I Like iOS 26’s New Back Gesture Better Than Android’s (When It Works)

Unlike Android, the iPhone has never had a physical back button. You need some way to go back to the previous page in various apps, and rather than a button, Apple found a decent solution in the back gesture. It requires you to swipe from the left edge of the iPhone’s screen towards the right, and while it doesn’t work in all apps, most have adopted it. As good as this gesture is, it can be hard to reach for right-handed people (especially on large iPhones) since it requires you to extend your thumb all the way to the left. iOS 26 makes this a lot easier.

Once you start using iOS 26, you’ll notice that the back gesture has changed. You can swipe right from pretty much anywhere on the screen to go back. This feels much more intuitive than swiping from the left edge. I tried this in a bunch of Apple’s own apps, including Mail, Podcasts, and Settings, and it works quite well in all cases. One notable holdout is Safari, which retains the old back gesture. That’s understandable: Safari lets you go back a page if you swipe right from the left edge, and it also lets you go forward a page by swiping towards the left from the right edge of the screen.

Back gestures on iOS 26 vs. Android

In some ways, iOS 26’s back gesture is better than Android’s back gesture. While Android OS lets you swipe from either edge of your phone’s screen to go back—assuming gesture-based navigation is enabled on your phone—the iOS 26 back gesture is easier to remember: swipe right to go back, no matter which part of the screen you’re on. This gesture has already become a part of my daily routine on my iPhone 12 Pro Max, where reaching the opposite edge of the screen is a task and a half. 

That said, I do get frustrated with the current implementation of this gesture because it doesn’t always work. When I open a chat in Messages, I still have to swipe right from the left edge. In other apps, sometimes you may encounter a conflicting gesture that may stop you from going back. For example, in Mail, you need to swipe over an empty part of the screen to go back. If you swipe over any of your emails, then you trigger Mail’s default right-swipe gesture, and it shows you the option to mark a mail read or to snooze the email.

It might be a matter of adapting to the various quirks of iOS, but it’s also worth keeping in mind that iOS 26 is still in its first developer beta, so some rough edges are to be expected. I’m quite excited to see how it gets polished through the beta cycle, and most importantly, how well third-party apps use the gesture to their advantage.

Brewers pitcher Aaron Civale requests trade after getting bumped from rotation

The Milwaukee Brewers called up top prospect Jacob Misiorowski on Tuesday. The 6-foot-7 flamethrower is bumping veteran right-handed pitcher Aaron Civale out of the rotation, and Civale reportedly wants to be traded rather than pitch in relief for the Brewers.

Civale, 30, has asked Milwaukee for a trade, The Athletic reported Thursday.

After the Brewers told Civale that he was headed to the bullpen, Civale’s agent, Jack Toffey, went to Milwaukee general manager Matt Arnold.

“The conversation was very professional,” Toffey said Thursday, via The Athletic. “I just very respectfully said that Aaron would really like an opportunity to continue his career as a starter. He’s going to be a free agent at the end of the year.”

Toffey relayed to The Athletic that Arnold informed him that the team is “exploring options.”

Although Civale made a relief appearance in Game 1 of last year’s wild-card series against the New York Mets, he has started all 122 regular-season games he has played in during his seven-year MLB career.

“Aaron is not angry or banging his fist on the table,” Toffey told The Athletic. “But it’s a little confusing because he did not pitch his way out of the rotation whatsoever.

“It’s more of a subjective choice the organization is making.”

Civale strained his left hamstring in his first appearance this season, but he has logged a 3.32 ERA across the four starts he has made since returning May 22.

The Brewers, currently third in the NL Central, traded for Civale last July. In exchange, the Tampa Bay Rays received minor-league infielder Gregory Barrios. Civale enjoyed a smooth transition back to the Midwest, where he had started his MLB career with the Cleveland Guardians. He went 6-3 with a 3.53 ERA in 14 starts with Milwaukee in the second half.

Civale is earning $8 million this season, tied with Freddy Peralta for the highest salary among Brewers pitchers, according to The Athletic.

Civale will be replaced in the rotation by Misiorowski, who is equipped with a fastball that has a 103 mph ceiling. The 23-year-old quickly climbed the ranks of the Brewers’ minor-league system after being drafted in the second round of the 2022 MLB Draft.

