Cybersecurity

Cybercrime is surging across Africa 

Cybercrime is surging across Africa 

A new INTERPOL report has sounded the alarm over a dramatic increase in cybercrime across Africa, with digital crime now accounting for a significant proportional of all criminal activity across the continent.

Read more in my article on the Hot for Security blog.

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks 

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks 

Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it.
“NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and download files, access network drives, and use

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages 

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages 

Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview operation originating from North Korea.
According to Socket, the ongoing supply chain attack involves 35 malicious packages that were uploaded from 24 npm accounts. These packages have been collectively downloaded over 4,000 times. The complete list of the JavaScript

Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options 

Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options 

Microsoft on Tuesday announced that it’s extending Windows 10 Extended Security Updates (ESU) for an extra year by letting users either pay a small fee of $30 or by sync their PC settings to the cloud.
The development comes ahead of the tech giant’s upcoming October 14, 2025, deadline, when it plans to officially end support and stop providing security updates for devices running Windows 10. The

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public 

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public 

The United States Embassy in India has announced that applicants for F, M, and J nonimmigrant visas should make their social media accounts public.
The new guideline seeks to help officials verify the identity and eligibility of applicants under U.S. law. The U.S. Embassy said every visa application review is a “national security decision.”
“Effective immediately, all individuals applying for an

The AI Fix #56: ChatGPT traps man in a cult of one, and AI is actually stupid 

The AI Fix #56: ChatGPT traps man in a cult of one, and AI is actually stupid 

In episode 56 of The AI Fix, Anthropic and Apple have a bar fight, a woman describes her husband falling in love with ChatGPT as “not ideal”, WhatsApp’s AI helper isn’t helpful, Graham serenades a pack of headless robot dogs with his rendition of “Don’t stop me know”, and our hosts debate whether AI turning our brains to porridge is actually a bad thing.

Graham tells the harrowing story of how chatbots are convincing ordinary people they were chosen, manipulated their minds, and in some cases, pushed them to the edge, and Mark stumps the world’s best AIs with an easy question.

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue 

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue 

Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets.
The methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today.
“We developed two techniques by leveraging the mining topologies and pool policies that enable us to reduce a

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers 

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers 

Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials.
Positive Technologies, in a new analysis published last week, said it identified two different kinds of keylogger code written in JavaScript on the Outlook login page –

Those that save collected data to a local file

Between Buzz and Reality: The CTEM Conversation We All Need 

Between Buzz and Reality: The CTEM Conversation We All Need 

I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn’t have asked for a better kickoff panel: three cybersecurity leaders who don’t just talk security, they live it.
Let me introduce them.
Alex Delay, CISO at IDB Bank, knows what it means to defend a highly regulated environment. Ben Mead, Director of Cybersecurity at Avidity

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X