New ThinScale release! App Attach integration, Application Launch prevention, and more!

ThinScale new release 8.5: App Attach support, Application Launch prevention and more

We’re excited to announce the latest ThinScale release. This version provides ThinScale customers with a brand new to deploy and install applications through Microsoft’s App Attach, as well as better control over local applications, while also providing easier methods for administrators to manage ThinScale deployments and 3rd party software. What’s New? Microsoft App Attach Integration ThinScale’s latest … Read more

Suspected Ransomware attack on UK retailers

Ransomware attacks on UK retailers & Langflow vulnerabilities

This week’s TL;DR – we look at recent cyber attacks on major UK retailers last week. We also examine CISA’s addition of a critical Langflow platform vulnerability to its Known Exploited Vulnerabilities list. UK retailers suffer ransomware attacks Prominent UK retailers including Marks & Spencer (M&S), Harrods, and the Co-op have been targeted by a … Read more

Securing the Edge with ThinScale’s Device Analytics

In a recent LinkedIn Live session, Lauren Taggart and Giuseppe Stirpe from ThinScale walked us through how Device Analytics is reshaping endpoint observability and optimization. From real-time diagnostics to proactive employee notifications and rich data visualization integration, the session offered a deep dive into why this feature is becoming a mainstay for ThinScale customers. Why … Read more

FOG ransomware posing as DOGE

TL;DR FOG ransomware & Lotus Panda

This week’s TL;DR features two stories, both revolving around recent attacks. One, FOG ransomware, impersonating the DOGE, and another, Lotus Panda, targeting various government and large private bodies in Southeast Asia. FOG Hackers troll with DOGE A new campaign by FOG ransomware group discovered. Mainly known for targeting sectors like technology, manufacturing, education, and transportation. … Read more

Fortinet reveals attackers may have FortiGate access post-patch

TL;DR fortinet and remote access exploits

In this week’s TL;DR we’re focusing on stories that revolve around remote working security, specifically Fortinet’s work to secure their FortiGate solution, typically used by remote workers as a remote access solution, as well as recent studies on the actual risk level of remote access solutions. FortiGate vulnerabilities post-patch Fortinet has issued a critical warning … Read more

Android software update released to patch active exploits

android and outlook updates

In this week’s TL;DR, we look at recent security updates from Google and Microsoft for Android and Outlook, respectively. These updates are in response to recent vulnerabilities and exploits identified in their platforms. Google releases security update Google has released an April 2025 security update for Android, which addresses 62 vulnerabilities, including two high-severity flaws … Read more

DeepSeek Impersonators Phishing User Data

In this week’s TL;DR article, we look at phishing scammers, both imitating the DeepSeek platform and utilizing AI to increase their own capabilities. DeepSeek phishing scams In the wake of DeepSeek’s recent release of its AI chatbot on January 20, 2025, cybercriminals have swiftly exploited its rising popularity by creating fraudulent websites that mimic DeepSeek’s … Read more

The Rise of AI in Cyberattacks: A Growing Threat to Organizations

ai

Artificial Intelligence (AI) has emerged as a transformative force across industries, streamlining workflows, improving decision-making, and enhancing security. However, the same technology has also become a tool for cybercriminals; AI cyberattacks are rising. Threat actors use AI to scale operations, evade detection, and perpetrate increasingly sophisticated attacks. How Cybercriminals Are Using AI in Cyberattacks 1. … Read more

GitHub Desktop Vulnerability Risks Credential Leaks

Github vulnerabilities & GhostGPT

In this weeks TL;DR article, we look at a newly discovered GitHub Desktop exploit and the rise of an AI chatbot designed to assist cybercriminals in crafting malicious code. GitHub Desktop vulnerability via malicious URLs Multiple security vulnerabilities, collectively termed “Clone2Leak,” identified in GitHub Desktop and other Git-related projects, this can allow attackers to access … Read more