Photo by Craig Manners on Unsplash
New HybridPetya ransomware bypasses Secure Boot
What happened: A new ransomware strain called HybridPetya can bypass Windows’ Secure Boot protection.
What to do: Keep your security software updated and back up important files regularly.Critical flaw in DELMIA Apriso software actively exploited
What happened: Hackers are exploiting a serious vulnerability in DELMIA Apriso manufacturing software.
What to do: Apply security patches for DELMIA Apriso immediately.Samsung fixes Android zero-day vulnerability
What happened: Samsung released a security update fixing a critical Android flaw already used in attacks.
What to do: Update your Samsung devices as soon as possible.FBI warns of data theft targeting Salesforce platforms
What happened: Cybercriminal groups UNC6040 and UNC6395 are stealing data from Salesforce users.
What to do: Review Salesforce account security and monitor for unusual activity.Windows Registry memory corruption exploited in attacks
What happened: Researchers demonstrated how attackers can exploit Windows Registry memory flaws.
What to do: Ensure Windows updates are installed to protect against registry attacks.Sound system software fuzzing reveals new bugs
What happened: Security researchers found vulnerabilities in CoreAudio by testing its messaging system.
What to do: Keep your audio software updated and watch for patches.NSO Group’s BLASTPASS iMessage exploit analyzed
What happened: Experts uncovered details about a sophisticated iMessage exploit used by NSO Group.
What to do: Avoid clicking unknown links or messages on iPhones.
If You Only Do 3 Things Today
Action (1 minute each) | Why it matters |
---|---|
Update your Samsung Android devices | Fixes critical vulnerabilities attackers use |
Apply patches for DELMIA Apriso software | Stops active attacks on manufacturing systems |
Review Salesforce account security | Protects your data from targeted theft attempts |
For Teams (super quick)
- Prioritize patching DELMIA Apriso and Samsung Android devices immediately.
- Monitor Salesforce platform logs for suspicious access or data downloads.
- Verify Windows systems have the latest security updates to prevent registry exploits.
- Educate users to avoid clicking unknown links, especially in iMessage and email.
- Keep audio and other system software up to date to reduce attack surface.
Photo by Pontus Wellgraf on Unsplash