Broker Report

Get up to date real world information from our expert broker on what is happening in the world of scams and how you can protect yourself

featured

Major Sydney university suffers huge email scam with students told degrees ‘revoked’ – 9News

Opening Overview In today’s digital environment, universities—and the wider education sector—face persistent threats from social engineering and phishing attempts. A high-profile incident at a major Sydney university highlights how quickly a scam can escalate and affect students’ trust in official communications. This post distills what happened, why it matters, and practical steps you can take […]

Major Sydney university suffers huge email scam with students told degrees ‘revoked’ – 9News Read More »

featured

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

Overview In an era where automated tools increasingly assist developers, AI-powered security aids are becoming part of everyday workflows. Recently, a research-preview feature named Codex Security was introduced to help identify and suggest fixes for code vulnerabilities. The rollout targets select product tiers and is accessible via the Codex web, with free usage for a

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues Read More »

featured

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Overview Today’s mobile-security landscape reminds us that threats continue to evolve beyond traditional PC-focused attacks. A recent disclosure from Google Threat Intelligence Group (GTIG) highlights a new and potent iOS exploit kit named Coruna, also known as CryptoWaters. The framework targets Apple iPhone models running iOS versions from 13.0 through 17.2.1 and relies on a

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1 Read More »

featured

Patch Tuesday, February 2026 Edition

Overview and Context February 2026’s Patch Tuesday underscores how quickly software vulnerabilities surface and the critical role of timely updates. Microsoft released a broad set of security fixes intended to close more than 50 holes across Windows and related software. Of particular concern are six zero-day flaws that attackers have already started exploiting in real-world

Patch Tuesday, February 2026 Edition Read More »

featured

Patch Tuesday, February 2026 Edition

Overview and Context In February 2026, Microsoft issued a broad set of security updates designed to close more than 50 vulnerabilities across Windows operating systems and related software. Among these fixes were six zero-day flaws, weaknesses that attackers were actively exploiting in the wild. This patch Tuesday episode underscores the persistent and evolving nature of

Patch Tuesday, February 2026 Edition Read More »

featured

Kimwolf Botnet Swamps Anonymity Network I2P

Overview The cybersecurity landscape this week highlights how attackers leverage connected devices and privacy tools to complicate defense. A large Internet of Things (IoT) botnet, identified as Kimwolf, has been disrupting the operations of a privacy-focused network known as the Invisible Internet Project (I2P). I2P is designed to decentralize and encrypt online communication to protect

Kimwolf Botnet Swamps Anonymity Network I2P Read More »

featured

Please Don’t Feed the Scattered Lapsus ShinyHunters

Context and Purpose In today’s threat landscape, extortion-focused cybercrimes are evolving beyond simple data theft. A notorious ransomware collective, associated with the name Scattered Lapsus ShinyHunters (SLSH), has been reported to combine coercive tactics with public exposure to pressure victims into paying. This approach highlights how attackers blend online intimidation with real‑world intimidation strategies, and

Please Don’t Feed the Scattered Lapsus ShinyHunters Read More »

featured

DoorDash Confirms Data Breach After Social Engineering Attack on Employee – CPO Magazine

Opening Context In today’s interconnected digital landscape, attackers often exploit human factors to breach defenses. A recent incident involving DoorDash highlights how a targeted social engineering effort aimed at an employee can trigger a data breach. While public details are limited, the core takeaway remains clear: manipulating people remains a powerful method for gaining access

DoorDash Confirms Data Breach After Social Engineering Attack on Employee – CPO Magazine Read More »

featured

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

Overview and Context A recent alert from U.S. cybersecurity authorities confirms that a flaw in FileZen is being actively exploited in real-world scenarios. The vulnerability, identified as CVE-2026-25108, carries a high severity (CVSS v4 score of 8.7) and is classified as an OS command injection. In practical terms, an authenticated user could execute OS commands

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability Read More »

116836

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Executive Overview In early 2026, security researchers highlighted a high-severity vulnerability in Google Chrome, tracked as CVE-2026-0628 with a CVSS score of 8.8. The flaw stemmed from insufficient policy enforcement within the WebView tag, a component used to render web content in embedded contexts. If exploited, attackers could have escalated their privileges and accessed local

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel Read More »

featured

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Overview and Context Cyber threat actors continue to evolve their tactics, seeking resilient ways to control compromised devices. A recent disclosure highlights a novel botnet loader named Aeternum C2, which exploits a blockchain-based command-and-control (C2) channel. Rather than relying on traditional servers or domain hosts, the operators encrypted their instructions and stored them on the

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown Read More »

featured

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories

Setting the Scene The latest threat briefing reinforces a simple but powerful lesson: danger often hides inside everyday digital moments. A routine ad, a calendar invitation, or a software update can become a conduit for intruders when they deploy sharper, faster-moving tactics. In such scenarios, attackers aim for rapid access, quick control, and a cleanup

ThreatsDay Bulletin: Kali Linux + Claude, Chrome Crash Traps, WinRAR Flaws, LockBit & 15+ Stories Read More »