Cybersecurity

Smashing Security podcast #437: Salesforce’s trusted domain of doom 

Smashing Security podcast #437: Salesforce’s trusted domain of doom 

Researchers uncovered a security flaw in Salesforce’s shiny new Agentforce. The vulnerability, dubbed “ForcedLeak”, let them smuggle AI-read instructions in via humble Web-to-Lead form… and ended up spilling data for the low, low price of five dollars.

And we discuss why data breach communicationss still default to “we take security seriously” while quietly implying “assume no breach” – until the inevitable walk-back.

Plus, we take a look at ITV’s phone-hacking drama with David Tennant, and take a crack at decoding the history of the Rosetta Stone.

Hear all this and more in episode 437 of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley, joined this week by special guest Paul Ducklin.

Your favourite phone apps might be leaking your company’s secrets 

Your favourite phone apps might be leaking your company’s secrets 

Most of the apps on your phone is talking to a server somewhere – sending and receiving data through messages sent through APIs, the underlying infrastructure that allows apps to communicate.

And here’s the problem – hackers have determined that the APIs of mobile apps, when left visible and exploitable, can be a goldmine.

Read more in my article on the Fortra blog.

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer 

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer 

In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data.
SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps 

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps 

A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances.
The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of

How Leading Security Teams Blend AI + Human Workflows (Free Webinar) 

How Leading Security Teams Blend AI + Human Workflows (Free Webinar) 

AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow Clarity: Where AI Fits in Modern Automation,” with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed how organizations think about automation.

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover 

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover 

A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions.
OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. It also facilitates data

2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising 

2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising 

Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface.
The annual research combines insights from over 1,200 IT and security professionals across six countries, along with an

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users 

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users 

Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022.
French cybersecurity company SEKOIA said the attackers are exploiting the cellular router’s API to send malicious SMS messages containing phishing URLs, with the campaigns primarily targeting Sweden, Italy,

New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones 

New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones 

A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy.
Italian fraud prevention firm Cleafy, which discovered the sophisticated malware and remote access trojan (RAT) in late August 2025, said it leverages Hidden Virtual Network Computing (VNC) for remote control of infected devices and

Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs 

Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs 

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a backdoor called CABINETRAT.
The activity, observed in September 2025, has been attributed to a threat cluster it tracks as UAC-0245. The agency said it spotted the attack following the discovery of software tools taking the form of XLL files, which refer to Microsoft Excel

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X