Fortinet reveals attackers may have FortiGate access post-patch

TL;DR fortinet and remote access exploits

In this week’s TL;DR we’re focusing on stories that revolve around remote working security, specifically Fortinet’s work to secure their FortiGate solution, typically used by remote workers as a remote access solution, as well as recent studies on the actual risk level of remote access solutions. FortiGate vulnerabilities post-patch Fortinet has issued a critical warning … Read more

Android software update released to patch active exploits

android and outlook updates

In this week’s TL;DR, we look at recent security updates from Google and Microsoft for Android and Outlook, respectively. These updates are in response to recent vulnerabilities and exploits identified in their platforms. Google releases security update Google has released an April 2025 security update for Android, which addresses 62 vulnerabilities, including two high-severity flaws … Read more

Microsoft End of Support for Exchange 2016 and 2019

TL;DR: Microsoft end of support & Darcula software

This week, we look at the end of support for Microsoft Exchange servers 2016 and 2019, as well as the latest phishing technology, “Darcula,” that IT leadership should be aware of. Microsoft Exchange end of support Microsoft has announced that support for Exchange Server 2016 and Exchange Server 2019 will conclude on October 14, 2025. … Read more

DeepSeek Impersonators Phishing User Data

In this week’s TL;DR article, we look at phishing scammers, both imitating the DeepSeek platform and utilizing AI to increase their own capabilities. DeepSeek phishing scams In the wake of DeepSeek’s recent release of its AI chatbot on January 20, 2025, cybercriminals have swiftly exploited its rising popularity by creating fraudulent websites that mimic DeepSeek’s … Read more

The Rise of AI in Cyberattacks: A Growing Threat to Organizations

ai

Artificial Intelligence (AI) has emerged as a transformative force across industries, streamlining workflows, improving decision-making, and enhancing security. However, the same technology has also become a tool for cybercriminals; AI cyberattacks are rising. Threat actors use AI to scale operations, evade detection, and perpetrate increasingly sophisticated attacks. How Cybercriminals Are Using AI in Cyberattacks 1. … Read more

GitHub Desktop Vulnerability Risks Credential Leaks

Github vulnerabilities & GhostGPT

In this weeks TL;DR article, we look at a newly discovered GitHub Desktop exploit and the rise of an AI chatbot designed to assist cybercriminals in crafting malicious code. GitHub Desktop vulnerability via malicious URLs Multiple security vulnerabilities, collectively termed “Clone2Leak,” identified in GitHub Desktop and other Git-related projects, this can allow attackers to access … Read more

Securing Your Remote Workforce – The Corporate Chapter

ThinKiosk installs on any device operating Windows OS. It creates a secure, isolated shell that leverages Windows but crucially blocks user access to the underlying OS. IT teams can configure and enforce strict security policies on each device, as well as push updates for applications, firewalls, and firmware. What You’ll Learn : Why You Should … Read more

Securing Your Remote Workforce – The BYOD Chapter

With remote working becoming more and more common, organizations are looking to take advantage of BYOD/BYOPC in order to save on costs and operational complexity. However, it has some inherent security issues traditionally. ThinScale’s unique approach to BYOD with Secure Remote Worker solves these security issues. Watch this recording to explore how you can secure … Read more

Unpacking the CX Industry’s Global Investment Trends for 2024

The CX and outsourcing sector is ever-changing, and Ryan Strategic Advisory has always had its finger on this industry’s pulse since 2017 with the CX Ombibus Survey. The aim is to gain and share insights into what the leaders in enterprises are thinking in terms of outsourcing, prioritization of technologies, and more. In this recording, … Read more

DoubleClickjacking: new exploit can affect any major site’s security

Doubleclickjacking, LDAP vulnerability

This week, we will go through two recently discovered exploits. DoubleClickjacking is a browser-based vulnerability that affects major websites and a flaw in Microsoft’s LDAP that could lead to DoS attacks. A new Clickjacking threat identified A new exploit named “DoubleClickjacking” enables attackers to bypass existing clickjacking protections on major websites. Security researcher Paulos Yibelo … Read more