
Hello all,
Most of last week was quiet with a steady rumble of Microsoft sourced phishing emails growing in popularity, and then toward the latter part of the week Arctic Wolf and Huntress warned about a concerning increase in successful attacks against SonicWall firewalls. More on that in a moment. Meanwhile, this coming week starts “Hacker Summer Camp” in Las Vegas. Tens of thousands of security professionals, malicious actors, threat hunters, criminals, wanna-be hackers, and the just plain curious, will descend on the trifecta of Blackhat, BSidesLV, and DefCon. The good news is that thousands of malicious actors will be occupied and not attacking our networks this coming week. The bad news is that thousands of defenders will be occupied and will not be defending our networks this coming week either. It’ll be an interesting time for sure.
Headline NEWS:
- Insurance won’t cover $5M in City of Hamilton claims for cyberattack. This article should hopefully serve as a very poignant reminder that if you tell an insurance company that your company is doing a required action, it better be in place and documented. Hamilton was to have implemented Multifactor Authentication (MFA/2FA) for their systems but instead procrastinated. Threat actors, taking advantage of the situation, ransomwared them. Since the city wasn’t doing what they said they would, their insurance company denied their claim. That means that the citizens of Hamilton are on the hook for the $18.4 million dollars, and growing, recovery cost. Ouch.
- Ransomware group FunkSec has released a decryptor free to the public. If you have files encrypted by the group, you’re welcome? I guess.
- SonicWall firewall devices have been hit in a recent rash of Akira ransomware attacks. It is unknown how the threat actors are gaining access currently. Both Arctic Wolf and Huntress are concerned that there may be a zero-day vulnerability within the SSL-VPN since that has been under the threat actor microscope lately. SonicWall has said that they are investigating but have no additional information at this time. Arctic Wolf and Huntress are recommending that the SSL-VPN portion of the firewalls be restricted or turned off if possible until root-cause is identified. If not possible, ensure that Botnet Protection is on, MFA is enabled, and unused accounts are removed. And if there is any suspicion of leakage, immediately reset user passwords.
- Critical Salesforce Tableau defects allow bad guys to achieve Remote Code Execution (RCE). The vulnerabilities are in multiple modules, and via multiple vectors, so updating to the latest version is the only mitigating action. Update quickly.
In Ransomware, Malware, and Vulnerabilities News:
- Microsoft Exchange Online aka Microsoft 365 email has seen a dramatic rise in Direct-Send spam, phishing, and malware email messages which bypass third-party email gateways and filtering. This novel technique does a very nice job of making it appear as though emails come from within your organization, or that of a trusted partner. Proofpoint has noted this recent rise and has published guidance for detection and has pointed organizations toward setting a newly created Microsoft function named “reject direct send”, which is designed to combat this scourge.
- Ransomware Gang uses Chatbot to Negotiate is a somewhat scary headline. Having been privy to the goings-on with numerous ransomware negotiations, this seems like it will make the process significantly more difficult for the good guys, especially if the chatbot is backed by a decent, evil AI engine. Theoretically, it could have scoured all exfiltrated information, publicly available data, and knows exactly what a company can afford, where the skeletons are hiding, and where to apply pressure in just the right ways to extract the maximum ransom payment. And it is unfeeling, has no compassion, and not even a hint of human ethics to cause it to take pity on a company or individual. Yeah, this is scary, and I don’t like where it is heading.
In Other News Events of Note and Interest:
- Peacocks Have Lasers in their Tails. How can you not love a headline like that?! Forget the fictional Sharks with Lasers, this is real! LASER is an acronym for Light Amplification by Stimulated Emission of Radiation. Researchers at Florida Polytechnic University and Youngstown State University had heard that Peacock feathers had unusual light refracting properties. So, they investigated and found that the eyespots on the fowl’s tails have the ability to align light waves amplifying them, producing the effect of a yellow-green laser. Cool!
Musings:
This next week I’ll have the privilege of reporting from both Blackhat and DefCon. It will be a fascinating foray into the minds and actions of some of the tech world’s brightest and most creative individuals. Expect that there will be incoming reveals of vulnerabilities, hacks, and terrifyingly close calls that were averted by the vigilance of some random defender who was just doing his job and got curious.

