
Hello all,
The United States of America turned 249 on Friday. Hopefully, all of our US based readers still have all of their digits and have recovered most of their hearing from the celebratory fireworks, both public and private. Speaking of fireworks, this coming week is Patch Tuesday, expect an incoming barrage of explosive defects and vulnerabilities from Microsoft and a cadre of other vendors that adhere to the same release schedule.
This email and video commentary is from the RedDotSecurity.news website that contains a plethora of links to other items, not mentioned here, that are worth skimming to see if they interest you or pertain to your particular environment or of those you support. There is a lot more than what is provided in these opening comments.
Headline NEWS:
- OpenAI is now opening their logs to the New York Times so that they can search through them for potential instances of ChatGPT serving up copyrighted content. I’ve written about it a few times in the past few weeks, that OpenAI was court ordered to log everything, including items that clients were told would not be logged. To me this looks like the start of a never-ending treasure hunt by disgruntled publishers looking to recoup lost sales due to AI’s insatiable appetite and propensity to ingest everything ever digitally stored.
- Google Chrome had another zero-day defect found in the V8 JavaScript engine last week. If you’re keeping track, that’s the fourth one this year. Update your chromium based browsers as soon as the patch is available since this is under active exploitation already.
- Mozilla Firefox has a problem with browser extensions being weaponized to steal crypto currency, wallet secrets, and logins. In fact, a study last year found that 50% of browser extensions exist for the purpose of stealing credentials, track activity, inject malicious code into websites, and grant access to the browser to act as an info stealer.
- Cisco can’t seem to stop releasing products that have hard-coded credentials in them. This time their IP telephony Cisco Unified Communications Manager (CUCM) has one that grants root access via SSH. While not known to be exploited yet, this one is a severe as it gets, so patch quickly.
In Ransomware, Malware, and Vulnerabilities News:
- Ingram Micro experienced Fireworks of a different kind a day early this past week on Thursday as all systems were taken offline as a result a Ransomware attack, tentatively attributed to the group SafePay. Frustratingly, the giant reseller just went dark, with no news or information to clients, other than to be greeted with a website message that said it was down for maintenance. Finally, on Saturday, Ingram broke-radio silence and put a notice out on their website confirming that their systems were taken offline in response to a ransomware attack. Ingram is a major world-wide distributor of tech services and products, with revenue of over $48 billion in 2023. If you used Ingram to license Microsoft 365 products, it would be a wise move to check for and remove Ingram’s GDAP permissions in your Partner Portal, and/or block their delegated access, since we have no way to know what the threat actor managed to access and exfil
- Hunters International ransomware group, in a bit of good news, has shut down and is releasing “free decryption software to all companies that have been impacted” by their evil work. Back in November they revealed that they were planning to shut down soon due to increasing law enforcement activity. I suspect that they encrypted the wrong organization or three-letter agency and have been paying the price ever since. Unfortunately, these scum are not going away, they are merely rebranding and switching to non-encrypting exfiltrating extortion. But even a small win is still a win.
In Other News Events of Note and Interest:
- Massive SD Card Testing Database exposes fakes and charts their performance and endurance. Many years ago, when mere 1GB SD USB sticks were common, I saw a too-good-to-be-true advertisement at my favorite online reseller. It was a Sony branded 512GB USB stick for only $25. I knew it couldn’t be true, but my curiosity was piqued, so I ordered it. I received an absolutely gorgeous metal swiveling USB stick, engraved with the Sony logo and 512GB. When I plugged it in, it read 512GB! However, you know the rest of the story, the true capacity was only about 256MB and anything written to it past that number was simply discarded. I still have that drive and show it off to people to demonstrate that despite the impressive exterior packaging, it is what is inside that counts! Oh, and Sony didn’t even make USB thumb drives. I applaud Matt Cole the person behind The Great MicroSD Card Survey. He’s performing an invaluable service. Well done sir!
Musings:
Many years ago, I visited a friend of mine who was working as a missionary in Guatemala. While there I went to the local “mercado”. It was an experience; a pale comparison would be a flea market in the US. It was in an area about the size of a small city block, mostly covered, stiflingly hot, boasting every imaginable item that you could fathom wanting to purchase, live animals, food, clothes, electronics, spices, household goods, and so on. The sounds, the colors, the haggling back and forth to get good deals, and the smells… some were amazing and wonderful, such as music, flowers, and cooking food. Others, like the fish markets and similar, still amazing, but in a very different way. The internet is very much like the mercado, the sights, the sounds, the unbelievable variety – amazing in both senses of the word. You can find anything, and there are deals to be had, but the same warning that I got when going to the mercado applies to the online world, watch your wallet, beware of deals that are too good to be true, and pay attention to your surroundings, some areas are just not safe.

Keep the shields up.