In 63 1/3 innings with the Brewers’ Triple-A affiliate this year, Misiorowski posted a 2.13 ERA and 80 strikeouts.

Fantasy Baseball Weekend Streamers: Dormant Orioles offense in great spot this weekend vs. Angels

This is a difficult weekend to stream hitters, as there are more teams with tough hitting matchups than favorable ones. The one piece of good news is that there is an unusual amount of left-handed starters on the docket this weekend, which opens the door to grabbing some players who excel against southpaws. Things look much brighter on the pitching side, as there are many starters who could help put fantasy baseball teams over the top in head-to-head leagues.

Marlins @ Nationals: Although Marlins hitters may have a tough time against MacKenzie Gore on Sunday, they will face starters in Mitchell Parker and Trevor Williams on Friday and Saturday with ERAs of 4.44 and 5.91, respectively. And throughout the series, Miami has the potential to do damage late in games against a bullpen with a 5.77 ERA. Otto Lopez (9%) and Agustín Ramírez (34%) should hit third and fourth, respectively, which makes both players appealing in all formats. Eric Wagaman (3%) is someone to consider in deeper leagues, as is Connor Norby (11%).

Orioles vs. Angels: Baltimore has struggled offensively at times this year but could have a great weekend against an uninspiring trio of starters and a bullpen with a 5.54 ERA. With two Los Angeles starters throwing from the left side, Ramon Laureano (1%) is a terrific player to add. Managers in deep leagues may want to add Ramón Urías (1%), who hits fifth in the lineup against southpaws.

[Smarter waivers, better trades, optimized lineups — Yahoo Fantasy Plus unlocks it all]

Royals vs. Athletics: The Royals should score a few runs against each of three mediocre starters this weekend before feasting on a bullpen that ranks last in baseball with a 6.04 ERA. The Athletics are starting two lefties, which makes right-handed leadoff man Jonathan India (38%) an excellent fit.

Brewers vs. Cardinals: The Brewers should enjoy spending the weekend at their hitter-friendly home park, and they have plenty of offensive potential against three right-handed starters who would be best described as serviceable. The bottom half of the Brewers lineup is widely available, including Rhys Hoskins (43%), Sal Frelick (25%) and Caleb Durbin (4%).

Braves vs. Rockies: Atlanta’s disappointing offense could enjoy three days of crooked numbers when they face a beleaguered Rockies staff that has a 5.61 ERA. Alex Verdugo (1%) should start the initial two games of the series. Those who have benched Michael Harris II in mixed leagues should ensure that he returns to the active lineup.

Red Sox vs. Yankees: New York will start lefties in all three games this weekend, and two of their starters (Carlos Rodón, Max Fried) are having excellent seasons. Lefty leadoff man Jarren Duran has struggled against same-sided hurlers this season. And there are a pair of rookies who bat from the left side, Roman Anthony and Marcelo Mayer.

Blue Jays @ Phillies: Toronto will face three starters with an ERA of 3.10 or lower, and two of the three throw from the left side. Vladimir Guerrero Jr., George Springer and Alejandro Kirk are the three Blue Jays who can remain in most lineups.

Guardians @ Mariners: The Guardians will face effective right-handed starters on Friday and Saturday, and all of this weekend’s games are at Seattle’s pitcher-friendly venue. José Ramírez and Steven Kwan are the only Cleveland hitters who should remain in lineups.

Rays @ Mets: New York will feature three solid starters this weekend, which should be good enough to get the game to a bullpen that ranks second in baseball with a 2.86 ERA. Junior Caminero should remain active, and the right-handed nature of all three Mets starters makes Brandon Lowe, Jonathan Aranda and Josh Lowe worth consideration in 12-team leagues. Although these players may remain in lineups, they are unlikely to have a major impact.

I’m less excited about Faucher than the other pitchers whom I have recommended in this space during recent weeks, but I must admit that he has a good chance of earning a save this weekend. The Nats are starting subpar hurlers on Friday and Saturday, and Miami’s mediocre offense could be just good enough to build a narrow lead. Faucher has emerged as the Marlins’ closer, having picked up four saves since May 26.

