top of page
Untitled design.png

Weekly INK

Each week we compile an advisory on the latest threats, trends and newsworthy topics from the cyber security industry affecting small and medium enterprises. Join our subscribers below and help us prevent cybersecurity breaches.

watermark4.png

Issue #176 - November 17, 2025

Critical Fortinet FortiWeb WAF Bug Exploited in the Wild

Source: Dark Reading

A newly disclosed FortiWeb flaw lets attackers run admin-level commands on unpatched web application firewalls. For SMBs that rely on WAFs to protect websites and portals, this is a patch-now event: exposed devices can be taken over pre-login, leading to data theft, website defacement, or downtime.




Kraken Uses Benchmarking to Enhance Ransomware Attacks

Source: Infosecurity Magazine

A new “Kraken” ransomware variant times how fast your systems encrypt, then tunes its attack for maximum damage and minimum detection. The takeaway for businesses: rapid detection and offline, tested backups are vital, and older hardware or under-resourced endpoints can be targeted for faster, more destructive hits.




Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Source: The Hacker News

Google patched a Chrome engine bug already used in the wild. Because most users run Chrome or a Chromium-based browser, this is broad risk. Urge employees to update browsers immediately and restart them. Managed environments should enforce automatic updates and consider blocking outdated versions.




SolarWinds Patches Three Critical Serv-U Vulnerabilities

Source: SecurityWeek

SolarWinds fixed multiple critical issues in its Serv-U file transfer software that could lead to remote code execution. If you use Serv-U for vendor or client file exchanges, prioritize upgrades and review logs for unusual access—exposed file servers are common entry points for data theft and ransomware.




Feds, AHA Warn Health Sector of Evolving Akira Threat, Again

Source: Data Breach Today

Authorities renewed warnings about the Akira ransomware group, noting ongoing adaptation and healthcare targeting. Even non-health SMBs should heed the message: Akira’s tactics—VPN exploitation, data theft before encryption, and pressure on partners—cross industries. Tighten MFA, patch remote access, and verify backups can restore quickly.




 
 

Help us Prevent Breaches.

We will never share or sell your information. Unsubscribe at any time.

Email: *

Received.

bottom of page