DoubleClickjacking: new exploit can affect any major site’s security

Doubleclickjacking, LDAP vulnerability

This week, we will go through two recently discovered exploits. DoubleClickjacking is a browser-based vulnerability that affects major websites and a flaw in Microsoft’s LDAP that could lead to DoS attacks. A new Clickjacking threat identified A new exploit named “DoubleClickjacking” enables attackers to bypass existing clickjacking protections on major websites. Security researcher Paulos Yibelo … Read more

ThinScale 8.4: Smarter, Safer, and Easier IT Management

We’re excited to announce the latest ThinScale 8.4 release, packed with powerful features designed to improve security, enhance network control, and simplify IT administration. Let’s explore what’s new: What’s New? Geolocation-Based Access Policies  Take control of where and how users access your environment. Our brand-new Geolocation Access Policies allow you to enforce location-based checks, including: … Read more

Reduce IT costs in 2025 while improving endpoint security

Cut costs without impacting endpoint security

In 2025, organizations face the challenge of bolstering endpoint security against increasingly sophisticated cyber threats while managing constrained budgets. Achieving robust endpoint protection and reducing IT costs require strategic investments and innovative approaches. Below are key strategies to enhance endpoint security and effectively reduce IT expenses in the upcoming year. 1. Adopt Unified Endpoint Security … Read more

Mandiant researchers uncover that QR codes can be used to circumvent browser isolation

Mandiant researchers uncover QR codes can be used to bypass isolated browsers, and Digital Eye use SQL injection to hide malicious code inside Visual Studio and Azure

This week, we explore a recent discovery revealing how malicious actors can exploit QR codes to bypass isolated browsers. Additionally, we delve into a cyber espionage campaign aimed at IT service providers in Southern Europe. New threat can introduce malicious actions to an environment Security researchers at Mandiant have uncovered a method by which attackers … Read more

SpyLoan Malware affects 8 Million Android customers

ThinScale TL;DR SpyLoan and Ransomware gangs seek Pen testers

In today’s TL;DR, we look at a recent SpyLoan malware discovery by McAfee on multiple applications on the Google Play Store and the increasing trend of Ransomware groups hiring skilled Pen testers to improve their malicious software. 8 Million Android customers affected by SpyLoan Malware A recent investigation by McAfee has identified 15 malicious Android … Read more

Palo Alto Networks has identified a critical zero-day vulnerability

Palo alto networks zero day and department of homeland security ai standards

This week’s update highlights two significant developments: Palo Alto Networks has identified a Zero-Day vulnerability in its own solution, while the US Department of Homeland Security has introduced a framework for the integration of AI. Critical Zero-Day discovered for Palo Alto Networks Palo Alto Networks has identified a critical zero-day vulnerability in its PAN-OS firewall … Read more

Security concerns over Microsoft’s AI tool lead to delayed release

Microsoft AI and SpyLight

In this week’s update, we will be looking at privacy and security concerns revolving around Microsoft’s upcoming Recall AI, as well as a new activity from known spyware, LightSpy, targeting Apple iOS devices. Security and privacy worries over Microsoft’s Recall AI Microsoft has delayed the release of its AI tool, Recall, once more, prioritizing security … Read more

Delta Air lines pursue lawsuit against CrowdStrike for $500 Million

Latest news in in the cybersecurity world - Delta Lawsuit against CrowdStrike

In this week’s update, we look at trending news stories including: Delta’s $500 million lawsuit against CrowdStrike and the recent phishing campaign by APT29. CrowdStrike face Delta Air lines in court over July’s outage Delta Air Lines has filed a $500 million lawsuit against CrowdStrike following the severe IT outage that occurred in July 2024. … Read more

How Can the financial industry cut costs while improving endpoint security?

Convert existing hardware and ensure your endpoints maintain compliance with regulatory standards

Financial institutions today face mounting pressure to secure their operations, meet regulatory compliance, and manage costs effectively. For CISOs and security teams, the challenge is twofold; Two strategies—endpoint lockdown and device conversion—are a good option when balancing security, efficiency, and cost savings. The Rising Cybersecurity Challenges in Finance The financial sector is a lucrative target … Read more

Security Researchers Successfully Infiltrate the Cicada3301 Ransomware Affiliate Program

ThinScale TL;DR Cybersecurity news Cicada3301 ClickFix

Welcome to ThinScale’s new cybersecurity TL;DR series, where we break down the latest news and trends in the cyber world. In this week’s update, we look at trending news stories, including the successful infiltration of the Cicada3301 ransomware group and details on the recent ClickFix infostealing campaign. Cicada3301 Ransomware Affiliate Program The Cicada3301 ransomware group … Read more