Vulnerabilities & Patches

AI Apps Become the New Malware Highway: What Mac Users Need to Know

AI Apps Become the New Malware Highway: What Mac Users Need to Know

I’ve been watching something troubling unfold over the past few weeks, and it’s time we talk about how cybercriminals are weaponizing our enthusiasm for AI tools. The latest campaigns targeting both Windows and Mac users show a sophisticated shift in attack vectors that caught my attention – and should be on your radar too.

The AI App Trojan Horse

Here’s what’s happening: The AMOS infostealer is now targeting macOS users through popular AI applications, essentially turning our excitement about AI productivity tools into a security vulnerability. This isn’t just another malware campaign – it’s a calculated exploitation of user behavior and trust.

ClickFix Attacks Hit Crypto Users While Zero-Days Target Government Infrastructure

ClickFix Attacks Hit Crypto Users While Zero-Days Target Government Infrastructure

I’ve been tracking some concerning attack patterns this week that show how creative threat actors are getting with their delivery methods. The most interesting case involves attackers using Pastebin comments to distribute what researchers are calling “ClickFix” attacks specifically targeting cryptocurrency users.

The Pastebin Problem Gets Worse

Here’s how the ClickFix attack works: threat actors are posting malicious JavaScript in Pastebin comments, disguised as helpful fixes for common crypto wallet issues. When users copy and paste this code into their browser console (thinking they’re fixing a legitimate problem), they’re actually executing malware that hijacks Bitcoin swap transactions and redirects funds to attacker-controlled wallets.

DNS Becomes the New Backdoor: ClickFix Attacks Get Creative While Google Groups Harbor Malware

DNS Becomes the New Backdoor: ClickFix Attacks Get Creative While Google Groups Harbor Malware

We’ve seen social engineering attacks get increasingly sophisticated over the years, but the latest evolution of ClickFix campaigns caught my attention this week. Microsoft disclosed that threat actors are now using DNS queries as a delivery mechanism for malware – and honestly, it’s both clever and concerning.

When nslookup Becomes a Weapon

The traditional ClickFix attack has been around for a while. You know the drill: users get tricked into copying and pasting commands that supposedly fix a fake technical issue. What’s new here is how attackers are using the humble nslookup command to pull down PowerShell payloads directly through DNS queries.

When Zero-Days Rain Down: February's Patch Tuesday Shows Why We Can't Have Nice Things

When Zero-Days Rain Down: February’s Patch Tuesday Shows Why We Can’t Have Nice Things

It’s been one of those weeks where I’ve lost count of how many times I’ve muttered “of course it is” while reading security alerts. Between Microsoft’s six actively exploited zero-days, Apple’s “extremely sophisticated attack,” and a WordPress plugin that’s basically handing out RCE access like Halloween candy, February is shaping up to be a month that’ll keep us all busy.

When Training Apps Become Attack Vectors: A Week of Cloud Compromises and Telecom Breaches

When Training Apps Become Attack Vectors: A Week of Cloud Compromises and Telecom Breaches

I’ve been diving into some concerning security incidents from this past week, and there’s a pattern emerging that I think we all need to pay attention to. While we’re busy hardening our production environments, attackers are finding increasingly creative ways to exploit the very tools we use to train our teams.

The Training App Problem Nobody’s Talking About

Here’s something that caught my eye: researchers found that intentionally vulnerable training applications are being exploited for crypto-mining in Fortune 500 cloud environments. We’re talking about tools like OWASP Juice Shop, DVWA, and bWAPP - applications that are supposed to be sandboxed and secure, but are ending up exposed to the internet where attackers can easily spot them.

February's Patch Frenzy: Why Microsoft and Apple's Zero-Day Fixes Should Keep You Busy This Week

February’s Patch Frenzy: Why Microsoft and Apple’s Zero-Day Fixes Should Keep You Busy This Week

If you thought February was going to be a quiet month for patches, think again. Between Microsoft fixing six zero-days and Apple rushing out updates for an actively exploited memory corruption bug, it’s been one of those weeks where your patch management queue just keeps growing.

Let me walk you through what’s been happening and why some of these fixes deserve immediate attention.

When Hackers Go Old School: Physical Mail Attacks Hit Crypto Users

When Hackers Go Old School: Physical Mail Attacks Hit Crypto Users

You know we’re living in strange times when threat actors are ditching sophisticated digital attacks for good old-fashioned snail mail. But that’s exactly what’s happening right now, and honestly, it’s pretty clever from an adversarial perspective.

The Return of Physical Social Engineering

Cybercriminals have started sending physical letters to cryptocurrency hardware wallet users, specifically targeting people who own Trezor and Ledger devices. These aren’t your typical phishing emails that we’re all trained to spot – they’re actual paper letters showing up in mailboxes, designed to look like official communications from these wallet manufacturers.

When One Attacker Rules Them All: The Ivanti Exploitation Campaign That Should Worry Us

When One Attacker Rules Them All: The Ivanti Exploitation Campaign That Should Worry Us

I’ve been watching the security news this week, and there’s a pattern emerging that’s worth discussing. While we’re dealing with the usual mix of browser extension malware and acquisition announcements, there’s one story that really stands out – and it’s not getting the attention it deserves.

The Ivanti Problem Gets Personal

Here’s what caught my eye: researchers are reporting that a single threat actor is responsible for 83% of the active exploitation targeting two critical vulnerabilities in Ivanti Endpoint Manager Mobile. We’re talking about CVE-2026-21962 and CVE-2026-24061 – both remote code execution flaws that are exactly as bad as they sound.

CISA's Busy Week: Microsoft SCCM Under Attack While Supply Chain Security Gets a Mixed Report Card

CISA’s Busy Week: Microsoft SCCM Under Attack While Supply Chain Security Gets a Mixed Report Card

If you’ve been following CISA’s advisory feed this week, you might have noticed they’ve been particularly active. We’re seeing active exploitation of several critical vulnerabilities, including a Microsoft Configuration Manager flaw that’s been flying under the radar since October, plus some sobering reminders about just how far-reaching data breaches can be when basic security controls aren’t in place.

From Poland's Power Grid to Chrome Extensions: This Week's Security Wake-Up Calls

From Poland’s Power Grid to Chrome Extensions: This Week’s Security Wake-Up Calls

I’ve been following several concerning developments this week that really highlight how quickly our threat environment is shifting. From critical infrastructure attacks to browser extensions gone rogue, there’s a lot we need to unpack.

The Poland Energy Attack: A Reality Check for Critical Infrastructure

Let’s start with the big one. The cyberattack on Poland’s energy grid in late December has prompted both UK and US cyber agencies to issue urgent warnings to critical infrastructure operators. Fortra’s analysis shows this wasn’t just another ransomware group looking for a quick payout – this was a coordinated attack specifically targeting energy infrastructure.