Cybersecurity

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns 

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns 

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors.
“A significant portion of email threats with PDF payloads persuade victims to call adversary-controlled phone numbers, displaying another popular social engineering technique known as Telephone-Oriented Attack Delivery (TOAD

U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware 

U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware 

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group to assist threat actors in their malicious activities and targeting victims in the country and across the world.
The sanctions also extend to its subsidiaries Aeza International Ltd., the U.K. branch of Aeza Group, as well

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale 

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale 

Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate counterparts.
“This observation signals a new evolution in the weaponization of Generative AI by threat actors who have demonstrated an ability to generate a functional phishing site from simple text prompts,” Okta

Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits 

Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits 

Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic’s Model Context Protocol (MCP) Inspector project that could result in remote code execution (RCE) and allow an attacker to gain complete access to the hosts.
The vulnerability, tracked as CVE-2025-49596, carries a CVSS score of 9.4 out of a maximum of 10.0.
“This is one

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns 

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns 

Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader.
Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the

The AI Fix #57: AI is the best hacker in the USA, and self-learning AI 

The AI Fix #57: AI is the best hacker in the USA, and self-learning AI 

In episode 57 of The AI Fix, our hosts discover an AI “dream recorder”, Mark Zuckerberg tantalises OpenAI staff with $100 million signing bonuses, Graham finds out why robot butlers sit in chairs, Wikipedia holds the line against AI slop, an AI cat collar can tell you if your cat is annoyed by its AI cat collar, and some German scientists accidentally create a new AI Fix slogan.

Graham reveals that an AI is now the most successful bug bounty hunter in the USA, and Mark discovers an AI that can retrain itself.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status 

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status 

A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute malicious code on developer machines.
“We discovered that flawed verification checks in Visual Studio Code allow publishers to add functionality

A New Maturity Model for Browser Security: Closing the Last-Mile Risk 

A New Maturity Model for Browser Security: Closing the Last-Mile Risk 

Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser.
It’s where 85% of modern work now happens. It’s also where copy/paste actions, unsanctioned GenAI usage, rogue extensions, and personal devices create a risk surface that most security stacks weren’t designed to handle. For security leaders who know

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation 

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation 

Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild.
The zero-day vulnerability, tracked as CVE-2025-6554 (CVSS score: N/A), has been described as a type confusing flaw in the V8 JavaScript and WebAssembly engine.
“Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X