
Hello all,
What a difference one week can make! Top of mind for many is the Iran conflict and the implications as it relates to cyber warfare. In a surprising first, Chairman of the Joint Chiefs of Staff, General Dan Caine, openly talked about cyber operations as part of operation Epic Fury. Allied governments worldwide are on high alert for retaliatory cyber-attacks from Iran and their sleepers embedded outside of the conflict zone. An early physical casualty was Amazon AWS in the United Arab Emirates and Bahrain when it suffered damage on March 1st from an Iranian drone strike. Two of the three availability zones are still down. AWS has advised clients to invoke their Disaster Recovery Plans. I wonder if their cyber insurance will cover this since it is technically an “Act of War”? What’s very interesting is that we’re in the second week of this conflict, and there has been no significant cyber retaliation from Iranian threat actors so far. Hopefully this trend continues.
Headline NEWS:
- Cisco has multiple vulnerabilities that it disclosed this week in several products. Two of the newly revealed defects are rated critical. And the one from last week in their SD-WAN has had Proof of Concept (PoC) code released on GitHub by zerozenxlabs and is now under active exploitation. Please follow the vendor’s recommendation and update to the latest patched versions.
- FBI and other three- and four-letter agencies, along with multiple individual state governments and US cities, are all warning of potential cyber attacks as a result of Operation Epic Fury against Iran. Vigilance is urged – more so than normal – to ensure that your digital charges are safe. Attacks against critical infrastructure, banking, and government systems are anticipated. If you see something amiss, say something.
- Juniper managed to slip in a nice defect which almost got missed due to the quantity of other news. But it didn’t get missed. Junos OS Evolved platform has a Remote Code Execution defect. Thankfully, this serious vulnerability only affects Juniper’s PTX Series of devices because it is bad. It “allows an unauthenticated, network-based attacker to execute code as root”. The fix is to update to the latest version of Junos OS. If you have a PTX Series in use, check yours immediately!
In Ransomware, Malware, and Vulnerabilities News:
- Data Breaches are the new headlines as it relates to ransomware. A year ago, the news headlines were predominantly about who was encrypted and which dirtbag group was responsible. In the last six months or so, the headlines have shifted to who is the latest to reveal that private data was stolen and likely sold to the highest bidder. This has been somewhat fueled by the rash of successful click-fix attacks, fake meeting tools, fake support offerings, connection requests, and malicious plugins, that enable a threat actor to gain initial access and then pivot to more sensitive systems and escalate privileges. By using legitimate software that’s often already on the systems and methods that resemble normal system activity, the intruder stays out of the crosshairs of the threat monitoring tools while exfiltrating valuable sensitive data. It is imperative that security professionals do not let down their guard and continue to push for iterative hardening of their networks, devices, and identification processes. We must never give up the fight to stay at least one step ahead.
In Other News Events of Note and Interest:
- AI News was hot and heavy this week with quite a few product announcements, such as Anthropic’s Claude Code Security and ChatGPT-5.3 in Copilot, Cloudflare announcing a new AI firewall to protect LLM’s, Huawei making their AI Datacenters available worldwide, and Copilot now being able to store passwords. In rather bizarre headlines, Google is facing a wrongful death lawsuit that alleges Google’s Gemini chatbot instructed a Florida man (why is it always a Florida man?) to commit suicide after he failed to get a robot body for his Gemini AI “wife” whom he named Xia. And there’s a really good article in our AI section positing that we have maybe 12 more months left to get AI safety worked out before it is too late, and it won’t be possible afterward.
Musings
Many businesses now have a new very real threat that they’d never been forced to consider before, the prospect that their insurance policies may reject what would otherwise have been a valid claim. The Iran hostilities, Operation Epic Fury, are technically not a war since none of the nations involved have formally declared war. However, for the purposes of insurance that distinction is irrelevant. The typical “Acts of War” exclusion is for “warlike action by a military force”. That means that the clause applies whether there is a formal declaration or not. Chairman of the Joint Chiefs of Staff, General Dan Caine, openly talked about cyber operations as part of operation Epic Fury, clearly putting them square into the Acts of War definition. So where does that leave you and your ability to lean on your insurance policy if an Iranian supported attack takes down your business’ ability to function? Would you be covered? Now is the time to find out, not when you’re reaching out to your insurance agent to declare an incident.

