linux rootkit found


WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins

WordPress is the target of another exploit. This uses a vulnerability in the Hunk Companion plugin to install other plugins that can be easily used to install malware and other attack methods. 

 

Another WordPress attack


Holiday Scams

The holiday season is a time when people are shopping, looking for bargains, and rushed. Cybercriminals know this and have scams to fit the season. But still steal your money, credit cards, and more. This Insights looks at the scams and offers ways to be safer. 

 

So many ways to steal your money


Decade-Old Cisco Vulnerability Under Active Exploit

A vulnerability that has existed for over 10 years in an older version of Cisco Adaptive Security Appliance is under attack. The vulnerability cannot be patched so Cisco is advising customers to upgrade to a version of the ASA not affected by this vulnerability. 

 

Old doesn't mean safe


CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel

CISA, the official cybersecurity agency has identified serious vulnerabilities in a number of products and services. One of them is rated at 10.0, the highest possible score meaning it is very dangerous. This article provides more information and suggestions to be safer. 

 

More vulnerabilities discovered


Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels

In yet another use of legitimate cyber services and tools to deliver malware, a Russian Advanced Persistent Threat, APT, group is using Cloudflare encrypted tunnels to deliver its malware. 

 

Malware hiding in plain site


Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

The flaws found in these frameworks are serious. Flaws discovered earlier were on the server side. These flaws are on the client side and can result in attackers being able to execute code on your systems. With the ability to execute code, nothing on your systems is safe.

 

Machine learning data leaks