Viscount Jan Broucinek
Red Dot Security News
Headline NEWS
- New York Times to start searching deleted ChatGPT logs after beating OpenAI in court
- Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update
- Chrome Zero-Day, ‘FoxyWallet’ Firefox Attacks Threaten Browsers
- Cisco warns that Unified CM has hardcoded root SSH credentials
- Cisco fixes maximum-severity flaw in enterprise unified comms platform
Ransomware, Malware, and Vulnerabilities News
- Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against US Critical Infrastructure by Iran
- Top FBI cyber official: Salt Typhoon ‘largely contained’ in telecom networks
- DOJ investigates ex-ransomware negotiator over extortion kickbacks
- Hunters International ransomware shuts down, releases free decryptors
- Justice Department charges 4 North Koreans with posing as IT workers to steal US companies’ money
- US shuts down a string of North Korean IT worker scams
- Hundreds of laptops, bank accounts linked to North Korean fake IT workers scheme seized in major crackdown
- North Korean operative reveals the inner workings of the IT scam infiltrating the Fortune 500
- Microsoft shuts down 3,000 email accounts created by North Korean IT workers
- North Korean remote IT workers’ evolving tactics to infiltrate organizations, use voice-changing software
- Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects
- Canada Gives Hikvision the Boot on National Security Grounds
- Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
- 14-hour+ global blackout at Ingram Micro halts customer orders
- Ingram Micro suffers global outage as internal systems inaccessible
- Ingram Micro outage caused by SafePay ransomware attack
- Ingram Micro Hit By SafePay Ransomware Attack: Report
- Ingram Micro Issues Statement Regarding Cybersecurity Incident
- Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
- Citrix warns of login issues after NetScaler auth bypass patch
- ‘CitrixBleed 2’ Shows Signs of Active Exploitation
- Grafana releases critical security update for Image Renderer plugin
- Your browser lets websites track you even without cookies
- New FileFix attack runs JScript while bypassing Windows MoTW alerts
- Users lack control as major AI platforms share personal info with third parties
- Dark Web Vendors Shift to Third Parties, Supply Chains
- Bluetooth flaws could let hackers spy through your microphone, simply by being nearby
- Sudo local privilege escalation vulnerabilities fixed
- chwoot: Critical Linux vulnerability makes users root on most systems
- Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
- Nessus Vulnerabilities on Windows Enables Arbitrary System File Overwrites
- Zig Strike – An Offensive Toolkit to Create Payloads and Bypass AV, XDR/EDR Detections
- Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits
- Recertified HDD vendor goHardDrive caught leaking thousands of customer details
- FDIC: ‘Suspected fraud’ contributed to Texas bank failure
- OCC Finds Outdated Systems Threaten Future of Regional Banks
- LLMs Are Recommending Phishing Sites—Here’s Why That’s Dangerous
- New Fake Marketplace From China Mimics Top Retail Brands for Fraud
- Over 120,000 fake Amazon sites target shoppers ahead of Prime Day
- Initial Access Broker Self-Patches Zero Days as Turf Control
- Hackers use Fake Cloudflare Verification Screen to Trick Users into Executing Malware
- Hackers use Vercel’s generative AI development tool to create phishing sites
- Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale
- Criminals Sending QR Codes in Phishing, Malware Campaigns
- Massive spike in use of .es domains for phishing abuse
- North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
- Johnson Controls starts notifying people affected by 2023 breach
- Esse Health says recent data breach affects over 263,000 patients
- Young Consulting says 2024 breach affects 1M+ people
- IdeaLab confirms data stolen in ransomware attack last year
- Alleged Verizon data breach sees 61M customer records offered for sale
- Ransomware Reshaped How Cyber Insurers Perform Security Assessments
- It’s 2025 and almost half of you are still paying ransomware operators
- German charity refuses to comply with Bitcoin ransomware demand
- Aeza Group sanctioned for hosting ransomware, infostealer servers
- RansomHub Ransomware Attacking RDP Servers Using Mimikatz and Advanced IP Scanner Tools
- International Criminal Court hit with ‘sophisticated’ cyberattack
- bank working to resolve issues after cyberattack
- Switzerland says government data stolen in ransomware attack
- Qantas discloses cyberattack amid Scattered Spider aviation breaches
- Qantas Confirms Major Data Breach Linked to Third-Party Vendor
- Australia’s Qantas Airways Says 6M Customer Records Accessed in Cyberattack
- Alaska Air Group-Owned Hawaiian Airlines Dealing With ‘Cybersecurity Event’
- Documents reveal how a massive ransomware attack crippled the Fort Bend County libraries system
- Forminator plugin flaw exposes WordPress sites to takeover attacks
Other News Events of Note and Interest
- Cool Tool: Microsoft releases PowerToys v0.92 with new features for many modules
- HPE Completes $13.4B Juniper Networks Acquisition, CEO Antonio Neri Calls It Start Of A ‘New Era’
- US judge says China’s Huawei Technologies must face criminal charges
- The Boeing 747 Still Uses Floppy Disks For Software Updates: Here’s Why
- DDR4 prices are now so high that vendors have decided to start making it again
- Massive MicroSD card testing database exposes fakes, charts performance and endurance
- VMware must support crucial Dutch govt agency as it migrates off the platform, judge rules
- Why every company needs a travel security program
- We’ve Issued Our First IP Address Certificate – Let’s Encrypt
- Cloudflare Is Blocking AI Crawlers by Default
- Oracle Inks Cloud Deal Worth $30 Billion a Year
- OpenAI confirmed to be behind $30bn-a-year Oracle cloud deal
- Oracle, OpenAI Expand Stargate Deal for More US Data Centers
- Cursor launches a web app to manage AI coding agents
- AIs have a favorite number, and it’s not 42
- EU urged to pause rollout of new AI rules
- Will the EU delay enforcing its AI Act?
- 7 People Now Have Elon Musk’s Neuralink Brain Implant
- Cloud Repatriation Driven by AI, Cost, and Security
- Dissecting RDP Activity
- Can’t access your NAS drives in Windows 11? Here’s what to do
- Microsoft: DNS issue blocks delivery of Exchange Online OTP codes
- Stop using 2FA text codes already – Komando.com
- It’s about time – Microsoft finally rolls out better passkey integration in Windows
- Microsoft warns of Windows update delays due to wrong timestamp
- Microsoft Teams Devices Locked Out After CA Policy Change
- Microsoft hints at revoking access to the Windows kernel — eventually
- Microsoft fixes ‘Print to PDF’ feature broken by Windows update
- Microsoft asks users to ignore Windows Firewall config errors
- Microsoft acknowledges Intune issue that wipes out security customizations
- Microsoft Partner Center Security Requirements changing in October
- Windows 11 update chaos: Another patch brings more bugs and issues
