Cybersecurity

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign 

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign 

An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining.
The activity, first detected by Amazon’s GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data 

Rogue NuGet Package Poses as Tracer.Fody, Steals Cryptocurrency Wallet Data 

Cybersecurity researchers have discovered a new malicious NuGet package that typosquats and impersonates the popular .NET tracing library and its author to sneak in a cryptocurrency wallet stealer.
The malicious package, named “Tracer.Fody.NLog,” remained on the repository for nearly six years. It was published by a user named “csnemess” on February 26, 2020. It masquerades as “Tracer.Fody,”

The AI Fix #81: ChatGPT is the last AI you’ll understand, and your teacher is a deepfake 

The AI Fix #81: ChatGPT is the last AI you’ll understand, and your teacher is a deepfake 

In episode 81 of The AI Fix, Graham discovers that deepfakes are already marking your kids’ homework, while Mark glimpses the future when he discovers AI agents that can communicate by reading each other’s minds.

Also in this episode, a Chinese robot called Miro U proves six arms are better than two; Mark discovers a well known prompting technique doesn’t work unless you want to make your AI dumber; Network Rail delays 32 trains because of an AI photo of a wonky bridge; and our hosts ponder the explosion of progress on the ARC-AGI-2 reasoning benchmark.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Most Parked Domains Now Serving Malicious Content 

Most Parked Domains Now Serving Malicious Content 

Direct navigation — the act of visiting a website by manually typing a domain name in a web browser — has never been riskier: A new study finds the vast majority of “parked” domains — mostly expired or dormant domain names, or common misspellings of popular websites — are now configured to redirect visitors to sites that foist scams and malware.

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure 

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure 

Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure between 2021 and 2025.
Targets of the campaign included energy sector organizations across Western nations, critical infrastructure providers in North America and Europe, and entities with cloud-hosted network infrastructure. The activity has

Why Data Security and Privacy Need to Start in Code 

Why Data Security and Privacy Need to Start in Code 

AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now facing rapid growth in both the number of applications and the pace of change within those applications. Security and privacy teams are under significant pressure as the surface area they must cover is expanding quickly while their staffing levels remain largely

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass 

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass 

Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices, less than a week after public disclosure.
Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious single sign-on (SSO) logins on FortiGate appliances on December 12, 2025. The attacks exploit two critical authentication bypasses (CVE-2025-59718 and CVE-2025-59719

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors 

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors 

The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor and ZnDoor, according to findings from Palo Alto Networks Unit 42 and NTT Security.
“KSwapDoor is a professionally engineered remote access tool designed with stealth in mind,” Justin Moore, senior manager of threat intel research at Palo Alto Networks Unit 42, said in a

Google to Shut Down Dark Web Monitoring Tool in February 2026 

Google to Shut Down Dark Web Monitoring Tool in February 2026 

Google has announced that it’s discontinuing its dark web report tool in February 2026, less than two years after it was launched as a way for users to monitor if their personal information is found on the dark web.
To that end, scans for new dark web breaches will be stopped on January 15, 2026, and the feature will cease to exist effective February 16, 2026.
“While the report offered general

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats 

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats 

A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every prompt entered by users into artificial intelligence (AI)-powered chatbots like OpenAI ChatGPT, Anthropic Claude, Microsoft Copilot, DeepSeek, Google Gemini, xAI Grok, Meta AI, and Perplexity.
The extension in question is Urban VPN Proxy, which has a 4.7 rating on the Google Chrome

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X