The Twins will spend the weekend facing an Astros club that has allowed the second most steals of any team. Castro hasn’t been especially aggressive on the basepaths this season, but he has posted lofty steals totals in the past. And with four eligible positions, the heavily-used utilityman is easy to fit into a lineup. In deeper leagues, Harrison Bader (3%) is another good candidate to swipe a base.

In order, here are the best streamers for the weekend, with their start date and Yahoo roster rate in parentheses.

  • Bryce Elder vs. COL (Friday, 20%)

  • Michael Wacha vs. ATH (Friday, 52)

  • Shane Smith @ TEX (Sunday, 33)

  • Cade Horton vs. PIT (Friday, 25)

  • Tomoyuki Sugano vs. LAA (Saturday, 35)

  • Nick Martinez @ DET (Friday, 33)

  • Chris Paddack @ HOU (Friday, 30)

  • Colin Rea vs. PIT (Sunday, 15)

  • Luis Ortiz @ SEA (Sunday, 27)

  • Noah Cameron vs. ATH (Sunday, 48)

  • Luis Severino @ KC (Friday, 24)

  • Jeffrey Springs @ KC (Sunday, 30)

  • Michael Lorenzen vs. ATH (Saturday, 12)

  • Tyler Anderson @ BAL (Saturday, 16)

AVEVA PI Web API

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 4.5
  • ATTENTION: Exploitable remotely
  • Vendor: AVEVA
  • Equipment: PI Web API
  • Vulnerability: Cross-site Scripting

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to disable content security policy protections.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of AVEVA PI Web API are affected:

  • PI Web API: Versions 2023 SP1 and prior

3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (‘CROSS-SITE SCRIPTING’) CWE-79

A cross-site scripting vulnerability exists in PI Web API version 2023 SP1 and prior that, if exploited, could allow an authenticated attacker (with privileges to create/update annotations or upload media files) to persist arbitrary JavaScript code that will be executed by users who were socially engineered to disable content security policy protections while rendering annotation attachments from within a web browser.

CVE-2025-2745 has been assigned to this vulnerability. A CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N).

A CVSS v4 score has also been calculated for CVE-2025-2745. A base score of 4.5 has been calculated; the CVSS vector string is (CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: United Kingdom

3.4 RESEARCHER

AVEVA Ethical Disclosure reported this vulnerability to CISA.

4. MITIGATIONS

AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected product versions should apply security updates to mitigate the risk of exploit.

From OSISoft Customer Portal, search for “PI Web API” and select version 2023 SP1 Patch 1 or higher.

AVEVA further recommends users follow general defensive measures:

  • Review and update the file extensions allowlist for annotation attachments to remove potentially vulnerable of undesired file types (ex: svg, pdf, …).
  • Consider implementing IT policies that would prevent users from subverting/disabling content security policy browser protections.
  • Inform PI Web API users that annotation attachments should be retrieved through direct REST requests to PI Web API rather than rendering them in the browser interface.
  • Audit assigned privileges to ensure that only trusted users are given “Annotate” access rights.

For additional information please refer to AVEVA-2025-003.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability has a high attack complexity.

5. UPDATE HISTORY

  • June 12, 2025: Initial Publication

Siemens Tecnomatix Plant Simulation

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services | Siemens Global).

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 7.3
  • ATTENTION: Low attack complexity
  • Vendor: Siemens
  • Equipment: Tecnomatix Plant Simulation
  • Vulnerability: Out-of-bounds Read

2. RISK EVALUATION

Successful exploitation of this vulnerability could allow an attacker to execute code in the context of the current process.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

Siemens reports that the following products are affected:

  • Tecnomatix Plant Simulation V2404: All versions prior to V2404.0013

3.2 VULNERABILITY OVERVIEW

3.2.1 OUT-OF-BOUNDS READ CWE-125

The affected applications contain an out-of-bounds read past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process.

CVE-2025-32454 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2025-32454. A base score of 7.3 has been calculated; the CVSS vector string is (AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.3 BACKGROUND

  • CRITICAL INFRASTRUCTURE SECTORS: Critical Manufacturing
  • COUNTRIES/AREAS DEPLOYED: Worldwide
  • COMPANY HEADQUARTERS LOCATION: Germany

3.4 RESEARCHER

Michael Heinzl reported this vulnerability to Siemens. Siemens reported this vulnerability to CISA.

