Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Researchers have discovered a malware strain called 'fast16' that is believed to have targeted Iran's nuclear program before the well-known Stuxnet attack. This malware predates Stuxnet and indicates that cyber attacks on critical infrastructure may have been more advanced than previously thought. Fast16's potential use against Iran's nuclear facilities raises concerns about the cybersecurity of similar systems worldwide. Understanding this malware could provide insights into the tactics and techniques used by attackers in state-sponsored cyber operations, making it essential for governments and companies to enhance their defenses against such threats.

Impact: Iran's nuclear program and potentially other critical infrastructure systems.
Remediation: N/A
Read Original

A recently discovered vulnerability in Firefox, tracked as CVE-2026-6770, could allow attackers to fingerprint users of the Tor network. This issue primarily affects users who rely on Firefox and Tor for enhanced privacy and anonymity. Fingerprinting techniques can be used to track users across the internet, undermining the very purpose of using Tor, which is designed to protect user identities. The vulnerability has been addressed in the latest updates, specifically Firefox version 150 and Tor version 15.0.10, which users are strongly encouraged to install promptly. By patching this vulnerability, both Mozilla and the Tor Project aim to reinforce the security measures that protect user privacy online.

Impact: Firefox versions prior to 150, Tor versions prior to 15.0.10
Remediation: Users should update to Firefox version 150 and Tor version 15.0.10 to mitigate this vulnerability.
Read Original

A new group called BlackFile has emerged, focusing on vishing attacks specifically targeting the retail and hospitality sectors. Researchers have identified that this group uses voice phishing techniques to steal sensitive information from employees and customers. By impersonating trusted entities, attackers manipulate individuals into revealing personal data, which can lead to financial losses and data breaches. The rise of such tactics raises concerns for companies in these industries, as they must bolster their defenses against socially engineered attacks. Awareness and training for employees on recognizing vishing attempts are crucial to mitigate this threat.

Impact: Retail and hospitality sectors
Remediation: Companies should implement employee training programs on recognizing social engineering tactics and enhance their verification processes for sensitive information requests.
Read Original

Itron, a major utility company, reported a security breach after unauthorized access to its internal IT systems was detected on April 13, 2026. The company quickly activated its incident response plan and brought in external cybersecurity experts to address the situation. Authorities were also notified as part of the response process. While specific details about the extent of the breach or the data involved have not been disclosed, incidents like this can pose significant risks to utility services and customer data security. The breach raises concerns about the vulnerabilities within critical infrastructure sectors and the potential impact on services reliant on Itron's technology.

Impact: Itron's internal IT systems
Remediation: Activated incident response plan, engaged external cybersecurity experts, notified authorities
Read Original

Researchers have uncovered a telecommunications fraud scheme that tricks users with fake CAPTCHA prompts. This scam encourages unsuspecting individuals to send international text messages, which then result in hefty charges on their mobile bills. The perpetrators of this scheme profit by leasing the phone numbers used in these fraudulent messages. According to a report from Infoblox, this operation is part of a larger trend involving multiple campaigns, including 120 distinct Keitaro campaigns, which are primarily aimed at generating revenue through SMS and cryptocurrency fraud. This incident serves as a reminder for users to be cautious when interacting with unfamiliar verification processes and to monitor their mobile usage closely.

Impact: Mobile users, telecom services
Remediation: Users should verify the legitimacy of CAPTCHA requests and monitor their mobile bills for unexpected charges.
Read Original
Microsoft Entra Agent ID Flaw Enabled Tenant Takeover via Privilege Escalation

Hackread – Cybersecurity News, Data Breaches, AI and More

A flaw in Microsoft Entra's Agent ID allowed for privilege escalation, which could lead to a complete tenant takeover through the misuse of Service Principals. This vulnerability posed a significant risk to organizations using Microsoft Entra, as it could enable attackers to gain unauthorized access to sensitive data and systems. Microsoft has since released a patch to address this issue, ensuring that affected users can secure their environments. It is crucial for companies to apply this update promptly to mitigate potential risks and protect their assets from exploitation. Regular monitoring and security practices should also be reinforced to prevent similar vulnerabilities in the future.

Impact: Microsoft Entra, Service Principal
Remediation: Fully patched by Microsoft
Read Original

The latest Security Affairs Malware newsletter highlights several emerging cybersecurity threats. One notable mention is Morpheus, a new spyware linked to IPS Intelligence, which poses risks to user privacy and data security. Additionally, the newsletter discusses DarkSword and Coruna, which are targeting vulnerabilities in iPhones, suggesting that even this previously secure platform is now at risk. Another significant threat is the Lotus Wiper, aimed at the energy and utilities sector, indicating a growing trend of cyberattacks on critical infrastructure. Lastly, a new variant of NGate has been reported, showcasing the ever-evolving landscape of malware. These developments emphasize the need for companies and individuals to stay vigilant and update their security measures.

Impact: iPhone, energy and utilities sector, IPS Intelligence systems
Remediation: Users should ensure their devices are updated with the latest security patches and consider employing advanced security measures to detect and mitigate spyware and malware.
Read Original
Fake CAPTCHA Scam Abuses Verification Clicks to Send Costly International Texts

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent study by Infoblox has uncovered a widespread scam that exploits fake CAPTCHA prompts and manipulates users into sending expensive international text messages. This Click2SMS fraud scheme tricks victims into believing they are completing a verification process, only to find themselves unknowingly agreeing to send costly texts to foreign numbers. The scam primarily targets unsuspecting individuals who may not be aware of the potential charges associated with these messages. As a result, this scheme poses a financial risk to users who fall victim to it. Awareness and caution are essential for individuals navigating online services that require CAPTCHA verification.

