Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Hacker Used Claude Code, GPT-4.1 to Exfiltrate Hundreds of Millions of Mexican Records

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A hacker has reportedly used advanced AI tools, Claude Code and GPT-4.1, to steal personal records of hundreds of millions of Mexican citizens from nine different government agencies. This breach raises serious concerns about data security and the potential misuse of sensitive information. The stolen records likely include personal identifiers, which could lead to identity theft or fraud. The incident highlights vulnerabilities in governmental data protection practices and the growing capabilities of cybercriminals using AI for malicious purposes. Authorities will need to investigate the breach thoroughly and implement stronger security measures to protect citizen data in the future.

Impact: Records of Mexican citizens from nine government agencies
Remediation: Authorities should enhance data security protocols and conduct a comprehensive review of existing safeguards in government systems.
Read Original

A serious vulnerability in Marimo software has come to light, allowing attackers to execute remote code without needing authentication. This flaw is currently being exploited to steal user credentials, making it a pressing issue for organizations using this software. The nature of the vulnerability means that it could potentially affect a wide range of users and systems that rely on Marimo. Companies need to act quickly to protect their data and systems from unauthorized access. Immediate action is essential to mitigate the risk posed by this vulnerability as attackers are actively targeting it.

Impact: Marimo software, potentially affecting all users and systems running this application.
Remediation: Organizations should immediately update their Marimo software to the latest version as soon as patches are available. Additionally, implementing network segmentation and monitoring for unusual activity can help mitigate risks until patches are applied.
Read Original
Actively Exploited

Recent research has identified thirty-six malicious npm packages related to the Strapi framework that have been linked to Redis remote code execution (RCE), database theft, and persistent command and control (C2) capabilities. In addition, malicious LNK files are being used to distribute a Python-based backdoor. The Kimsuky Group has also been noted for changing their distribution techniques to enhance their attacks. These developments pose serious risks to developers and organizations using these tools, as they could lead to unauthorized access and data breaches. It is crucial for users to be vigilant and ensure they are using secure versions of these packages to avoid falling victim to these threats.

Impact: Strapi framework, Redis, npm packages, Python-based backdoor
Remediation: Users should review and remove any malicious npm packages, ensure their software is up to date, and follow best practices for securing their environments.
Read Original
FBI Atlanta and Indonesian National Police Take Down W3LLSTORE Phishing Marketplace

Hackread – Cybersecurity News, Data Breaches, AI and More

The FBI Atlanta office, in collaboration with the Indonesian National Police, has successfully shut down W3LLSTORE, a phishing marketplace linked to a significant $20 million fraud scheme. Authorities seized multiple domains associated with the site and detained its developer, marking a notable victory in the fight against online fraud. W3LLSTORE facilitated the distribution of phishing kits and other malicious tools, which allowed cybercriminals to target unsuspecting victims. This operation not only disrupts the marketplace but also sends a strong message to those involved in cybercrime. The crackdown is crucial as it helps protect individuals and organizations from falling victim to similar scams in the future.

Impact: W3LLSTORE phishing marketplace
Remediation: N/A
Read Original

Researchers at Censys have identified 5,219 devices that are vulnerable to attacks from Iranian Advanced Persistent Threat (APT) groups, with a significant number located in the United States. This exposure raises concerns about the potential for targeted cyber operations against various sectors, especially given the geopolitical tensions involving Iran. The findings suggest that organizations should assess their security postures and take proactive measures to mitigate risks associated with these vulnerabilities. The presence of such a large number of exposed devices indicates a broader issue of inadequate cybersecurity practices that could lead to severe consequences if exploited. Companies and users need to be vigilant and enhance their defenses against these potential threats.

Impact: Devices exposed to Iranian APTs, primarily located in the U.S.
Remediation: Organizations should review and enhance their security configurations, apply relevant patches, and ensure proper monitoring of their networks.
Read Original

Censys researchers have identified 5,219 Rockwell PLCs (Programmable Logic Controllers) that are exposed to potential attacks, with the majority located in the United States. This warning comes after U.S. agencies, including the FBI, CISA, and NSA, reported that Iranian-linked advanced persistent threat groups are actively exploiting these internet-connected devices. The attacks target operational technology across various critical infrastructure sectors, raising concerns about national security. Experts are urging organizations to secure these devices or disconnect them from the internet to prevent potential breaches. The situation underscores the need for better security measures in industrial control systems, especially as cyber threats continue to evolve.

Impact: Rockwell PLCs (Programmable Logic Controllers)
Remediation: Organizations should secure or disconnect exposed Rockwell PLCs from the internet.
Read Original

The GlassWorm campaign has evolved significantly since its inception in 2025, now utilizing a Zig-based dropper embedded in a fake Integrated Development Environment (IDE) extension. This method targets developer tools, allowing attackers to compromise systems through malicious software packages. Initially starting with harmful npm packages, the campaign has escalated to large-scale supply chain attacks affecting platforms like GitHub, npm, and Visual Studio Code. Additionally, the attackers have deployed Remote Access Trojans (RATs) via counterfeit browser extensions. This evolution raises concerns for developers and organizations, as it highlights the growing sophistication of supply chain threats in the software development ecosystem.