4. MITIGATIONS

Siemens has identified the following specific workarounds and mitigations users can apply to reduce risk:

  • Tecnomatix Plant Simulation V2404: Do not open untrusted WRL files in affected applications
  • Tecnomatix Plant Simulation V2404: Update to V2404.0013 or later version

As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens’ operational guidelines for industrial security and following recommendations in the product manuals.

Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage

For more information see the associated Siemens security advisory SSA-486186 in HTML and CSAF.

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

  • Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.
  • Locate control system networks and remote devices behind firewalls and isolating them from business networks.
  • When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B–Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely.

5. UPDATE HISTORY

  • June 12, 2025: Initial Publication

Ransomware Actors Exploit Unpatched SimpleHelp Remote Monitoring and Management to Compromise Utility Billing Software Provider

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) is releasing this advisory in response to ransomware actors leveraging unpatched instances of a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) to compromise customers of a utility billing software provider. This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp RMM since January 2025.

SimpleHelp versions 5.5.7 and earlier contain several vulnerabilities, including CVE-2024-57727—a path traversal vulnerability.1 Ransomware actors likely leveraged CVE-2024-57727 to access downstream customers’ unpatched SimpleHelp RMM for disruption of services in double extortion compromises.1 

CISA added CVE-2024-57727 to its Known Exploited Vulnerabilities (KEV) Catalog on Feb. 13, 2025.

CISA urges software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise or risk of compromise.

Download the PDF version of this report:

Mitigations

CISA recommends organizations implement the mitigations below to respond to emerging ransomware activity exploiting SimpleHelp software. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s CPGs webpage for more information on the CPGs, including additional recommended baseline protections. These mitigations apply to all critical infrastructure organizations.

Vulnerable Third-Party Vendors

If SimpleHelp is embedded or bundled in vendor-owned software or if a third-party service provider leverages SimpleHelp on a downstream customer’s network, then identify the SimpleHelp server version at the top of the file <file_path>/SimpleHelp/configuration/serverconfig.xml. If version 5.5.7 or prior is found or has been used since January 2025, third-party vendors should:

  1. Isolate the SimpleHelp server instance from the internet or stop the server process.
  2. Upgrade immediately to the latest SimpleHelp version in accordance with SimpleHelp’s security vulnerability advisory.2
  3. Contact your downstream customers to direct them to take actions to secure their endpoints and undertake threat hunting actions on their network.

Vulnerable Downstream Customers and End Users

Determine if the system is running an unpatched version of SimpleHelp RMM either directly or embedded in third-party software.

SimpleHelp Endpoints

Determine if an endpoint is running the remote access (RAS) service by checking the following paths depending on the specific environment:

  • Windows: %APPDATA%JWrapper-Remote Access
  • Linux: /opt/JWrapper-Remote Access
  • MacOs: /Library/Application Support/JWrapper-Remote Access

If RAS installation is present and running, open the serviceconfig.xml file in <file_path>/JWrapper-Remote Access/JWAppsSharedConfig/ to determine if the registered service is vulnerable. The lines starting with <ConnectTo indicate the server addresses where the service is registered.

SimpleHelp Server

Determine the version of any SimpleHelp server by performing an HTTP query against it. Add /allversions (e.g., https://simple-help.com/allversions) to query the URL for the version page. This page will list the running version.

If an unpatched SimpleHelp version 5.5.7 or earlier is confirmed on a system, organizations should conduct threat hunting actions for evidence of compromise and continuously monitor for unusual inbound and outbound traffic from the SimpleHelp server. Note: This is not an exhaustive list of indicators of compromise.

  1.  Refer to SimpleHelp’s guidance to determine compromise and next steps.3
  2. Isolate the SimpleHelp server instance from the internet or stop the server process.
  3. Search for any suspicious or anomalous executables with three alphabetic letter filenames (e.g., aaa.exe, bbb.exe, etc.) with a creation time after January 2025. Additionally, perform host and network vulnerability security scans via reputable scanning services to verify malware is not on the system.
  4. Even if there is no evidence of compromise, users should immediately upgrade to the latest SimpleHelp version in accordance with SimpleHelp’s security vulnerabilities advisory.4

If your organization is unable to immediately identify and patch vulnerable versions of SimpleHelp, apply appropriate workarounds. In this circumstance, CISA recommends using other vendor-provided mitigations when available. These non-patching workarounds should not be considered permanent fixes and organizations should apply the appropriate patch as soon as it is made available.