Keep the shields up!
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
- Cisco warns of max severity Secure FMC flaws giving root access
- Cisco flags more SD-WAN flaws as actively exploited in attacks
- PoC Exploit Released Cisco SD-WAN 0-Day Vulnerability Exploited in the Wild
- FBI Counterterrorism on high alert even in Tampa
- Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)
- NYPD on alert for potential retaliation cyber-attacks after strikes on Iran
- SD heightening security monitoring and cyber vigilance due to conflict in Iran
- US banks on high alert for cyberattacks as Iran war escalates
Ransomware, Malware, and Vulnerabilities News
- Good News, Government News, and Interesting
- Top general spotlights cyber role in Iran conflict
- Amazon says drones damaged three facilities in UAE and Bahrain
- Iran threat puts pressure on already crippled U.S. cyber agency
- Iran intelligence backdoored US bank, airport networks
- CISA flags VMware Aria Operations RCE flaw as exploited in attacks
- Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
- CISA warns feds to patch iOS flaws exploited in crypto-theft attacks
- UK government’s Vulnerability Monitoring System is working
- FBI seizes LeakBase cybercrime forum, data of 142,000 members
- LeakBase Cybercrime Forum Shut Down, Suspects Arrested
- Spain arrests suspected hacktivists for DDoSing govt sites
- Taiwan indicts 62 linked to alleged scam center in Cambodia
- Defending the gates: How a global coalition disrupted Tycoon 2FA, a major driver of initial access and large-scale online impersonation
- Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
- Hacktivists claim to have hacked Homeland Security to release ICE contract data
- Vulnerabilities and Exploits
- New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel
- Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers
- Firefox finds a slew of new bugs with Claude’s help
- How Deepfakes and Injection Attacks Are Breaking Identity Verification
- Hackers Weaponize Claude Code in Mexican Government Cyberattack
- Microsoft OAuth scams abuse redirects for malware delivery
- Android gets patches for Qualcomm zero-day exploited in attacks
- Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
- LLMs can unmask pseudonymous users at scale with surprising accuracy
- APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
- Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
- WordPress membership plugin bug exploited to create admin accounts
- Car Tire Sensors Can Be Used to Track Drivers Without Their Knowledge
- Cloudflare tracked 230 billion daily threats and here is what it found
- Palo Alto Networks monitors identity risks in 90% of breaches
- Google says 90 zero-days were exploited in attacks last year
- Phishing, Malware, and similar
- NanoClaw Creator Loses SEO Battle To Impostor Website
- Bing AI promoted fake OpenClaw GitHub repo pushing info-stealing malware
- GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack
- From reactive to proactive: closing the phishing gap with LLMs
- Fake LastPass support email threads try to steal vault passwords
- Programmatic Ads Overtake Email As Top Malware Vector
- Wikipedia hit by self-propagating JavaScript worm that vandalized pages
- Marylanders hit with fake court toll texts, complete with QR codes and AI summons
- North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT
- Fake Google Security site uses PWA app to steal credentials, MFA codes
- I Almost Got Hacked on a Microsoft Teams Call — Here’s How the Scam Works
- Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
- Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
- Hackers Attacking SonicWall Firewalls from 4,000+ unique IP Addresses to Exploit Vulnerabilities
- UH Cancer Center data breach affects nearly 1.2 million people
- Paint maker giant AkzoNobel confirms cyberattack on US site
- Fake VCs target crypto talent in a new ClickFix campaign
- Malware attacks weaponizing Windows File Explorer, WebDAV underway
- Fake Zoom, Teams Invites Drop Malware Using Compromised Certificates
- Employees thought they were fixing a browser error until fake IT support quietly walked them through infecting their own company computers
- Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