Impact: GitHub, npm, Visual Studio Code, developer tools
Remediation: Developers should avoid installing unverified extensions and regularly audit their dependencies for malicious packages.
Read Original
FBI Recovers Deleted Signal Messages Through iPhone Notifications

Hackread – Cybersecurity News, Data Breaches, AI and More

Recent court proceedings have revealed that messages sent via the Signal app can still be accessed by the FBI through iPhone notification data, even after users have deleted them. This discovery raises significant concerns about privacy and the effectiveness of end-to-end encryption, as it suggests that deleted messages may not be entirely erased from device records. The implications of this finding are serious for Signal users, particularly those who rely on the app for confidential communications. The case highlights the potential vulnerabilities in how smartphones handle notifications and data retention, prompting users to reconsider the security of their communications. It also raises questions about the extent to which law enforcement can retrieve deleted digital information, which could affect how individuals perceive their privacy in the digital age.

Impact: Signal messaging app, iPhone notifications
Remediation: Users may need to be cautious about the information they share over Signal, as deleted messages could still be accessible via device notifications.
Read Original
Actively Exploited

A serious vulnerability in the open-source Python notebook tool Marimo, identified as CVE-2026-39987, has been exploited within just 10 hours of its disclosure on April 8, 2026. This flaw has a CVSS score of 9.3, indicating its severity and potential impact. Researchers from the Sysdig Threat Research Team reported that attackers began exploiting this vulnerability almost immediately, raising alarms about the security of systems using Marimo. This incident underscores the urgency for users and organizations relying on this tool to take immediate action to protect their systems from potential breaches. Quick exploitation of such vulnerabilities demonstrates the need for timely patching and awareness in the cybersecurity community.

Impact: Marimo (open-source Python notebook tool)
Remediation: Users should apply patches as soon as they are available. It's also advisable to limit access to the Marimo tool and monitor for any unusual activity in systems that use it.
Read Original
ShinyHunters Claims Rockstar Games Snowflake Breach via Anodot

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

ShinyHunters, a known hacking group, claims to have gained access to data from Rockstar Games' Snowflake platform due to a breach involving Anodot, a data analytics company. They have threatened to leak this data on April 14 unless their ransom demands are met. This incident raises concerns about the security of sensitive information related to Rockstar, a major player in the gaming industry. If the breach is legitimate, it could expose user data and proprietary information, impacting both the company and its customers. The situation is still developing, and Rockstar Games has not yet confirmed the breach or provided details on any potential data compromise.

Impact: Rockstar Games, Snowflake platform, Anodot
Remediation: N/A
Read Original

The U.S. Treasury Department's Office of Cybersecurity and Critical Infrastructure Protection has announced a new initiative aimed at sharing cyber threat intelligence with cryptocurrency firms. This program is designed to help these companies better identify, prevent, and respond to cyber threats, especially as attacks on the crypto sector grow more frequent and sophisticated. The initiative comes in response to increasing concerns over security vulnerabilities in the cryptocurrency market, which has become a prime target for cybercriminals. By providing free intelligence resources, the Treasury hopes to strengthen the security posture of these firms and protect consumers. This move reflects a broader recognition of the need for enhanced security measures in the rapidly evolving digital currency landscape.

Impact: Cryptocurrency firms
Remediation: N/A
Read Original

Hims, a telehealth company, has suffered a data breach that exposes sensitive personal health information (PHI) of its users. The breach could reveal details about users' conditions, such as baldness, obesity, or erectile dysfunction. The attackers may misuse this data for identity theft, targeted phishing scams, or other malicious activities. This incident raises serious concerns about the protection of personal health data in the telehealth sector, highlighting the ongoing challenges companies face in safeguarding sensitive information. Users of Hims should be vigilant about potential phishing attempts and monitor their accounts for unusual activity.

Impact: Hims telehealth services and user accounts
Remediation: Users should change their passwords and enable two-factor authentication where possible. Companies should review their security measures and consider additional training for staff on data protection.
Read Original

Cybersecurity teams are facing an increasing number of credential-based attacks, which are becoming more sophisticated and harder to detect. To combat this trend, experts suggest that teams need to shift their detection models to better identify these threats as they evolve. This includes adapting to the changing tactics used by attackers, who often disguise their activities to look like normal business operations. As organizations continue to rely on digital credentials for access, the risk of these types of attacks grows, potentially leading to significant data breaches and financial losses. Companies must stay vigilant and update their security strategies to protect against these emerging threats.

Impact: Credential-based attacks on various systems and organizations
Remediation: Update detection models and security protocols to identify unusual access patterns and behaviors
Read Original

In recent discussions, cybersecurity experts have raised alarms about the implications of Claude Mythos, a new threat that could impact various organizations. Financial institutions, particularly those that traditionally invest less in cybersecurity than larger banks, are urged to take immediate action to bolster their defenses. The meeting between Bessent and Powell, along with top bankers, indicates a growing concern about potential vulnerabilities that could be exploited by attackers. As cyber threats continue to evolve, companies must prioritize their cybersecurity strategies to protect sensitive data and maintain trust with customers. The conversation underscores the need for proactive measures in an increasingly digital landscape.

Impact: N/A
Remediation: Companies should enhance their cybersecurity budgets and strategies to address potential vulnerabilities.
Read Original

The FBI and NSA have issued a warning about Russian hackers taking advantage of vulnerabilities in routers. These attackers are reportedly exploiting weaknesses to gain unauthorized access to networks, potentially compromising personal and corporate data. This issue affects a wide range of router models, but specific brands and versions have not been disclosed. Users and businesses are encouraged to take proactive measures to secure their routers, as these vulnerabilities could lead to significant security breaches. Ensuring that firmware is updated and default settings are changed are among the recommended steps to mitigate the risk.

Impact: Routers from various vendors
Remediation: Update router firmware, change default settings, disable remote management, use strong passwords, and enable firewall features.
Read Original
Page 1 of 150Next