Search Engine Results Can Be Dangerous
Published Dec 20 2024 2:22 PM
Search engine use is a daily occurrence for many people. But many do not know how the results can be manipulated to direct you to corrupt sites. This Insight looks at how that occurs and suggests ways to be safer.
Search may come with malware
Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign
Published Dec 20 2024 2:19 PM
All users of calendar apps are familiar with invitations for meetings. But attackers have found a way to spoof Google Calendar invites to steal credentials. Malicious calendar invites were getting flagged and blocked so attackers found a way around that by using spoofing the invite and using Google Drawings and Google Forms to disguise things. Confirm the invite form the supposed sender before accepting it.
Spoofed Google Calendar Invites = Danger
Does Desktop AI Come With a Side of Risk?
Published Dec 20 2024 2:17 PM
AI systems are proliferating. Now a number of desktop systems, Microsoft 365 Copilot, Google Gemini, and Apple Intelligence include AI capabilities. But as we have written many times before, AI systems have many risks. These systems bring it to the desktop and possibly beyond the ability of IT to control. This can be very dangerous to any company or organization.
Desktop AI very risky
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack
Published Dec 20 2024 2:14 PM
Two Rspack npm packages in the repository have been compromised and deliver malware in every download. Both have been pulled from the repository. Fortunately, there is a newer package, version 1.1.8 that is safe. If you use version 1.1.6 or version 1.1.7 replace them immediately.
Replace compromised Rspack package now
Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2
Published Dec 20 2024 2:11 PM
Apache Struts 2 is an older framework for building Java applications. But it is still in use especially for legacy systems. The problem is serious, CVSS 9.5. But how old it is creates problems and a simple patch won’t fix it.
Serious Apache Struts 2 problem
Social Engineering Is the Biggest Risk
Published Dec 13 2024 9:11 AM
Research shows that social engineering, or tricking people into clicking a link or doing some other questionable action, is the leading cause of breaches. Yet little of the cybersecurity budget is spent on training to reduce this risk. This Insight looks at some successful examples of social engineering and the consequences.
Social Engineering-bigger risk than thought
New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools
Published Dec 13 2024 9:08 AM
The widespread use of Microsoft products makes them a major target for cyberattackers. In another case, attackers are able to bypass protections and use the UI Framework to evade detection.
MS products used to bypass protections
Critical ‘AuthQuake’ bug let attackers bypass Microsoft MFA
Published Dec 13 2024 9:05 AM
Multi-Factor Authentication, MFA, is supposed to be safer than passwords alone. But cybercriminals have found a way around Microsoft’s MFA to gain access to a user account and Outlook emails, OneDrive files, Teams chats, and the Azure Cloud.
Microsoft MFA defeated
New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection
Published Dec 13 2024 9:03 AM
Malware recently detected is a rootkit for Linux based systems. It is serious in its abilities to elude detection, hide its files and directories, escalate its privileges and more. Very serious. Be sure to install a patch as soon as its available.
New Linux rootkit found
WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins
Published Dec 13 2024 9:01 AM
WordPress is the target of another exploit. This uses a vulnerability in the Hunk Companion plugin to install other plugins that can be easily used to install malware and other attack methods.
Another WordPress attack
Holiday Scams
Published Dec 6 2024 2:59 PM
The holiday season is a time when people are shopping, looking for bargains, and rushed. Cybercriminals know this and have scams to fit the season. But still steal your money, credit cards, and more. This Insights looks at the scams and offers ways to be safer.
So many ways to steal your money
Decade-Old Cisco Vulnerability Under Active Exploit
Published Dec 6 2024 2:57 PM
A vulnerability that has existed for over 10 years in an older version of Cisco Adaptive Security Appliance is under attack. The vulnerability cannot be patched so Cisco is advising customers to upgrade to a version of the ASA not affected by this vulnerability.
Old doesn't mean safe
CISA Warns of Active Exploitation of Flaws in Zyxel, ProjectSend, and CyberPanel
Published Dec 6 2024 2:54 PM
CISA, the official cybersecurity agency has identified serious vulnerabilities in a number of products and services. One of them is rated at 10.0, the highest possible score meaning it is very dangerous. This article provides more information and suggestions to be safer.
More vulnerabilities discovered
Russia's 'BlueAlpha' APT Hides in Cloudflare Tunnels
Published Dec 6 2024 2:51 PM
In yet another use of legitimate cyber services and tools to deliver malware, a Russian Advanced Persistent Threat, APT, group is using Cloudflare encrypted tunnels to deliver its malware.
Malware hiding in plain site
Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks
Published Dec 6 2024 2:48 PM
The flaws found in these frameworks are serious. Flaws discovered earlier were on the server side. These flaws are on the client side and can result in attackers being able to execute code on your systems. With the ability to execute code, nothing on your systems is safe.
Machine learning data leaks