Cybersecurity

The AI Fix #49: The typo from hell 

The AI Fix #49: The typo from hell 

In episode 49 of The AI Fix, OpenAI kills off a sycophantic bot, our hosts are introduced to a prophetic Bosnian rock band, Meta puts an electric fence around its llamas, Mark reveals he’s never tried covering a robot with olive oil, and Graham leaves a stern message for his great-great-grandchildren.

Mark sits a “smarty-pants” test, an AI becomes a crime boss, and Graham explains how a decades-old typo is poisoning the scientific well.

All this and much more is discussed in the latest edition of “The AI Fix” podcast by Graham Cluley and Mark Stockley.

New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims 

New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims 

Cybersecurity researchers have lifted the lid on two threat actors that orchestrate investment scams through spoofed celebrity endorsements and conceal their activity through traffic distribution systems (TDSes).
The activity clusters have been codenamed Reckless Rabbit and Ruthless Rabbit by DNS threat intelligence firm Infoblox.
The attacks have been observed to lure victims with bogus

Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches 

Third Parties and Machine Credentials: The Silent Drivers Behind 2025’s Worst Breaches 

It wasn’t ransomware headlines or zero-day exploits that stood out most in this year’s Verizon 2025 Data Breach Investigations Report (DBIR) — it was what fueled them. Quietly, yet consistently, two underlying factors played a role in some of the worst breaches: third-party exposure and machine credential abuse.
According to the 2025 DBIR, third-party involvement in breaches doubled

Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks 

Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks 

Microsoft has warned that using pre-made templates, such as out-of-the-box Helm charts, during Kubernetes deployments could open the door to misconfigurations and leak valuable data.
“While these ‘plug-and-play’ options greatly simplify the setup process, they often prioritize ease of use over security,” Michael Katchinskiy and Yossi Weizman from the Microsoft Defender for Cloud Research team

Entra ID Data Protection: Essential or Overkill? 

Entra ID Data Protection: Essential or Overkill? 

Microsoft Entra ID (formerly Azure Active Directory) is the backbone of modern identity management, enabling secure access to the applications, data, and services your business relies on. As hybrid work and cloud adoption accelerate, Entra ID plays an even more central role — managing authentication, enforcing policy, and connecting users across distributed environments.
That prominence also

Google Fixes Actively Exploited Android System Flaw in May 2025 Security Update 

Google Fixes Actively Exploited Android System Flaw in May 2025 Security Update 

Google has released its monthly security updates for Android with fixes for 46 security flaws, including one vulnerability that it said has been exploited in the wild.
The vulnerability in question is CVE-2025-27363 (CVSS score: 8.1), a high-severity flaw in the System component that could lead to local code execution without requiring any additional execution privileges.
“The most severe of

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence 

Critical Langflow Flaw Added to CISA KEV List Amid Ongoing Exploitation Evidence 

A recently disclosed critical security flaw impacting the open-source Langflow platform has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), citing evidence of active exploitation.
The vulnerability, tracked as CVE-2025-3248, carries a CVSS score of 9.8 out of a maximum of 10.0.
“Langflow contains a missing

Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi 

Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi 

Cybersecurity researchers have disclosed a series of now-patched security vulnerabilities in Apple’s AirPlay protocol that, if successfully exploited, could enable an attacker to take over susceptible devices supporting the proprietary wireless technology.
The shortcomings have been collectively codenamed AirBorne by Israeli cybersecurity company Oligo.
“These vulnerabilities can be chained by

Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed 

Commvault CVE-2025-34028 Added to CISA KEV After Active Exploitation Confirmed 

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a maximum-severity security flaw impacting Commvault Command Center to its Known Exploited Vulnerabilities (KEV) catalog, a little over a week after it was publicly disclosed.
The vulnerability in question is CVE-2025-34028 (CVSS score: 10.0), a path traversal bug that affects 11.38 Innovation Release, from versions

⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors 

⚡ Weekly Recap: Nation-State Hacks, Spyware Alerts, Deepfake Malware, Supply Chain Backdoors 

What if attackers aren’t breaking in—they’re already inside, watching, and adapting?
This week showed a sharp rise in stealth tactics built for long-term access and silent control. AI is being used to shape opinions. Malware is hiding inside software we trust. And old threats are returning under new names. The real danger isn’t just the breach—it’s not knowing who’s still lurking in your

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X