Impact: Users tricked into sending international text messages
Remediation: Users should be cautious of unsolicited CAPTCHA requests and verify the legitimacy of the service before proceeding.
Read Original

Researchers at SentinelOne have discovered a previously unknown malware framework called 'fast16,' which dates back to 2005. This Lua-based malware was designed to target high-precision calculation software, which is often used in engineering and industrial applications. The malware predates the infamous Stuxnet worm, which was aimed at disrupting Iran's nuclear program. The implications of fast16 are significant as it shows that cyber sabotage efforts have been in play for much longer than previously thought, raising concerns about the security of critical infrastructure and industrial systems. Companies using this type of software need to be aware of the potential risks and take steps to protect their systems.

Impact: High-precision calculation software used in engineering and industrial applications.
Remediation: Companies should assess their systems for vulnerabilities related to high-precision calculation software and implement security measures to mitigate potential risks.
Read Original

Recent attacks involving malicious browser extensions called 'AiFrame' are targeting users by injecting iframes that display phishing content. These extensions are designed to extract sensitive information from users, posing a significant risk to their online security. The attacks can compromise personal data, making it essential for users to be cautious about the extensions they install. This situation highlights the vulnerability of browser ecosystems, where seemingly benign add-ons can turn out to be harmful. Users are advised to only download extensions from trusted sources and to regularly review the permissions granted to their installed extensions.

Impact: Browser extensions, specifically 'AiFrame' extensions
Remediation: Users should avoid installing extensions from unverified sources, regularly check and remove suspicious extensions, and maintain updated antivirus software.
Read Original

A vulnerability known as 'Pack2TheRoot,' tracked as CVE-2026-41651, has been identified in Linux systems, allowing local users to gain root privileges without authorization. This flaw has existed for nearly 12 years and has been rated with a high severity score of 8.8. It enables unprivileged users to install or remove system packages, which could lead to complete control over the system. This issue affects any Linux distribution that utilizes PackageKit, making it a significant concern for users and administrators alike. Given the potential for exploitation, it is crucial for affected parties to take immediate action to secure their systems.

Impact: Linux systems using PackageKit
Remediation: Users should update their systems and apply any available patches for PackageKit. It is also advisable to restrict access to system package management tools and review user permissions to mitigate the risk of unauthorized access.
Read Original

A new hacking group known as BlackFile has emerged, targeting retail and hospitality organizations since February 2026. This group is primarily focused on data theft and extortion, escalating the risk for businesses in these sectors. Researchers found that BlackFile's tactics include vishing attacks, where attackers use phone calls to manipulate victims into revealing sensitive information. The implications of this surge are significant, as it not only threatens the financial stability of affected companies but also jeopardizes customer data and trust. As organizations in retail and hospitality deal with these threats, they need to enhance their security measures and employee training to mitigate the risks associated with such attacks.

Impact: Retail and hospitality organizations
Remediation: Organizations should enhance security measures and employee training to combat vishing attacks.
Read Original

A newly discovered vulnerability known as Pack2TheRoot poses a significant risk to Linux systems by allowing local users to gain root access through the PackageKit daemon. This flaw enables unauthorized users to install or remove system packages, potentially compromising the integrity of the system. The vulnerability could be exploited by anyone with local access to a vulnerable Linux machine, making it a concern for both individual users and organizations that rely on Linux environments. As the flaw can lead to full control over the system, it is crucial for affected users to take immediate action to mitigate risks and secure their systems. Researchers are urging users to monitor their systems closely until a patch is available.

Impact: Linux systems using PackageKit daemon
Remediation: Users should apply updates or patches as soon as they are released, limit local access to systems, and monitor for any unusual activities.
Read Original

U.S. authorities have charged 29 individuals, including a Cambodian senator, for their involvement in a financial fraud scheme targeting American citizens. The operation was centered around a network of fake investment websites, leading to the seizure of over 500 web domains associated with these scams. This crackdown highlights the growing issue of international fraud affecting U.S. residents, particularly as scammers increasingly utilize online platforms to deceive victims. The involvement of a foreign official raises concerns about the extent of these operations and their potential links to organized crime. Law enforcement's swift action is intended to protect citizens from further financial loss and deter similar schemes in the future.

Impact: Fake investment websites targeting U.S. citizens
Remediation: Users should avoid engaging with unsolicited investment opportunities and report suspicious websites to authorities.
Read Original

The U.S. Treasury Department has imposed sanctions on Cambodian Senator Kok An and 28 other individuals and organizations due to their alleged roles in facilitating scam operations. The sanctions aim to disrupt these activities, which often involve fraud and deception targeting individuals and businesses. This action is part of a broader effort to combat international scams and protect potential victims from financial loss. The implications of these sanctions extend beyond Cambodia, as they signal a commitment from the U.S. to tackle global cybercrime and hold accountable those who enable such operations. By targeting key figures in these scams, authorities hope to deter similar activities in the future.

Impact: Individuals and entities involved in scam operations
Remediation: N/A
Read Original
Page 1 of 171Next