In the meanwhile, Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Insurance won’t cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security
- Ontario city facing full $18.3M cyberattack bill after insurer denies claim
- FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
- SonicWall firewall devices hit in surge of Akira ransomware attacks
- Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely
Ransomware, Malware, and Vulnerabilities News
- CISA flags PaperCut RCE bug as exploited in attacks, patch now
- CISA open-sources Thorium platform for malware, forensic analysis
- FBI: Watch out for these Scattered Spider signs
- FBI opens first office in New Zealand ‘to counter China and cybercrime’
- DOJ Seeks Forfeiture of Bitcoin Tied to ‘Chaos’ Ransomware Group
- Authorities seize BlackSuit ransomware gang’s servers
- Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide
- Google Project Zero to publicly announce bugs within a week of reporting them
- Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome
- Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution
- Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits
- Creating realistic deepfakes is getting easier than ever. Fighting back may take even more AI
- macOS Spotlight Vulnerability Discovered by Microsoft
- New Choicejacking Attack Steals Data from Phones via Public Chargers
- Renting Android Malware With 2FA Interception, AV Bypass is Getting Cheaper Now
- Google Workspace is rolling out a security update to stop token stealing attacks
- Defending against account takeovers from today’s top threats with passkeys and DBSC
- 32% of exploited vulnerabilities are now zero-days or 1-days
- Research shows data breach costs have reached an all-time high
- Exploit available for critical Cisco ISE bug exploited in attacks
- Critical SonicWall SSL VPN Vulnerability Let Attackers Trigger DoS Attack
- Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment
- New Lenovo UEFI firmware updates fix Secure Boot bypass flaws
- New ‘Shade BIOS’ Technique Beats Every Kind of Security
- Wiz finds major security flaw in Base44, one month after Wix acquisition
- Critical Vulnerability in AI Vibe Coding platform Base44
- Endgame Gear mouse config tool infected users with malware
- Gemini CLI Vulnerability Allows Hackers to Execute Malicious Commands on Developer Systems
- Dollar Tree denies ransomware claims, says stolen data is from defunct discount chain
- NYC housing lottery applicants’ personal information exposed online in data breach
- Tea app leak worsens with second database exposing user chats
- Second security issue discovered on Tea app
- NASCAR Confirms Personal Information Stolen in Ransomware Attack
- Sophisticated Shuyal Stealer Targets 19 Browsers
- Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
- Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials
- How attackers are still phishing “phishing-resistant” authentication
- Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds
- Fake CAPTCHA led to LUMMA
- PyPI Users Email Phishing Attack
- Attackers abusing Proofpoint & Intermedia link wrapping to deliver phishing payloads
- How the Browser Became the Main Cyber Battleground
- Spy sat agency breached – insists no secrets spilled
- Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
- More than 90 state, local governments targeted using Microsoft SharePoint vulnerability
- Hackers Compromise Intelligence Website Used by CIA and Other Agencies
- Cyberattack hits U.S. Fermi Lab in breach linked to Microsoft SharePoint vulnerability
- Enterprises neglect AI security – and attackers have noticed
- Spikes in malicious activity precede new security flaws in 80% of cases
- Your public ChatGPT queries are getting indexed by Google and other search engines
- After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google
- Hackers Allegedly Breach Nokia’s Internal Network
- Hackers plant 4G Raspberry Pi on bank network in failed ATM heist
- Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
- Hackers Abuse Microsoft 365’s Direct Send Feature to Deliver Internal Phishing Attacks
- Exploiting Direct Send: Attackers Abuse Microsoft 365 to Deliver Internal Phishing Attacks
- Disable Direct Send in Exchange Online to Mitigate Ongoing Phishing Threats
- Lovense sex toy app flaw leaks private user email addresses
- Qantas Was Given A 72-Hour Deadline By Hacker During This Month’s Cyber Attack
- Ransomware gang uses an AI chatbot to negotiate
- ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH
- SafePay ransomware threatens to leak 3.5TB of Ingram Micro data
- Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web
- Aeroflot: Pro-Ukraine hacker group claims cyber-attack
- French submarine-maker targeted by hackers
- Minnesota activates National Guard after St. Paul cyberattack
- Georgia’s SNAP benefits call center hit with cyberattack; cardholders encouraged to change PINs
- Microsoft catches Russian hackers targeting foreign embassies
- UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS
- Chinese hackers have seized control. How did we let this happen?
- Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets
- Silk Typhoon Linked to Powerful Offensive Tools
- Microsoft breach shows Chinese hackers are play the long game
- Scattered Spider is running a VMware ESXi hacking spree
- Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics
- Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
- Chaos Ransomware Rises as BlackSuit Gang Falls
- Qilin Ransomware Uses TPwSav.sys Driver to Bypass EDR Security Measures
- Nimble ‘Gunra’ Ransomware Evolves With Linux Variant
- GLOBAL GROUP Ransomware Claims Breach of Media Giant Albavisión
- The State of Ransomware – Q2 2025 – Check Point Research
- 147,000 customer records affected following data breach at Cycle & Carriage
- ‘I am afraid of what’s next,’ ex-ransomware negotiator says
- Critical Flaws in WordPress Plugin Leave 10,000 Sites Vulnerable
- Hackers actively exploit critical RCE in WordPress Alone theme
- WooCommerce Customer Review Plugin Vulnerability Affects 80,000+ Sites
Other News Events of Note and Interest
- Cool Tool: After 20 Years, I’ve Finally Found a Replacement for WinRAR
- Mind-Blowing Discovery: Peacocks Have Lasers In Their Tails
- Palo Alto Networks to acquire CyberArk in $25 billion deal
- Dropbox drops Dropbox Passwords
- Google loses app store antitrust appeal, must make sweeping changes to Play Store
- US appeals court agrees to pause Google app store reform order for now
- Google rolls out redesign of Android’s QR code scanner
- Google Cloud secures $1bn-plus contract from ServiceNow
- Google says UK government has not demanded an encryption backdoor for its users’ data
- Google Workspace Updates: Introducing enhanced interoperability between Google Chat and Microsoft Teams
- Google backtracks on plans to deactivate shortened goo.gl links
- Japan: Apple must allow 3rd-party app stores, payment systems
- Oracle admits to Windows boot issue in cloud
- Signal Threatens to Leave Australia Over Encryption Backdoor Demands
- Oracle VirtualBox licensing tweak lies in wait for unwary
- Jack Dorsey’s Bluetooth messaging app is now on the App Store
- OpenAI’s ChatGPT Agent casually clicks through “I am not a robot” verification test
- The Story of the World’s First AI-Organized Event
- No more links, no more scrolling—The browser is becoming an AI Agent
- Security pros drowning in threat-intel data
- Internet exchange points are critical, but ignored
- End of the line for legacy Exchange public folder migrations
- Popular tool for bypassing Windows 11 requirements check gets rebrand and new OOBE features
- Windows 11’s new Android integration lets you control PC, transfer files, and more
- Microsoft explains how organizations can use Intune to upgrade from Windows 10 to Windows 11
- A fresh look for the Microsoft authentication background
- Microsoft Edge transforms into an AI browser with new Copilot Mode
- Microsoft has given Copilot a face, and it really wants you to love him
- Microsoft Faces Backlash Over Windows Ads, Privacy Issues, Unwanted AI
- Microsoft will stop supporting Windows 11 22H2 in October
- Microsoft shares Defender update for new Windows 11/10 ISO installs
- Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time
- Windows 11 multi-monitor support is getting an important update
- Microsoft released Windows 11 KB5062839, KB5063689 setup and recovery updates
- Microsoft confirms Windows 11 24H2 stability issues, affecting games, tests performance fixes
- Windows 11 24H2 issue that messed up cursor size is now fixed
- Microsoft quietly fixed Windows 11 24H2 issues caused by past update
- I replaced the old UAC with the new Windows Administrator Protection feature, and it works perfectly
