Insights
Social Engineering Scams Take a New Turn

Social engineering, or fooling people into doing bad actions, is one of the most successful attack methods of cybercriminals. Building on success, they have a new way to do it and gain access to company systems and steal money. 

 

 Social Engineering is the new attack of choice


Attacker Social-Engineered Backdoor Code Into XZ Utils

Attackers have shown that no technical skill is needed to perpetrate a significant cyber compromise. Social engineering, the art of convincing people that you are authorized to get confidential information, is enough. 

 

Social Engineering yields big rewards


Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs

CrushFTP is a file transfer package used by many companies. By exploiting a zero-day vulnerability attackers have been able to gain access and even execute code. Install the patch now. 

 

Another zero-day being exploited


New 'Brokewell' Android Malware Spread Through Fake Browser Updates

Another instance of fake updates being used to spread malware. Be very careful before accepting the updates. 

 

Fake updates again


Russian Hackers Exploiting Windows Print Spooler Vuln

SMB Cyber Myths

There are a number of myths that endanger Small and Medium size businesses, SMBs. Do you know what they are? And what to do about them? We tell you here. 

 

Cyber myths are dangerous

 

 


Cisco Duo's Multifactor Authentication Service Breached

Multi-factor Authentication, MFA, is touted as far safer than passwords alone. However, there are different types of MFA. Some are much safer, and some are not. Here Cisco’s MFA has been breached. Know what to do. 

 

Cisco MFA breached


Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes

Kubernetes, the open source container software, is widely used and is now being exploited. If you use it, learn what to do. 

 

Kubernetes being exploited


Facebook’s AI Told Parents Group It Has a Gifted, Disabled Child

In another example of an AI system issue, a parent enquired about advice for a gifted and disabled child. The AI system replied that it, the AI system, had a gifted and disabled child. All that these systems say should not be taken at face value. 

 

AI system has a child???


Gamers Are Renting Their Idle GPUs to Generate AI Porn

Gamers typically use devices with high powered graphics engines. Now they are renting that capacity to cybercriminals to generate porn using AI systems. 

 

Gamers renting idle GPUs for nefarious purposes