Sometimes the simplest checks prevent the biggest headaches. Between building, testing, and helping others troubleshoot, I’ve learned that a few proactive minutes can save hours of reactive cleanup later. That’s what Pinpoint Security is all about! Helping others become more proactive in the cybersecurity fight.

🔒 Security Tip of the Week

Run a quick audit for unused service accounts or automation tokens in your environment. If they haven’t been used in 30–60 days, disable or rotate them. Attackers love stale credentials—they’re easy to miss, hard to trace, and often have more permissions than anyone remembers. Whether you’re fine-tuning a policy, spinning up a lab, or printing your next prototype at home, stay curious and keep your defenses sharp.

And of course, if you need any assistance with any of the above or want a complete
assessment done, contact Pinpoint Security today to learn how we can help!

–Chris Ogles

 

📰 Weekly News Roundup:

Here are the top cybersecurity stories from the past 7 days, including major events, new vulnerabilities, and significant data breaches:

⚠️ CISA Flags Critical RCE Flaw in Adobe AEM Actively Exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in Adobe Experience Manager (AEM) Forms to its Known Exploited Vulnerabilities (KEV) catalog. The flaw allows for unauthenticated remote code execution (RCE), has a CVSS score of 10.0, and is being actively exploited in the wild, urging immediate patching.

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

 

📉 Red Hat Suffers Data Theft of 570GB from GitHub/GitLab Repositories

A cyber extortion group, The Crimson Collective, claimed to have stolen 570GB of compressed data from over 28,000 internal private repositories on Red Hat’s GitHub and GitLab systems. The leaked data allegedly includes Customer Engagement Reports (CERs) containing sensitive infrastructure and configuration details for large enterprise clients.

Red Hat Breach – 570GB Data Stolen

 

🤖 Report Finds AI-Powered Attacks Are Outpacing Current Defenses

A new industry report from CrowdStrike highlights that 76% of organizations struggle to match the speed and sophistication of AI-powered attacks. Key findings indicate that AI-automated attack chains are considered the greatest ransomware threat, with the average adversary breakout time drastically shrinking from 48 minutes to just 18 minutes in mid-2025.

CrowdStrike 2025 Ransomware Report: AI Attacks Are Outpacing Defenses

 

✉️ Microsoft Revokes 200+ Fake Certificates Used in Teams Phishing Attacks

Microsoft disclosed and took action against a campaign, attributed to the threat actor Vanilla Tempest, that used over 200 fraudulently signed certificates. The fake certificates were used to sign malicious Microsoft Teams setup files, distributed via SEO poisoning, to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware.

Microsoft Revokes 200+ Fake Certificates Used in Teams Malware Attack