Chicago IT Support & Cyber Security | Forward Technologies

Chicago-based Forward Technologies delivers IT support and cyber security to businesses in the Chicago area and nationwide.

  • Home
  • Services
    • Outsourced IT Support
    • DMARC Email Security
    • Development
      • Web Development & Facelifts
      • CustomView: Plugin for WordPress
    • Data Recovery Service
    • PPC Marketing Services
    • SEO Services
  • Email Security
    • SPF Basics
    • DKIM Basics
    • DMARC Basics
    • Email Security Consulting
  • Data Recovery Service
  • Blog
  • Contact Us

12 Rogue Certificates for Cloudflare’s DNS Raise Global Security Alarm

September 6, 2025 by Edward Silha

Cartoon-style illustration of a giant padlock labeled “1.1.1.1 DNS” with broken certificate chains, symbolizing compromised trustOn Wednesday, researchers uncovered three improperly issued TLS certificates for Cloudflare’s 1.1.1.1 DNS service, encrypted DNS lookup used by millions. The concern was clear: anyone with those credentials could impersonate Cloudflare’s resolver, decrypt user traffic, or redirect queries to malicious sites.

Further investigation revealed the breach was worse than initially thought. Cloudflare confirmed that Fina CA—a Microsoft‑trusted certificate authority, had in fact issued a total of twelve unauthorized certificates for 1.1.1.1 since February 2024. [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: 1.1.1.1, CA accountability, certificate authority, certificate mis-issuance, Certificate Transparency, Cloudflare, DNS over HTTPS, DNS over TLS, DNS security, encryption, Fina CA, internet trust, Microsoft root store, Microsoft trust, PKI, TLS certificates, TLS mis-issuance, web security

Malicious CAPTCHA Redirects Turn WordPress Sites into Malware Launchpads

August 28, 2025 by Edward Silha

A sinister campaign known as ShadowCaptcha is using over 100 compromised WordPress sites as unwitting hosts, redirecting visitors to fake CAPTCHA pages. These deceptive pages trigger malware delivery ranging from credential stealers to ransomware and cryptocurrency miners.

Researchers from Israel’s National Digital Agency revealed that ShadowCaptcha merges social engineering with living-off-the-land tactics. Attackers aim to steal credentials, exfiltrate browser information, deploy cryptomining software, or trigger ransomware—depending on the route the victim takes. [Read more…]

Filed Under: Blog, Cybersecurity, WebDev Tagged With: browser exploit, ClickFix attack, compromised WordPress plugins, crypto miners, cybersecurity, cybersecurity news, fake CAPTCHA, Help TDS, HTA payload, info stealers, infostealer, JavaScript injection, malware campaigns, mshta.exe, phishing redirect, ransomware, ShadowCaptcha, web application firewall, WinRing0x64.sys, WooCommerce plugin threat, WooCommerce_inputs, WordPress security, XMRig

Federal Court Cyberattacks Are a National Security Crisis, Wyden Warns

August 25, 2025 by Edward Silha

Cartoon-style illustration of a courthouse with digital security lock overlay, representing federal court cybersecurity risks.Cyberattacks on U.S. federal courts are no longer just IT problems. They now pose a national security threat.

That is Senator Ron Wyden’s warning in a blunt letter to Chief Justice John Roberts this week, urging the Supreme Court to address repeated breaches of the judiciary’s document filing and email systems. Wyden called the hacks “unacceptable” and said weak practices have left the courts “an inviting target” for foreign adversaries. [Read more…]

Filed Under: Blog, Cybersecurity Tagged With: AI governance, AI risk management, APT29, CM/ECF, court breach, cybersecurity, data security, digital defenses, federal court cybersecurity, federal judiciary, hacking, identity-first security, multi‑factor authentication, national security, outdated IT infrastructure, oversight, PACER, PACER hack, post-quantum cryptography, quantum threats, Russian hackers, Senator Ron Wyden, sen‑ron‑wyden, shadow AI, supreme court, U.S. judiciary, zero trust, zero trust security

When Hidden AI Meets Quantum Doom: The New Enterprise Security Crossroads

August 14, 2025 by Edward Silha

Abstract graphic of AI code streams merging with digital locks, symbolizing AI governance and quantum-safe encryptionWhy Shadow AI Slips Past Security

Shadow AI is already inside. The tools sit in browsers and sidebars. Employees paste snippets of code, customer notes, even legal language into chatbots that were never vetted. The answers look helpful. The risk hides in the copy and paste. Data leaves the building without a ticket. Logs do not show it. Policies never saw it. By the time a leak becomes visible, the trail is cold.

IT leaders keep asking the same question. How do you govern what you cannot see? You start by naming it. Shadow AI covers any AI use that bypasses purchase, security review, or monitoring. That includes SaaS chat tools, browser extensions, model endpoints wired into internal scripts, and clever “personal assistants” someone installed on a work laptop. Each of those entry points can move sensitive information to third parties. Some keep prompts. Others store outputs. Many train on uploaded files. You cannot make a clean audit if you do not control any of that. [Read more…]

Filed Under: AI, Blog, Cybersecurity Tagged With: AI governance, AI risk management, data leakage, data security, harvest-now decrypt-later, hybrid key exchange, identity-first security, least privilege, MFA, post-quantum cryptography, PQC, quantum computing, quantum threats, shadow AI, SSO, TLS, zero trust

Hacked and Harassed: When Debt Collectors Buy Your Stolen Digital Life

July 21, 2025 by Edward Silha

Digital profile data being handed to a suited figure with shadowy background and legal documents in handA startup called Farnsworth & Co. has found a niche in the dark overlap between surveillance, malware, and civil litigation. Their product? Personal data stolen from infected computers—now available for purchase by debt collectors, divorce lawyers, and anyone with a grudge and a budget.

The company’s entire business hinges on access to data siphoned off by infostealer malware. This kind of software quietly grabs login credentials, browsing histories, cookies, emails, and contact lists from unsuspecting users. It then bundles the stolen data into searchable profiles. Farnsworth, for its part, packages this information and sells it as “intelligence services.” [Read more…]

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: cybercrime, data breach, data brokers, digital profiling, Farnsworth & Co., infostealer, malware data, privacy invasion

  • 1
  • 2
  • 3
  • 4
  • Next Page »

Social Media

  • Facebook
  • GitHub
  • LinkedIn
  • Periscope
  • Twitter

Forward Technologies
747 N LaSalle
STE 500B
Chicago, IL 60654
(312) 715-7806

Copyright © 2025 — Forward Technologies • All rights reserved. • Privacy Policy •