Shadow IT – Getting Riskier Part 1
Published Jun 27 2025 8:40 AM
Shadow IT is taking on new dimensions as Software as a Service or cloud-based applications gain in popularity. But with the benefits of SaaS come increased risks for the enterprise. This Insight looks at the growth of Shadow IT and the associated risks.
Shadow IT grows in risk
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
Published Jun 27 2025 8:36 AM
A serious vulnerability rated at 9.2 out of 10 is currently being exploited in Citrix NetScaler ADC. It allows attackers to gain access to the entire network when the device is configured as a gateway. Very dangerous! Patch as soon as possible.
Vulnerability gives full network access
Millions of Brother Printers Hit by Critical, Unpatchable Bug
Published Jun 27 2025 8:32 AM
Researchers found many bugs in printer systems. Brother is the one with the most bugs by far. Some are patchable and at least one very serious bug is not patchable. What will be done remains to be seen.
Unpatchable bug found
Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
Published Jun 27 2025 8:29 AM
Microsoft Exchange servers are a popular target of cyberattackers and they have been hit again. Keyloggers that record all keystrokes infected the servers to steal credentials.
MS Exchange Servers hit with with keyloggers
Sim-swap fraud rises by 1,000% as criminals seek to exploit growth of two-factor authentication
Published Jun 27 2025 8:24 AM
SIM (Subscriber Identity Module) swap is a technique where a cybercriminal convinces a mobile carrier to transfer an existing mobile number to a new SIM in a new device. That new SIM and device then get all the calls and texts intended for the original owner. It can be very difficult to convince a carrier that you are the real owner and to transfer the number back to you.
SIM Swap grows significantly
Think you can spot fake information and not click on bad links? Most people believe they can. But experience shows most people can’t identify fake information. Cybercriminals are using AI to make things even harder to detect. Fake information is a powerful force in phishing.