Cybersecurity

BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products 

BeyondTrust Issues Urgent Patch for Critical Vulnerability in PRA and RS Products 

BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and Remote Support (RS) products that could potentially lead to the execution of arbitrary commands.
Privileged Remote Access controls, manages, and audits privileged accounts and credentials, offering zero trust access to on-premises and cloud resources by internal, external, and third-party users.

INTERPOL Pushes for “Romance Baiting” to Replace “Pig Butchering” in Scam Discourse 

INTERPOL Pushes for “Romance Baiting” to Replace “Pig Butchering” in Scam Discourse 

INTERPOL is calling for a linguistic shift that aims to put to an end to the term “pig butchering,” instead advocating for the use of “romance baiting” to refer to online scams where victims are duped into investing in bogus cryptocurrency schemes under the pretext of a romantic relationship.
“The term ‘pig butchering’ dehumanizes and shames victims of such frauds, deterring people from coming

Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts 

Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts 

Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been fined €251 million (around $263 million) for a 2018 data breach that impacted millions of users in the bloc, in what’s the latest financial hit the company has taken for flouting stringent privacy laws.
The Irish Data Protection Commission (DPC) said the data breach impacted approximately 29 million

Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected 

Patch Alert: Critical Apache Struts Flaw Found, Exploitation Attempts Detected 

Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave the way for remote code execution.
The issue, tracked as CVE-2024-53677, carries a CVSS score of 9.5 out of 10.0, indicating critical severity. The vulnerability shares similarities with another critical bug the project maintainers addressed in December 2023 (CVE-2023-50164, CVSS

The AI Fix #29: AI on OnlyFans, and the bot that wants to be a billionaire 

The AI Fix #29: AI on OnlyFans, and the bot that wants to be a billionaire 

In episode 29 of The AI Fix, an AI company makes the bold step of urging us to “stop hiring humans”, Graham is wrong about GB AI, parents prepare their kids for the imminent Moxie-mageddon, Google releases Gemini 2.0, and a robot is found dead at work and nobody knows why.

Graham inspects the AI Miss World competition for research purposes and wonders if our hosts should start an OnlyFans, and Mark meets an “evolving” AI that wants to be a billionaire.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware 

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware 

A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware called DarkGate.
“An attacker used social engineering via a Microsoft Teams call to impersonate a user’s client and gain remote access to their system,” Trend Micro researchers Catherine Loveria, Jovit Samaniego, and Gabriel Nicoleta said.
“The attacker failed to install a

Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks 

Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks 

A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as part of attacks targeting Pakistan.
Cybersecurity company Securonix, which is tracking the activity under the name FLUX#CONSOLE, said it likely starts with a phishing email link or attachment, although it said it couldn’t obtain the original email used to launch the attack.
“One of the

Even Great Companies Get Breached — Find Out Why and How to Stop It 

Even Great Companies Get Breached — Find Out Why and How to Stop It 

Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses. But breaches still happen.
So, what’s going wrong? The truth is, that attackers are constantly finding new ways to slip through cracks that often go unnoticed—even in well-prepared organizations. The good

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware 

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware 

A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT.
“The attack chain used alternate data streams in a RAR archive to deliver a shortcut (LNK) file that created a scheduled task on the target machine to pull down further payloads,” Proofpoint

5 Practical Techniques for Effective Cyber Threat Hunting 

5 Practical Techniques for Effective Cyber Threat Hunting 

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and proactive threat hunting. The problem here is that it is easy to get stuck in endless arrays of data and end up with no relevant intel. 
To avoid this, use these five battle-tested techniques that are

CALL US TODAY TO SPEAK TO A SECURITY EXPERT: 720.221.6804

X