Cybersecurity

HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass 

HPE Issues Security Patch for StoreOnce Bug Allowing Remote Authentication Bypass 

Hewlett Packard Enterprise (HPE) has released security updates to address as many as eight vulnerabilities in its StoreOnce data backup and deduplication solution that could result in an authentication bypass and remote code execution.
“These vulnerabilities could be remotely exploited to allow remote code execution, disclosure of information, server-side request forgery, authentication bypass,

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack 

Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack 

Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware.
The DomainTools Investigations (DTI) team said it identified “malicious multi-stage downloader Powershell scripts” hosted on lure websites that masquerade as Gitcode and DocuSign.

The AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better 

The AI Fix #53: An AI uses blackmail to save itself, and threats make AIs work better 

In episode 53 of The AI Fix, our hosts suspect the CEO of Duolingo has been kidnapped by an AI, Sergey Brin says AIs work better if you threaten them with physical violence, Graham wonders how you put a collar on a headless robot dog, Mark asks why kickboxing robots wear head guards, and the CEO of Anthropic says AI could wipe out entry-level jobs.

Graham asks your favourite AI how it feels about being kidnapped, and Mark explains how an AI tried to save itself by blackmailing the engineer responsible for turning it off.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code 

Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code 

Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has gone unnoticed for a decade and could be exploited to take over susceptible systems and execute arbitrary code.
The vulnerability, tracked as CVE-2025-49113, carries a CVSS score of 9.9 out of 10.0. It has been described as a case of post-authenticated remote code execution via

Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization 

Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization 

In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused — currently looking like hundreds of millions in lost profits for M&S alone. 
This coverage is extremely valuable for the cybersecurity community as it raises

Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets 

Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets 

A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America.
The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the victim’s contacts list.
“Recent

Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues 

Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues 

Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing “patterns of concerning behavior observed over the past year.”
The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137. 
The update will affect all Transport Layer Security (TLS)

Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion 

Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion 

Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping.
“By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence,” Vasu Jakkal, corporate vice president at Microsoft

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch 

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch 

Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild.
The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine.
“Out of bounds read and write in V8 in Google

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub 

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub 

Cybersecurity researchers have discovered a new cryptojacking campaign that’s targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies.
Cloud security firm Wiz, which is tracking the activity under the name JINX-0132, said the attackers are exploiting a wide range of known misconfigurations and

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X