RTS Header Image

Email not displaying correctly? View in Browser
View our current and past issues here.

You are receiving this weekly information because you are either a client of ResTech Solutions, we met at a networking event/group, interacted on social media, or you opted into receiving our emails.

It includes tech tips, resources, schedule updates, blog posts, and threat intel information.

If you no longer wish to receive this information, click Unsubscribe at the bottom of the page. "Marking Spam" will prevent others from getting this information.

Welcome to our weekly newsletter. Our goal with this newsletter is to bring you the latest information we have to share related to IT, cybersecurity, & business while reducing the number of emails we send.

2025 Week 38

UPCOMING SCHEDULE CHANGES

Below are upcoming changes to our regular schedule.

  • September 16 - 19: Staff will be at a conference and availability will be reduced. We will still be checking emails and responding to urgent issues.

UPCOMING EVENTS

Below are upcoming events we are hosting or sponsoring.

  • No upcoming events - Stay tuned for updates

CYBERSECURTIY TIP

Do You Process Credit Cards? READ THIS NOW
Use this simple checklist to make sure you're compliant.

If you handle, process, or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of LEGAL requirements you must abide by to maintain a secure environment. If you violate them, you will incur serious fines and fees.

Even if you don’t process many credit cards, you’re subject to these laws, and thinking you don’t process enough to matter or that “no one would care” is 100% wrong.

All it takes is an employee writing down a credit card number in an email for you to get caught and face penalties and fines.

Getting compliant – or finding out if you ARE compliant – isn’t a simple matter I can outline in a 1-2-3-step checklist. It requires an assessment of your specific environment and how you handle credit card information.

If you’d like our assistance, give us a call to review how you are processing, handling, and storing credit cards – the quick assessment is free to you!

Have questions about cybersecurity or some other IT-related issues? Access our calendar here https://rts.sh/dcdl to book a quick, 10-minute call.

RESOURCE

Downtime Is Expensive. This Event Shows How to Avoid It.

You can’t always predict a disaster or prevent disruptions, but you can keep them from turning into expensive chaos.

Join us for an insightful session, From Chaos to Continuity: Protecting Your Business Before Disaster Strikes, where we’ll break down the essentials of business continuity and disaster recovery (BCDR) and show you how to build a plan that works.

Here’s what you’ll learn:

  • The real risks of downtime and data loss

  • What a strong BCDR strategy should include (beyond just backups)

  • Common pitfalls that even experienced teams get wrong

  • How to turn disruption into a clear, confident recovery path

Where: Online (link provided after registration)

Register now!

Looking forward to seeing you there.

OUR LATEST BLOG POST

We're Busting the Biggest Cybersecurity Myths

When it comes to cybersecurity, bad advice is everywhere, and believing the wrong thing could cost you more than you think.

No, antivirus software alone won’t protect you. And no, being a “small business” doesn’t make you invisible to hackers.

We’re busting the top myths that are putting small businesses at serious risk and sharing what the truth actually looks like in today’s threat landscape.

Read the full post here.

Spoiler: Cybersecurity doesn’t have to be scary. But staying in the dark? That’s dangerous.

RECENT THREAT INTEL ALERTS

SAP Vulnerability Exploited in the Wild

A severe code injection vulnerability (CVE‑2025‑42957) in SAP S/4HANA is actively being exploited by attackers to breach exposed servers via a weak ABAP function, allowing low-privileged users to take full control. The vulnerability was patched in August, but many systems remain unpatched and at risk. Researchers confirmed that exploiting the flaw is straightforward because ABAP code can be reverse-engineered easily. Threats include data theft, manipulation, unauthorized account creation, privilege escalation, and deployment of ransomware or other malware. Administrators are urged to apply the August updates immediately, especially across multiple affected SAP modules, including on-premise and cloud editions.

Hackers Using AI Tools in Their Attacks

Attackers have begun leveraging HexStrike‑AI, an AI-powered offensive framework, to accelerate exploitation of newly disclosed Citrix NetScaler vulnerabilities. This tool automates the entire attack chain—from scanning for vulnerable devices to executing payloads and maintaining persistence. Despite being a legitimate red-team toolkit, its availability has enabled threat actors to weaponize Citrix flaws within hours of disclosure. Researchers report that thousands of NetScaler devices remain vulnerable, with rapid exploitation shrinking the available patching window for defenders. The rise of AI-driven attack automation underscores an increased urgency for rapid detection, threat intelligence, and adaptive defense strategies.

TP-Link Vulnerabilities Exploited in Attacks

A zero-day buffer overflow flaw has been discovered in TP-Link routers related to CWMP (CPE WAN Management Protocol), enabling remote code execution via oversized SOAP payloads. Although TP-Link has developed a patch for European models, firmware updates for US and other regions are still pending. CISA has also flagged additional exploited TP-Link vulnerabilities that attackers are chaining to compromise devices. Until patches are available, users should change default passwords, disable CWMP if not in use, and isolate routers from critical networks. The issue highlights the ongoing risk of router-targeted attacks stemming from unpatched firmware and exposed devices.

Browser-Based Attacks to Look Out for in 2025

The browser continues to be the primary attack vector as enterprise applications and data increasingly reside in the cloud. Modern threats include multi-channel phishing, session hijacking via proxy kits, and sophisticated obfuscation methods that defeat traditional email and network defenses. Attackers now deliver payloads through varied channels like IM apps, in-app messaging, ads, and SMS, often bypassing email filters entirely. These threats exploit weaknesses in browser visibility—without real-time page analysis, organizations can't detect or block advanced phishing or exploit delivery. Security teams must focus on enhancing browser-level detection, real-time visibility, and adaptive response mechanisms to stay ahead of evolving threats.

Cloudflare Protects Against Largest Ever DDoS Attack

Cloudflare successfully mitigated the largest DDoS attack in history, peaking at an astonishing 11.5 terabits per second and lasting just 35 seconds, without any service disruption. The attack—originating from a mix of misused cloud infrastructure and compromised IoT devices—was absorbed entirely by Cloudflare's defense systems. This incident follows previous ultra-high-volume attacks, signaling a sustained escalation in DDoS capabilities. While such mammoth bandwidths grab headlines, experts stress that resilience depends less on size and more on continuous protection, multi-vector handling, and customer uptime. The feat showcases the importance of scalable, automated defense systems in preserving digital service availability.

Bridgestone Confirms Cyberattack Affecting Manufacturing

Bridgestone Americas has confirmed a cyberattack at select North American manufacturing facilities, triggering investigations and response efforts. Company officials believe the incident was contained early, preventing customer data exposure and deep network infiltration. Though the root cause is not yet disclosed, operations in South Carolina and Quebec were reportedly impacted. Bridgestone emphasized ongoing efforts to maintain supply continuity and protect interfaces throughout the incident response. No ransomware group has claimed responsibility, but the event highlights the vital need for robust cyber resiliency in manufacturing.

YOUR BUSINESS DESERVES RELIABLE IT

Connect with ResTech today.

BOOK YOUR COMPLEMENTARY CONSULTATION

Thank you,
David

ResTech Solutions

David Levine, MBA
Founder & CEO
ResTech Solutions, LLC

ResTech Blocks the Hacks to Prevent the Attacks! - We are Your Technology Lifesaver

Phone: (713) 936-6855
Toll-Free: (866) 673-7832
Email: [email protected]
Website: https://restech.solutions 

RTS Facebook Page
RTS LinkedIn Page
RTS YouTube Channel

Copyright ©️ 2025 ResTech Solutions, All rights reserved.