Cybersecurity

FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation 

FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation 

The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a “multi-month law enforcement operation.”
PlugX, also known as Korplug, is a remote access trojan (RAT) widely used by threat actors associated with the People’s Republic of China (PRC

3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update 

3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update 

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zero-days that have been actively exploited in attacks.
Of the 161 flaws, 11 are rated Critical, and 149 are rated Important in severity. One other flaw, a non-Microsoft CVE related to a Windows Secure Boot bypass (CVE-2024-7344), has not been assigned

Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks 

Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks 

Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution.
Horizon3.ai researcher Naveen Sunkavally, in a technical report detailing the findings, said the “vulnerabilities are trivial to reverse and exploit.”
The list of identified flaws is as follows –

Microsoft: Happy 2025. Here’s 161 Security Updates 

Microsoft: Happy 2025. Here’s 161 Security Updates 

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and related software, including three “zero-day” weaknesses that are already under active attack. Redmond’s inaugural Patch Tuesday of 2025 bundles more fixes than the company has shipped in one go since 2017.

Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation 

Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation 

Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as “root” to bypass the operating system’s System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions.
The vulnerability in question is CVE-2024-44243 (CVSS score: 5.5), a medium-severity bug

Google OAuth Vulnerability Exposes Millions via Failed Startup Domains 

Google OAuth Vulnerability Exposes Millions via Failed Startup Domains 

New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with Google” authentication flow that exploits a quirk in domain ownership to gain access to sensitive data.
“Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees,” Truffle Security co-founder and CEO Dylan Ayrey said

The AI Fix #33: AI’s deliberate deceptions, and Elon’s “unhinged” mode 

The AI Fix #33: AI’s deliberate deceptions, and Elon’s “unhinged” mode 

In episode 33 of The AI Fix, our hosts watch a robot fall over, ChatGPT demonstrates that it can’t draw a watch face but it can fire a gun, a man without a traffic cone gets trapped in his Waymo taxi, Graham discovers what social robots are, and both hosts watch horrified as somebody rips a robot’s face off.

Graham explains why Elon Musk has invented an “unhinged” version of Grok and every Tesla will soon come fitted with a built-in racist uncle, and Mark looks into the disturbing phenomenon of “alignment faking”.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored 

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored 

What do identity risks, data security risks and third-party risks all have in common? They are all made much worse by SaaS sprawl. Every new SaaS account adds a new identity to secure, a new place where sensitive data can end up, and a new source of third party risk. Learn how you can protect this sprawling attack surface in 2025.

What do identity risks, data security risks and third-party

Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions 

Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions 

The Telegram-based online marketplace known as HuiOne Guarantee and its vendors have cumulatively received at least $24 billion in cryptocurrency, dwarfing the now-defunct Hydra to become the largest online illicit marketplace to have ever operated.
The figures, released by blockchain analytics firm Elliptic, show that monthly inflows have increased by 51% since July 2024.
Huione Guarantee, part

Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces 

Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces 

Threat hunters are calling attention to a new campaign that has targeted Fortinet FortiGate firewall devices with management interfaces exposed on the public internet.
“The campaign involved unauthorized administrative logins on management interfaces of firewalls, creation of new accounts, SSL VPN authentication through those accounts, and various other configuration changes,” cybersecurity firm

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X