- Microsoft: Fake Xeno and Roblox Utilities Used to Install Windows RAT
- Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
- Breaches, Leaks, and Ransomware
- FBI investigating hack on its wiretap and surveillance systems
- The DJI Romo robovac had security so poor, this man remotely accessed thousands of them
- Canadian Tire 2025 data breach impacts 38 million users
- ManoMano data breach affects 38 million customers via third-party provider
- Nearly 1M fintech lender Figure accounts exposed
- Brit games studio Cloud Imperium admits to data breach
- 2 Million Affected by University of Hawaii Cancer Center Data Breach
- Hacker mass-mails HungerRush extortion emails to restaurant patrons
- Star Citizen game dev discloses breach affecting user data
- LexisNexis confirms data breach as hackers leak stolen files
- New LexisNexis Data Breach Confirmed After Hackers Leak Files
- Data Breach Exposes 25 Million Americans in What Texas Calls the Largest US Hack in History
- Madison Square Garden Data Breach Confirmed Months After Hacker Attack
- Mississippi medical center reopens clinics hit by ransomware attack
Other News Events of Note and Interest
- Cool Tool: Pale Moon 34.1.0 – a different web browser
- Cool Tool: Sysinternals Suite 2026.05.03
- Memory scalpers hunt scarce DRAM with bot blitz
- Washington state moves to ban forced employee microchips
- Google is rolling out quantum-resistant HTTPS certificates in Chrome to future-proof the web
- Amid new competition, Chrome speeds up its release schedule
- Downdetector, Speedtest sold to IT service provider Accenture in $1.2B deal
- Europe, China, achieve gigabit links to geostationary sats
- Apple intros M5 Pro and Max MacBook Pros and its first new monitors in years
- A new app alerts you if someone nearby is wearing smart glasses
- WhatsApp will soon join the premium subscription club
- Office EU touts new European online productivity suite
- NVIDIA GeForce 595.71 WHQL Driver Available for Download
- US state laws push age checks into the operating system
- China vows to accelerate technological self-reliance, AI push
- AI, LLM’s, and Skynet
- Google faces lawsuit after Gemini chatbot allegedly instructed man to kill himself
- AI Use at Work Is Causing “Brain Fry,” Researchers Find, Especially Among High Performers
- Ultimate prompting guide for Nano Banana
- Cloudflare announces Firewall for AI
- AI Safety Has 12 Months Left
- THE 2028 GLOBAL INTELLIGENCE CRISIS
- Task-Completion Time Horizons of Frontier AI Models
- Your users aren’t human anymore; start building for agents today
- Quantum Decryption of RSA Is Much Closer Than Expected
- New IT roles emerge to tackle AI evaluation
- Huawei brings its flatpack AI datacenters to the world
- ‘No ethics at all’: the ‘cancel ChatGPT’ trend is growing after OpenAI signs a deal with the US military
- The Wisdom Curve – What Designers Can Learn from the Pioneers of “Long Design”
- Available today: GPT-5.3 Instant in Microsoft 365 Copilot
- Anthropic won’t kill cyber, but it may kill some companies
- Anthropic Just Released Claude Code Security, and the Internet Declared Bug Hunting Dead
- Anthropic Says It Will Fight New Pentagon Move as CEO Apologizes for Leaked Memo
- Copilot can now open web pages and store your passwords inside its Windows app
- Microsoft
- Microsoft gets tired of “Microslop,” bans the word on its Discord, then locks the server after backlash
- Microsoft is making it easier for IT admins to onboard devices to Defender
- Microsoft confirms clean install still mandatory for a Windows 11 performance boost feature
- Outlook’s New Copilot Feature Eliminates Meeting Conflicts
- Users fume over Outlook.com email ‘carnage’
- Microsoft postpones new Outlook migration to 2027
- Windows Autopatch update readiness brings insights to IT
- PowerToys keeps adding features that should have shipped with Windows 11
- Windows 11 25H2, 24H2 allegedly still ‘deleting internet’ and with only one way to fix it
- KB5075039: Microsoft broke key OS feature when it ended Windows 10 support
- SharePoint at 25: Global enterprise knowledge in the AI era
- Microsoft is fundamentally redesigning NVMe drivers for Windows; initial tests show significant performance shifts
- Microsoft 365 Backup to add file-level restore for faster recovery
- Microsoft adds powerful image editor to PowerPoint
