Cybersecurity

You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them 

You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them 

Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the data that powers them
The junk food problem in cybersecurity
Imagine a triathlete who spares no expense on equipment—carbon fiber bikes, hydrodynamic wetsuits, precision GPS watches—but fuels their

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks 

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks 

The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server is using a bespoke command-and-control (C2) framework called AK47 C2 (also spelled ak47c2) in its operations.
The framework includes at least two different types of clients, HTTP-based and Domain Name System (DNS)-based, which have been dubbed AK47HTTP and AK47DNS, respectively, by

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies 

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies 

The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by means of an adversary-in-the-middle (AitM) attack at the Internet Service Provider (ISP) level and delivering a custom malware dubbed ApolloShadow.
“ApolloShadow has the capability to install a trusted root certificate to

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials 

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials 

Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link wrapping services from Proofpoint and Intermedia to bypass defenses.
“Link wrapping is designed by vendors like Proofpoint to protect users by routing all clicked URLs through a scanning service, allowing them to block known malicious destinations at the moment of click,”

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto 

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto 

The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram.
“Under the guise of freelance opportunities for software development work, UNC4899 leveraged social engineering techniques to successfully convince the targeted employees to execute malicious Docker containers in their

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals 

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals 

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, but staying ahead of an ever-evolving threat landscape.

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud 

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud 

The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack.
The cyber-physical attack involved the adversary leveraging their physical access to install the Raspberry Pi device and have it connected directly to the same network switch as the ATM, effectively placing

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs 

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs 

Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle with alert noise, fragmented tools, and incomplete data visibility. At the same time, more vendors are phasing out their on-premises SIEM solutions, encouraging migration to SaaS

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install 

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install 

Threat actors are actively exploiting a critical security flaw in “Alone – Charity Multipurpose Non-profit WordPress Theme” to take over susceptible sites.
The vulnerability, tracked as CVE-2025-5394, carries a CVSS score of 9.8. Security researcher Thái An has been credited with discovering and reporting the bug.
According to Wordfence, the shortcoming relates to an arbitrary file upload

Smashing Security podcast #428: Red flags, leaked chats, and a final farewell 

Smashing Security podcast #428: Red flags, leaked chats, and a final farewell 

The viral women-only dating safety app Tea, built to flag red flags, gets flagged itself – after leaking over 70,000 private images and chat logs. We are talking full-on selfies, ID docs, private DMs, and a dash of 4chan creepiness. Yikes.

Plus, Carole takes us down memory lane as she hangs up her co-host mic after 428 glorious episodes. Expect tea, tears, and Tom Lehrer.

All this and more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault.

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X