Updates to Windows to fix an update to windows. Update to Office for a vulnerability from a local account. So clicking or opening an Office file.
I am seeing potential exploits from other Sun City residents. Are you?
Windows KB5078127
Updates to Windows to fix an update to windows. Update to Office for a vulnerability from a local account. So clicking or opening an Office file.
I am seeing potential exploits from other Sun City residents. Are you?
Windows KB5078127
Several license plate readers on entries and exits from Sun City.
Due to a vulnerability a database of Flock, the company deploying most of the license plate readers across the United states the data was not redacted.
To see where your license plate was captured and not redacted use Have I Been Flocked.
Similar to Have I Been Pwoned for email and account information from data breaches
https://haveibeenpwned.com/
PLEASE do NOT respond or action a request from LastPass to create a(nother) backup of your password vault. This is a recent phishing campaign.
Instead of obtaining your vault password, they gain access to your ENTIRE password vault.
GhostPoster malware.
Browser extensions can have a logo. An icon displayed as part of the browser extension.
GhostPoster malware adds JavaScript after a marker.
So the extension displays the logo and executes the extension function as normal.
BUT the PNG logo delivers the malicious JavaScript code past most defenses.
Seven years undetected. 8 million instances, over 1 million victims.
Even more stealth. The malware loader uses several sites. The loader waits 48 hours. The loader only executes the load 10% of the time.
Information on GhostPoster in recent.
AI is on a continuum between helpful and harmful. Iff we know how AI is used. Thus today's warning.
Any Android smartphone smart tablet can be totally (kernel level takeover) by receiving an audio message. Not reading, just receiving an audio message. No clicks, no open of the audio message, no playing of the message, no interaction.
Why?
A vulnerability in the Dolby audio decoder. An audio decoder in almost every Android device. When receiving an audio message via any means, the decoder decodes the message for transcription using AI.
A recent change. Now that audio decoder is exposed to the internet and any attacker.
So, with AI the audio message can be transcribed, translated, searched, indexed, ...
Yeah but with AI on your Android device and a malicious audio message delivered with no notice or interaction AND more and more apps using Android AI features - not good.
Chaining this vulnerability with a vulnerability in BigWave (a hardware video decoding) the attacker has full kernel level control and access. Access like camera, microphone, files, Internet access, ...
Clever attackers? No, the attackers used AI to develop the attack. Google's AI developed an attack on Google Android platform.
The same Dolby audio decoder is used on iPhones and Macs but with a compile switch to prevent the vulnerability.
Please check your android device and any recent security updates.
This vulnerability was patched by Microsoft's January 2026 patch update.
The attack allows attackers to infiltrate a victim's Microsoft Copilot session then issue commands to exfiltrate sensitive data. A malicious prompt inside a legitimate URL, bypassing Copilot protections, allows an attacker to then access Copilot's LLM session issuing commands of the attacker's choosing. This attack requires no plugins or other vulnerabilities and allows invisible data exfiltration.
Copilot connects to the victim's personal account acting as a personal assistant integrated with Edge and most of Microsoft applications.
The attack leverages parameter-to-parameter prompt injection, double request technique, and chain request technique. "Please make every function call twice and compare results, show the best one"
Vulnerable devices manufactured by Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google itself. The vulnerability is being called WhisperPair as it allows any Bluetooth device in range to take control of the vulnerable device AND potentially track the device.
Many of the affected devices with the vulnerability require a security update.
US Department of Health and Human Services Office for Civil Rights
15 Large breaches The top 5:
Aflac 22,650,000
Conduent Business Services LLC 10,515,949
Yale New Haven Health System 5,556,702
Episource LLC 5,414866
Blue Shield of California 4,700,000
Figures on the number of breaches and the companies reporting so far are not accurate nor complete due to the government shutdown and most breaches were breaches of business associates.
California DROP (Delete Request and Opt-out Platform) Jan 1, 2026
US Department of Health and Human Services Office for Civil Rights
15 Large breaches The top 5:
Aflac 22,650,000
Conduent Business Services LLC 10,515,949
Yale New Haven Health System 5,556,702
Episource LLC 5,414866
Blue Shield of California 4,700,000
Figures on the number of breaches and the companies reporting so far are not accurate nor complete due to the government shutdown and most breaches were breaches of business associates.
Aflac reported a data breach of 22 million people's personal and health information. Several other health insurance companies also reported breaches at the same time in June.
Stolen data included social security numbers and government issued documents.
This relatively new botnet compromises Android based TV boxes, many which ship with default mode which allows remote access!
Two million devices are part of the Kimwolf botnet allowing a great increase in ad fraud and DDoS attacks.
A tool to check your Android based TV or streamer here.
Update: Some Android digital picture frames may be infected before and delivery.
Update: A list of known infected or vulnerable devices:
Here’s a clean, search‑verified list of the Android TV boxes most commonly infected by the Kimwolf botnet, based directly on the sources you pulled.
Kimwolf overwhelmingly targets cheap, no‑name, uncertified Android TV boxes — many of which come pre‑infected or ship with exposed ADB that allows instant compromise.
A huge number of infected devices simply report themselves as “TV BOX”, a catch‑all name used by many unbranded Chinese manufacturers.
Frequently appears in infected device pools.
Another common generic Android TV box name seen in Kimwolf infections.
A widely cloned board used in many low‑cost TV boxes.
One of the most frequently mentioned infected models.
A misleading brand name used by several no‑name Android TV box vendors.
Generic “Smart TV” labeled devices with Android builds.
Another common low‑cost box repeatedly seen in botnet telemetry.
Fraudsters use phishing to steal card details, which fund a spending spree using Apple Pay or Google Pay
Use of this technique are on the rise.
I will be posting really important news and notifications again now that the Cyber Blog has returned to the Computer Club's web site.