• About Us
IT Systems Networked
  • Home
  • Log In
    • Membership Levels
    • Membership Account
      • Your Profile
      • Membership Billing
      • Membership Orders
      • Membership Cancel
    • Membership Confirmation
    • Membership Checkout
  • Services
    • Computers
    • Networks
    • Access Controls
    • Surveillance
    • Tech Support
    • Managed Services
    • VOIP
    • Consulting
    • POS
    • Audio
  • Requests
    • Quote
    • Client Portal
    • Ticket System
    • Incident Report
    • Downloads
    • Work From Home
  • Contact
Select Page

CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software

by bor1cua | Apr 14, 2026 | Cybersecurity Resources

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added half a dozen security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2026-21643...

FBI and Indonesian Police Dismantle W3LL Phishing Network Behind $20M Fraud Attempts

by bor1cua | Apr 14, 2026 | Cybersecurity Resources

The U.S. Federal Bureau of Investigation (FBI), in partnership with the Indonesian National Police, has dismantled the infrastructure associated with a global phishing operation that leveraged an off-the-shelf toolkit called W3LL to steal thousands of victims’...

⚡ Weekly Recap: Fiber Optic Spying, Windows Rootkit, AI Vulnerability Hunting and More

by bor1cua | Apr 14, 2026 | Cybersecurity Resources

Monday is back, and the weekend’s backlog of chaos is officially hitting the fan. We are tracking a critical zero-day that has been quietly living in your PDFs for months, plus some aggressive state-sponsored meddling in infrastructure that is finally coming to light....

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

by bor1cua | Apr 13, 2026 | Cybersecurity Resources

OpenAI revealed a GitHub Actions workflow used to sign its macOS apps, which downloaded the malicious Axios library on March 31, but noted that no user data or internal system was compromised. “Out of an abundance of caution, we are taking steps to protect the...

CPUID Breach Distributes STX RAT via Trojanized CPU-Z and HWMonitor Downloads

by bor1cua | Apr 12, 2026 | Cybersecurity Resources

Unknown threat actors compromised CPUID (“cpuid[.]com”), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, HWMonitor Pro, and PerfMonitor, for less than 24 hours to serve malicious executables for the software and deploy a...

Adobe Patches Actively Exploited Acrobat Reader Flaw CVE-2026-34621

by bor1cua | Apr 12, 2026 | Cybersecurity Resources

Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-34621, carries a CVSS score of 8.6 out of 10.0. Successful exploitation...
« Older Entries
Next Entries »
  • About Us
  • Facebook
  • X
  • Instagram
  • RSS
Copyright © 2024 | IT Systems Networked