Insights
The Real Cyber Risks

The news tends to blame hackers for cyber breaches. But research shows there is another cause for over 80% of breaches. This Insight looks at that cause, how it occurs, and suggests ways to be safer. 

 

Hacking not the real cause of breaches


New malware justifies Appleā€™s locked-down security strategy

Apple aims to keep tight control over its environment. This has led to lawsuits to force acceptance of app stores other than Apple’s. In this case browser extension apps in the other stores were corrupted. Anyone downloading apps from the non-Apple store got malware in the app that could steal your data.  

 

Apple's tight security vindicated

 


Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

Ransomware attackers are exploiting Amazon Web Services own encryption to encrypt user data. If the demanded ransom is not paid within 7 days, the data is deleted by the attackers.  

 

AWS encryption exploited by ransomware attackers


Woe Daddy: FTC raps hosting giant GoDaddy for security lapses

Go Daddy, a popular web hosting platform, has been warned by the FTC to improve their cyber security or face stiff fines. 

 

Go Daddy lax on security


4.2 million internet hosts hijacked via bugs in tunneling protocols

Tools used to keep us safer don’t always do the job. In this case attackers exploited a vulnerability in VPNs and more. 

 

Tunneling protocols exploited


How Safe Are Passkeys?

Are they really safer than passwords as much publicity says? This Insight looks at how they work and their pros and cons. Spoiler alert, they are safer than passwords alone.  

 

Passkeys - pros and cons


New Banshee Stealer Variant Bypasses Antivirus with Apple's XProtect-Inspired Encryption

Using Apple’s Xprotect encryption techniques allows this infostealer to avoid detection. Hackers are getting better. Stay up to date to be safe.

 

Attackers exploit Apple encryption technique


Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure

Serious Ivanti flaw, rated at CVSS 9.0, is being exploited. Be sure to patch now and have the most current version. 

 

Serious Ivanti flaw being exploited


Unconventional Cyberattacks Aim to Take Over PayPal Accounts

In a new attack, Microsoft 365 is being used to send payment requests. If the user then logs into their PayPal account the attacker steals the credentials and takes over the account. Be sure before logging in.  

New attack steals PayPal details


PhishWP Plug-in Hijacks WordPress E-Commerce Checkouts

WordPress is a popular platform for website publishing and now e-commerce. This fake app impersonates payment service sites like Stripe to steal the payment processing information from people using real sites. . 

 

WordPress plugin steals details