Cybersecurity

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections 

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections 

A combination of propagation methods, narrative sophistication, and evasion techniques enabled the social engineering tactic known as ClickFix to take off the way it did over the past year, according to new findings from Guardio Labs.
“Like a real-world virus variant, this new ‘ClickFix’ strain quickly outpaced and ultimately wiped out the infamous fake browser update scam that plagued the web

The AI Fix #62: AI robots can now pass CAPTCHAs, and punch you in the face 

The AI Fix #62: AI robots can now pass CAPTCHAs, and punch you in the face 

In episode 62 of The AI Fix, your hosts learn how AI models smash through CAPTCHA roadblocks like they’re made of wet tissue paper – so much for humanity’s last line of defence.

Meanwhile, we meet a bottle-flipping robot and call BS on a cartwheeling cyborg, Graham has a full-blown breakdown over traffic light puzzles, and Anthropic hires an AI psychiatry team to figure out why its bots are unhinged.

Also: Microsoft helpfully tells us which jobs are toast, Vogue replaces models with AI-generated glam-bots, and a tiny homebrew neural net humiliates the big boys at Sudoku.

Plus, Mark explores GEPA — the AI prompt optimiser that politely mutates your questions until they’re 35 times more effective than reinforcement learning.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild 

Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild 

Google has released security updates to address multiple security flaws in Android, including fixes for two Qualcomm bugs that were flagged as actively exploited in the wild.
The vulnerabilities include CVE-2025-21479 (CVSS score: 8.6) and CVE-2025-27038 (CVSS score: 7.5), both of which were disclosed alongside CVE-2025-21480 (CVSS score: 8.6), by the chipmaker back in June 2025.
CVE-2025-21479

Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval 

Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval 

Cybersecurity researchers have disclosed a high-severity security flaw in the artificial intelligence (AI)-powered code editor Cursor that could result in remote code execution.
The vulnerability, tracked as CVE-2025-54136 (CVSS score: 7.2), has been codenamed MCPoison by Check Point Research, owing to the fact that it exploits a quirk in the way the software handles modifications to Model

Misconfigurations Are Not Vulnerabilities: The Costly Confusion Behind Security Risks 

Misconfigurations Are Not Vulnerabilities: The Costly Confusion Behind Security Risks 

In SaaS security conversations, “misconfiguration” and “vulnerability” are often used interchangeably. But they’re not the same thing. And misunderstanding that distinction can quietly create real exposure.
This confusion isn’t just semantics. It reflects a deeper misunderstanding of the shared responsibility model, particularly in SaaS environments where the line between vendor and customer

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents 

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents 

Why do SOC teams still drown in alerts even after spending big on security tools? False positives pile up, stealthy threats slip through, and critical incidents get buried in the noise. Top CISOs have realized the solution isn’t adding more and more tools to SOC workflows but giving analysts the speed and visibility they need to catch real attacks before they cause damage. 
Here’s how

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign 

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign 

Cybersecurity researchers have lifted the veil on a widespread malicious campaign that’s targeting TikTok Shop users globally with an aim to steal credentials and distribute trojanized apps.
“Threat actors are exploiting the official in-app e-commerce platform through a dual attack strategy that combines phishing and malware to target users,” CTM360 said. “The core tactic involves a deceptive

SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported 

SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported 

SonicWall said it’s actively investigating reports to determine if there is a new zero-day vulnerability following reports of a spike in Akira ransomware actors in late July 2025.
“Over the past 72 hours, there has been a notable increase in both internally and externally reported cyber incidents involving Gen 7 SonicWall firewalls where SSLVPN is enabled,” the network security vendor said in a

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers 

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers 

A newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models at scale, could be exploited to take over susceptible servers.
“When chained together, these flaws can potentially allow a remote, unauthenticated attacker to gain complete control of the server, achieving remote code execution

Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally 

Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally 

Cybersecurity researchers are calling attention to a new wave of campaigns distributing a Python-based information stealer called PXA Stealer.
The malicious activity has been assessed to be the work of Vietnamese-speaking cybercriminals who monetize the stolen data through a subscription-based underground ecosystem that automates the resale and reuse via Telegram APIs, according to a joint

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X