top of page

TrustPoint Blog

Critical security information & helpful tips for small and mid sized organizations.
DEPENDABLE
FLEXIBLE
EXPERIENCED


New Malware Steals Password & Ignores MFA
A new strain of password-stealing malware is raising serious concerns for businesses by targeting the very tools employees rely on every day—web browsers like Chrome, Edge, and Firefox. This threat is designed to quietly extract stored credentials, session cookies, and authentication data directly from the browser, giving attackers access to accounts without needing to “hack” passwords in the traditional sense. Because modern browsers often store login sessions and autofill c
Nik Lipor
7 days ago1 min read


Fortinet Critical Vulnerability: API authentication and authorization bypass
A critical vulnerability has been identified in Fortinet security appliances that could allow attackers to gain unauthorized access to systems without proper authentication. In certain configurations, this flaw can be exploited to bypass login protections, effectively allowing a threat actor to impersonate a legitimate user or gain access without valid credentials. Because these devices are typically deployed at the edge of a network—protecting internet traffic, VPN access, a
Nik Lipor
Apr 51 min read


The Rise of Automated Credential Theft
A newly observed cyberattack campaign is highlighting just how quickly modern vulnerabilities can be weaponized at scale. Attackers are exploiting a critical flaw in widely used web applications to gain unauthorized access to systems, allowing them to execute commands remotely and extract sensitive data. What makes this especially dangerous is how simple the initial attack can be—requiring only a specially crafted request to gain entry into vulnerable environments. Once insid
Nik Lipor
Apr 51 min read


FortiGate Firewalls Being Used as Entry Points for Cyber Attacks
Cybersecurity researchers are warning that attackers are actively targeting Fortinet FortiGate firewall devices as a way to break into corporate networks. In recent incidents, threat actors exploited vulnerabilities or weakly secured devices to gain access and extract sensitive configuration files directly from the firewall. These configuration files often contain valuable information such as network topology and service account credentials, which can give attackers insight i
Nik Lipor
Mar 102 min read


Blog Post: Apple Devices Targeted by Actively Exploited Vulnerabilities
Security officials are warning organizations and individuals about several vulnerabilities affecting Apple devices, including macOS, iOS, and iPadOS, that are currently being exploited in real-world cyberattacks. The vulnerabilities were recently added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities catalog, signaling that attackers are actively leveraging these flaws against targets. When vulnerabilities reach this list, it ty
Nik Lipor
Mar 91 min read


Critical Cisco Network Vulnerability: What Business Owners Should Know
A serious cybersecurity vulnerability has recently been discovered in widely used Cisco networking equipment that many businesses rely on to connect offices, employees, and cloud services. Security experts have warned that this flaw could allow attackers to break into affected systems without needing valid login credentials. Once inside, a hacker could potentially gain high-level control over the device, which sits at the heart of many business networks. Because these systems
Nik Lipor
Mar 42 min read


Urgent Alert: Google Rolls Out Emergency Patch for Chrome Vulnerability
In a critical move to safeguard users, Google has released an emergency update for its Chrome browser, targeting a serious zero-day vulnerability that's already under active exploitation. Identified as CVE-2026-2441, this flaw involves a use-after-free memory issue within the browser's Cascading Style Sheets functionality. As the first such zero-day reported in 2026, it poses a significant threat by potentially allowing attackers to crash the browser or corrupt data. The vuln
Nik Lipor
Feb 192 min read


Critical Windows Update Issues Are Causing Crashes and Boot Failures
A recent Windows security update released in late January has introduced serious stability problems for a number of Windows 11 systems, raising concerns across the business and IT community. While the update was intended to improve security and system reliability, many organizations have reported that it is instead triggering system crashes, black screens, and in some cases complete boot failures that prevent computers from starting at all. One of the most severe issues being
Nik Lipor
Jan 292 min read


How Hackers Are Turning Cyber Security Against You
Every day it feels like the world changes and businesses can barely keep up with protecting themselves. The biggest threats aren’t always coming from new malware strains or stealthy phishing campaigns — they’re also coming from trusted security software itself. A recent wave of cyberattacks has shown how threat actors are weaponizing legitimate security tools to disable endpoint defenses like antivirus and EDR (Endpoint Detection and Response) before launching destructive at
Nik Lipor
Jan 263 min read