Encrypted Downstream Customers and End Users

If a system has been encrypted by ransomware:

  1. Disconnect the affected system from the internet.
  2. Use clean installation media (e.g., a bootable USD drive or DVD) to reinstall the operating system. Ensure the installation media is free from malware.
  3. Wipe the system and only restore data from a clean backup. Ensure data files are obtained from a protected environment to avoid reintroducing ransomware to the system.

CISA urges you to promptly report ransomware incidents to a local FBI Field Office, FBI’s Internet Crime Compliant Center (IC3), and CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870).

Proactive Mitigations to Reduce Risk

To reduce opportunities for intrusion and to strengthen response to ransomware activity, CISA recommends customers of vendors and managed service providers (MSPs) implement the following best practices:

  • Maintain a robust asset inventory and hardware list [CPG 1.A].
  • Maintain a clean, offline backup of the system to ensure encryption will not occur once reverted. Conduct a daily system backup on a separate, offline device, such as a flash drive or external hard drive. Remove the device from the computer after backup is complete [CPG 2.R].
  • Do not expose remote services such as Remote Desktop Protocol (RDP) on the web. If these services must be exposed, apply appropriate compensating controls to prevent common forms of abuse and exploitation. Disable unnecessary OS applications and network protocols on internet-facing assets [CPG 2.W].
  • Conduct a risk analysis for RMM software on the network. If RMM is required, ask third-party vendors what security controls are in place.
  • Establish and maintain open communication channels with third-party vendors to stay informed about their patch management process.
  • For software vendors, consider integrating a Software Bill of Materials (SBOM) into products to reduce the amount of time for vulnerability remediation.
    • An SBOM is a formal record of components used to build software. SBOMs enhance supply chain risk management by quickly identifying and avoiding known vulnerabilities, identifying security requirements, and managing mitigations for vulnerabilities. For more information, see CISA’s SBOM page.

Resources

Reporting

Your organization has no obligation to respond or provide information back to FBI in response to this advisory. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

CISA and FBI do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472).

SimpleHelp users or vendors can contact support@simple-help.com for assistance with queries or concerns.

Disclaimer

The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favor by CISA.

Version History

June 12, 2025: Initial version.

Notes

1. Anthony Bradshaw, et. al., “DragonForce Actors Target SimpleHelp Vulnerabilities to Attack MSP, Customers,” Sophos News, May 27, 2025, https://news.sophos.com/en-us/2025/05/27/dragonforce-actors-target-simplehelp-vulnerabilities-to-attack-msp-customers/.
2. For instructions for upgrading to the latest version of SimpleHelp, see SimpleHelp’s security vulnerability advisory.
3. To determine possibility of compromise and next steps, see SimpleHelp’s guidance.
4. For instructions for upgrading to the latest version of SimpleHelp, see SimpleHelp’s security vulnerability advisory.

Twins’ Byron Buxton blasts 479-foot, upper-deck home run that’s 2nd-longest of MLB season

Byron Buxton does a lot of things well. Hitting home runs is one of them. 

The Minnesota Twins’ outfielder put his power on display Wednesday, launching one of the longest home runs of the MLB season in his team’s 6-2 victory over the Rangers.

With two men on and a 2-2 count, Buxton was offered a 90 mph slider from Texas starter Jack Leiter on the outside edge of the plate. Buxton turned on it and launched the ball deep over the left-center-field wall. 

Broadcast cameras lost track of the ball as it landed in the stands high above the outfield bullpen.

By the time it landed, Buxton’s blast had traveled an estimated 479 feet. The home run was second in distance this MLB season, behind only Mike Trout’s 484-foot blast for the Los Angeles Angels against the San Francisco Giants on April 19. 

Buxton’s blast eclipsed a headline-grabbing, 469-foot bomb from New York Yankees slugger Aaron Judge on Tuesday. And it turned a 2-0 Twins deficit into a 3-2 Twins lead that they wouldn’t relinquish.

Buxton is off to a strong start at the plate this season, with a .268/.327/.490 slash line entering Wednesday. His monstrous home run was his the 11th of the season in 51 games and pushed his RBI tally to 41.