Cybersecurity

SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords 

SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords 

Two security vulnerabilities have been disclosed in SinoTrack GPS devices that could be exploited to control certain remote functions on connected vehicles and even track their locations.
“Successful exploitation of these vulnerabilities could allow an attacker to access device profiles without authorization through the common web management interface,” the U.S. Cybersecurity and Infrastructure

How to Build a Lean Security Model: 5 Lessons from River Island 

How to Build a Lean Security Model: 5 Lessons from River Island 

In today’s security landscape, budgets are tight, attack surfaces are sprawling, and new threats emerge daily. Maintaining a strong security posture under these circumstances without a large team or budget can be a real challenge. Yet lean security models are not only possible – they can be highly effective.
River Island, one of the UK’s leading fashion retailers, offers a powerful

Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild 

Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wild 

Microsoft has released patches to fix 67 security flaws, including one zero-day bug in Web Distributed Authoring and Versioning (WEBDAV) that it said has come under active exploitation in the wild.
Of the 67 vulnerabilities, 11 are rated Critical and 56 are rated Important in severity. This includes 26 remote code execution flaws, 17 information disclosure flaws, and 14 privilege escalation

Patch Tuesday, June 2025 Edition 

Patch Tuesday, June 2025 Edition 

Microsoft today released security updates to fix at least 67 vulnerabilities in its Windows operating systems and software. Redmond warns that one of the flaws is already under active attack, and that software blueprints showing how to exploit a pervasive Windows bug patched this month are now public. 

Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps 

Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps 

Adobe on Tuesday pushed security updates to address a total of 254 security flaws impacting its software products, a majority of which affect Experience Manager (AEM).
Of the 254 flaws, 225 reside in AEM, impacting AEM Cloud Service (CS) as well as all versions prior to and including 6.5.22. The issues have been resolved in AEM Cloud Service Release 2025.5 and version 6.5.23.
“Successful

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud 

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud 

Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries), exposing sensitive data to unauthorized internal and external parties.
The weaknesses affect various components like FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions.
“Low-code platforms such as

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware 

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware 

The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web Services (AWS) infrastructure to deliver a malware family called More_eggs.
“By posing as job seekers and initiating conversations through platforms like LinkedIn and Indeed, the group builds rapport with recruiters before delivering phishing messages that lead to malware,” the

The AI Fix #54: Will AI collapse under its own garbage, and AI charity “Hunger Games” 

The AI Fix #54: Will AI collapse under its own garbage, and AI charity “Hunger Games” 

In episode 54 of The AI Fix, Graham saves humanity with a CAPTCHA, Mark wonders whether AI can suffer, ChatGPT throws shade at Abba’s Björn Ulvaeus, an AI called Jack ask if you want fries with that, an artist invents AI bird poop, and Eric Schmidt says we should unplug AI when it gets direct access to weapons.

Graham finds out what happens when a rag tag team of AIs is given 30 days to raise money for charity, and Mark explores model collapse and Claude Opus 4.0’s weird obsession with a fictional factory-farmed chicken company.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users 

Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users 

Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent gaming websites.
“Upon execution, the malware displays a fake window to appear legitimate while simultaneously decrypting and executing malicious code in the background,” Trellix security researchers Niranjan Hegde, Vasantha Lakshmanan

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier 

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier 

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks to an

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X