- Exzec Cyber Newsletter
- Posts
- Insurance Hacked, Gateways Open, and AI Knows Too Much
Insurance Hacked, Gateways Open, and AI Knows Too Much
Aflac falls to voice phishing, Citrix rushes a patch, and Copilot shares what it shouldn’t.
⏱️ ≈ 6‑minute read
🧠 CyberFact of the Day:
In a recent Microsoft report, 92% of password-based attacks succeeded due to password reuse across accounts.

📬 This Week’s Clickables
📌 Big News – Aflac insurer breach & Citrix being exploited…..surprise, surprise.
🚨 Can’t Miss – Chrome backdoor, Iranian hack warnings, camera espionage, job scam
🤖 AI in Cyber – AI pentesters, Copilot leak, token jailbreak, and insider threats
🧪 Strange Cyber Story – The dreaded boarding-pass tweet
🚨 Big Stories This Week
🕷️ Aflac Hit in Scattered Spider Social-Engineering Breach
The Intro: U.S. insurer Aflac became the latest victim of Scattered Spider’s phone-based scam.
What Happened: The cybercriminal group used tech support impersonation calls to trick employees, stealing SSNs, health data, and policy details. The breach, discovered June 12, halted within hours—but potentially affected tens of thousands.
Why It’s Important: This attack shows phone scams remain a potent threat even in highly regulated industries like insurance.
The Other Side: Aflac said operations resumed quickly, and no ransomware was deployed—yet data compromises still occurred.
The Takeaway: Help‑desk foolproofing is overdue—use caller‑ID verification, staff drills, and strict onboarding protocols.
TL;DR: Voice-based scams still work—even on $55 B insurers.
More Reading:
🦺 Citrix Issues Emergency Patch for Actively Exploited NetScaler Zero-Day
The Intro: A wild zero-day attack just forced Citrix to drop an emergency fix—time to scramble your patches.
What happened: Citrix released a patch for CVE‑2025‑6543, a critical RCE with a CVSS 9.2, actively exploited against NetScaler ADC/Gateway devices used for VPN and remote access.
Why it’s important: NetScaler appliances are on the frontlines of enterprise connectivity—this bug could let attackers in without phishing.
The other side:Citrix says they’ve got limited details on exploitation, but mitigation must be fast—and segmentation urgent—for vulnerable legacy appliances.
The takeaway: Patch NetScaler devices on day zero and consider isolating unpatched units until upgrades are complete.
TL;DR: A hardcore zero-day hit VPN gateways—get your patches and segmentation ready.
Related reads:
🔥 Can’t Miss This Week
🛠️ Chrome Zero-Day CVE-2025-2783 exploited by TaxOff – A sandbox escape zero-day delivered the Trinper backdoor via phishing. Takeaway: Roll out the Chrome update now—don’t make users chase it.
🌐 DHS Warns Iranian Hacktivists Likely to Escalate Cyber Attacks – Alert after regional tensions spark low-level cyber disruption . Takeaway: Strengthen segmentation for public-facing services.
🎥 Israel: Iranian Hackers Breach IoT Cameras – Smart surveillance gear snooped on Israeli citizens to target locations. Takeaway: IoT devices are now de facto espionage tools—segment them separately.
💼 Fake Job Scams Targeting Applicants Surge – Fraudulent offers tricking job seekers into wire transfers . Takeaway: Educate job applicants—verify offers via official HR channels.
🤖 AI in Cyber
🧠 AI‑Powered Pentesters Uncover 17 Unseen Bugs
Automated agents found 15 zero‑days across 188 open-source projects—showcasing AI’s scale in offensive testing. Takeaway: Integrate AI adversarial testing into code pipelines; build proactive purple teams.🔓 EchoLeak: Zero‑Click Copilot Data Exposure
Copilot inadvertently leaked internal text in response to crafted prompts—patched, but your RAG guardrails need review. Takeaway: Evaluate and monitor AI-generated responses to avoid leakage.🧩 TokenBreak: One‑Character LLM Jailbreak
Researchers bypassed guardrails using single-character prompt tweaks—prompt hygiene is your new firewall. Takeaway: Automate input sanitization and adversarial injections before AI rollout.📈 IBM: Generative AI Widens Insider Threat Attack Surface
IBM warns that unsanctioned use of LLMs can magnify insider risk—employees pasting secrets into ChatGPT or Copilot could leak proprietary data.
Takeaway: Enforce AI usage policies, implement LLM access controls, and monitor logs to secure organizational AI use.
🧟♂️ Strange Cyber Story of the Week
🧑✈️ Old But Gold: The Boarding‑Pass Barcode Hack (2015)
The Intro: Sometimes a simple picture shares more than intended.
What Happened: A German security researcher tweeted a boarding pass—adversaries read its barcode live, accessed his frequent-flyer account, and proved that a casual travel selfie can leak identifying data.
Why It’s Important: Camera metadata and embedded QR/barcode info can expose travel history, booking status, and account access.
The Other Side: We often think we’re washing privacy—but metadata travels everywhere with our pictures.
The Takeaway: Blur or redact travel docs before sharing—and teach users the metadata risk basics.
TL;DR: A boarding pass selfie turned into a digital backdoor—proof that today’s photo can be tomorrow’s hack.
More Reading:
Thanks for reading this week’s edition. Like what you see? Forward it!
Hate everything you see or have other feedback? Reply back to this email!