Windows Update Breaks Outlook
If you’ve recently installed the latest Windows 11 update and found Microsoft Outlook behaving badly — freezing, crashing, or refusing to reopen — you’re not alone. A recent security update for Windows 11 has introduced a serious compatibility problem with the classic Outlook desktop client that’s affecting many users, especially those with POP-configured accounts or data files stored in cloud folders like OneDrive or Dropbox. What the Problem Looks Like After applying the mo
Nik Lipor
Jan 263 min read


New FortiOS Vulnerability
Fortinet recently disclosed a critical security vulnerability affecting FortiOS (used on FortiGate firewalls and related Fortinet platforms) as well as FortiSwitchManager. The issue is described as a heap-based buffer overflow within the cw_acd daemon, and the risk is severe because it can allow a remote attacker to execute arbitrary code or commands. Most concerning: the attack can be performed without authentication, meaning an exposed system could potentially be compromise
Nik Lipor
Jan 142 min read


Silent Threats in Your Browser: How Malicious Extensions Infected Millions
Browser extensions are incredibly useful tools. They can add features like productivity boosters, video helpers, new tab widgets, and more directly to your browser. But what many people don’t realize is that this convenience can come with serious hidden risks. Recently, a massive malware campaign was uncovered that highlights just how vulnerable browser extensions can be—and how quietly a threat can operate. A Long-Running Malware Operation Over a span of more than seven year
Nik Lipor
Jan 73 min read


Act Now: Why That 24-Hour Upgrade Window from Microsoft Matters for Your Business
If your business is still running Windows 10, you’re now facing a critical decision point. Microsoft ended support for Windows 10 October 14, 2025 . After that date, Windows 10 devices no longer received security updates, feature updates, or technical support—leaving them at elevated risk. But here’s the twist: Microsoft is offering an extension via the “Extended Security Updates” (ESU) program—effectively giving you extra time to secure your systems. The catch? You need to
Nik Lipor
Nov 10, 20253 min read


Urgent Warning for Businesses: BitLocker Recovery Triggered After Recent Windows Update
If your organization is running Windows 11 (versions 24H2 or 25H2) or even Windows 10 22H2 (you should not be running Windows 10 unless you have paid for extended security updates), there’s a serious issue you need to know about: a recent update has been confirmed to trigger the BitLocker recovery screen unexpectedly on affected machines. What’s happening? After installing the October 2025 update (and subsequent patches) on certain devices, users may be prompted to enter the
Nik Lipor
Nov 6, 20253 min read


Urgent Security Alert: Patch Your Windows Servers and PCs Now to Stop Active Exploits
Right now, a critical flaw in Microsoft's Windows ecosystem is being actively exploited by attackers, putting countless systems at risk. If you're running Windows Server, Windows 10, or Windows 11, this is your wake-up call: apply those security updates immediately. Delaying could mean handing over the keys to your network on a silver platter. The Hidden Danger in Your Network Backbone At the heart of this crisis is a high-severity vulnerability that allows attackers with aut
Nik Lipor
Oct 21, 20253 min read


A New Firewall Threat That Could Put Small Businesses at Risk
Your firewall is supposed to be your first line of defense—the device that blocks hackers from breaking into your network. But right now,...
Nik Lipor
Sep 30, 20252 min read


Hackers Use Defender To Disable Security Software
We’ve observed an unsettling shift in the threat landscape: attackers are now weaponizing Windows Defender Application Control (WDAC)...
Nik Lipor
Sep 2, 20252 min read


Protecting Our Seniors: The Rising Threat of the Phantom Hacker Scam
As technology advances, so do the tactics of cybercriminals, and our seniors are increasingly in the crosshairs of a devastating scam...
Nik Lipor
Aug 25, 20253 min read


Gmail Phishing Attack Steals Credentials
Hacker using phishing technique to steam gmail credentials A sophisticated phishing campaign targeting Gmail users has emerged,...
Nik Lipor
Aug 20, 20251 min read


FortiNet Exploit Bypasses Security
FortiNet exploit allows hackers to gain full control A critical security flaw, CVE-2024-26009, has been identified in several Fortinet...
Nik Lipor
Aug 15, 20251 min read
Address
2310 S. Green Bay Rd
Suite C #281
Racine, WI 53406
bottom of page
