Cybersecurity

How SSL Misconfigurations Impact Your Attack Surface 

How SSL Misconfigurations Impact Your Attack Surface 

When assessing an organization’s external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their widespread use, configuration complexity, and visibility to attackers as well as users make them more likely to be exploited. 
This highlights how important your SSL configurations are in maintaining your web application security and

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites 

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites 

The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis (not to be confused with an Android banking trojan of the same name) that can grant them remote access to compromised Windows systems.
“This malware allows attackers to execute remote shell commands and other system operations, giving them full control over an infected machine,” Swiss

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth 

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth 

Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems.
“Hijack Loader released a new module that implements call stack spoofing to hide the origin of function calls (e.g., API and system calls),” Zscaler ThreatLabz researcher Muhammed Irfan V A said in

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign 

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign 

Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy cryptocurrency miners.
Cloud security firm Wiz said the activity is a variant of an intrusion set that was first flagged by Aqua Security in August 2024 that involved the use of a malware strain dubbed PG_MEM. The campaign has been attributed to a threat actor Wiz tracks as

Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform 

Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform 

On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to send end-to-end encrypted (E2EE) to any user in any email inbox in a few clicks.
The feature is rolling out starting today in beta, allowing users to send E2EE emails to Gmail users within an organization, with plans to send E2EE emails to any Gmail inbox in the coming weeks and to any email inbox

The AI Fix #44: AI-generated malware, and a stunning AI breakthrough 

The AI Fix #44: AI-generated malware, and a stunning AI breakthrough 

In episode 44 of The AI Fix, ChatGPT won’t build a crystal meth lab, GPT-4o improves the show’s podcast art, some students manage to screw in a lightbulb, Google releases Gemini 2.5 Pro Experimental and nobody notices, and Mark invents a clock for measuring AI time.

Graham explains how ChatGPT’s love for Young Adult fiction can be used to turn it into an evil malware developer, and Mark looks at the ARC-AGI-2 benchmark and a staggering leap forward in AI intelligence.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing 

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing 

A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and Rich Communication Services (RCS) for Android.
Lucid’s unique selling point lies in its weaponizing of legitimate communication platforms to sidestep traditional SMS-based detection mechanisms.
“Its scalable,

Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices 

Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices 

Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild to older models and previous versions of the operating systems.
The vulnerabilities in question are listed below –

CVE-2025-24085 (CVSS score: 7.3) – A use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate

Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign 

Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign 

Cybersecurity researchers are warning of a spike in suspicious login scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect gateways, with nearly 24,000 unique IP addresses attempting to access these portals.
“This pattern suggests a coordinated effort to probe network defenses and identify exposed or vulnerable systems, potentially as a precursor to targeted exploitation,” threat

New Case Study: Global Retailer Overshares CSRF Tokens with Facebook 

New Case Study: Global Retailer Overshares CSRF Tokens with Facebook 

Are your security tokens truly secure?
Explore how Reflectiz helped a giant retailer to expose a Facebook pixel that was covertly tracking sensitive CSRF tokens due to human error misconfigurations. Learn about the detection process, response strategies, and steps taken to mitigate this critical issue. Download the full case study here. 
By implementing Reflectiz’s recommendations, the

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X