Vercel, a cloud development platform, has confirmed a security breach after hackers claimed to have accessed its systems and are now trying to sell the stolen data. The company has not disclosed the specific details of the breach, such as how many users or projects may be affected. This incident raises concerns about the security of data hosted on Vercel's platform, which is widely used by developers for building web applications. As the situation develops, users of Vercel should remain vigilant and take precautions to secure their own data. The potential sale of this stolen information could lead to further exploitation or misuse if it falls into the wrong hands.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
BleepingComputer
Apple account change notifications are being exploited by scammers to distribute phishing emails that appear to be legitimate. These emails, sent from Apple's own servers, falsely claim that the recipient's iPhone purchase has been confirmed, tricking users into clicking on malicious links. This tactic increases the likelihood that these emails will bypass spam filters and reach users' inboxes. As a result, unsuspecting Apple users may fall victim to these scams, risking their personal information. It’s essential for users to be cautious and verify any unexpected notifications they receive, even if they seem to come from trusted sources like Apple.
Recent research from Proofpoint reveals that hackers are increasingly targeting logistics firms, aiming to steal cargo and divert payments. These cyberattacks are reportedly connected to organized crime, leading to significant losses in the industry. Attackers employ coordinated remote access campaigns to infiltrate trucking and logistics companies, which raises concerns about the security of supply chains. This trend poses a serious risk not only to the affected companies but also to the broader economy, as disruptions in logistics can impact the availability of goods. Companies in the logistics sector need to enhance their cybersecurity measures to protect against these rising threats.
Security Affairs
The Security Affairs Malware newsletter released its latest edition, spotlighting several significant malware incidents. One notable case involves a watering hole attack on users of CPU-Z and HWMonitor, where attackers leverage a compromised website to infect visitors with malware. Another alarming incident is the discovery of a fake 'Claude' site that installs malware, granting attackers remote access to victims' computers. Additionally, the newsletter discusses JanelaRAT, a financial threat specifically targeting users in Latin America. These incidents underline the ongoing risks that users face from malicious software designed to exploit vulnerabilities and compromise personal information.
Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers are currently exploiting a vulnerability in ShowDoc, identified as CVE-2025-0520, which was discovered five years ago. This flaw allows attackers to deploy web shells, enabling remote code execution (RCE) and complete server takeovers on affected systems. The exploitation of this vulnerability is happening globally, impacting various organizations that use ShowDoc. It’s crucial for users and companies to address this issue promptly to prevent unauthorized access and potential data breaches. Security teams should prioritize patching their systems to mitigate the risk posed by this vulnerability.
Hackread – Cybersecurity News, Data Breaches, AI and More
Operation PowerOFF has successfully identified and issued warnings to around 75,000 users of DDoS-for-hire services. This initiative, led by Europol, resulted in four arrests and the seizure of 53 domains associated with these illegal services. DDoS-for-hire, also known as 'booting', involves paying individuals or groups to launch distributed denial-of-service attacks against targeted websites or networks, causing disruption. The crackdown not only targets the providers but also the users who engage in these activities, highlighting the ongoing efforts to combat cybercrime. Users involved in these services face potential legal consequences, which raises awareness about the risks of participating in such illicit activities.
Recent developments show that cybercriminals are adapting to changes in the phishing landscape by reusing Tycoon 2FA tools in various phishing kits. This follows a disruption of the Tycoon 2FA platform, which had been a popular tool among attackers. As a result, there is a noticeable increase in phishing attacks leveraging these tools, putting users at greater risk. The shift indicates that attackers are continuously evolving their methods to bypass security measures. Organizations and individuals need to remain vigilant and update their security protocols to combat this growing threat.
Grinex, a cryptocurrency exchange based in Kyrgyzstan and already sanctioned by the U.K. and U.S., has announced the suspension of its operations following a cyber attack that resulted in the theft of $13.74 million. The exchange claims this attack was orchestrated by foreign intelligence agencies, suggesting a coordinated effort rather than a random act of cybercrime. This incident raises concerns not only for Grinex but also for the broader cryptocurrency market, as it highlights vulnerabilities within exchanges, especially those already under scrutiny. The attack's implications could deter users from engaging with platforms that have been targeted, thereby affecting market confidence. As the investigation unfolds, the exchange and its users are left grappling with the fallout from this significant breach.
The Hacker News
CVE-2024-3721Researchers from Fortinet FortiGuard Labs and Palo Alto Networks Unit 42 have identified that attackers are exploiting a command injection vulnerability, CVE-2024-3721, in TBK DVRs and outdated TP-Link Wi-Fi routers. This medium-severity flaw, which has a CVSS score of 6.3, allows malicious actors to hijack these devices to create a botnet for DDoS attacks. The compromised TBK DVRs and EoL TP-Link routers are particularly concerning as they can be easily targeted due to their lack of ongoing support and security updates. This situation poses a significant risk to users, as their devices can be turned into tools for larger-scale cyberattacks without their knowledge. Users of these devices should take immediate action to secure their systems against potential exploitation.
SCM feed for Latest
Kejia Wang and Zhenxing Wang, two residents of New Jersey, have been sentenced to nine years and nearly eight years in prison, respectively, for their roles in facilitating a North Korean laptop farm. This operation was part of a scheme that falsely represented IT workers, generating over $5 million for the North Korean regime. The laptop farm was used to support various illicit activities, highlighting the ongoing challenges posed by cyber operations linked to North Korea. The U.S. Department of Justice's actions aim to disrupt these types of operations and send a clear message against aiding sanctioned regimes. This incident serves as a reminder of the global reach of cybercrime and the importance of international cooperation in combating it.
SCM feed for Latest
A security researcher known as Chaotic Eclipse has released a proof-of-concept (PoC) exploit for a zero-day vulnerability in Microsoft Defender, identified as 'RedSun'. This follows the earlier disclosure of an exploit for another flaw in Defender, tracked as CVE-2026-33825, known as the BlueHammer flaw. The implications of these exploits are significant, as they expose users of Microsoft Defender to potential attacks that could compromise system security. Organizations using this antivirus solution should be particularly vigilant, as the release of these exploits could lead to increased attempts at exploitation by malicious actors. It's crucial for users to stay informed about updates from Microsoft regarding these vulnerabilities.
SCM feed for Latest
According to Infosecurity Magazine, ransomware attacks on automotive manufacturers have surged dramatically, with incidents more than doubling from 2024 to 2025. This alarming trend signals a growing vulnerability within the automotive sector, which has increasingly integrated digital technologies into its operations. As attackers target these manufacturers, the potential for significant disruptions in production and supply chains rises, posing risks not only to the companies involved but also to consumers and the broader economy. The rise in ransomware incidents indicates a pressing need for the automotive industry to enhance its cybersecurity measures and prepare for potential attacks. Companies must prioritize protecting their systems to safeguard against these evolving threats.
SCM feed for Latest
The PowMix botnet has been quietly targeting the workforce in the Czech Republic since December, using randomized communication techniques to evade detection. This stealthy operation involves the botnet compromising systems to potentially gain unauthorized access to sensitive information or resources. Researchers at The Hacker News have reported on the campaign, emphasizing the risk it poses to businesses and organizations in the region. As the botnet continues its activities, it raises concerns about the security of the Czech workforce and the need for enhanced protective measures against such covert attacks. Organizations are urged to remain vigilant and adopt robust security practices to defend against this emerging threat.
SCM feed for Latest
A newly released underground guide reveals insights into how cybercriminals assess and engage in the stolen credit card market. Rather than simply using stolen credit cards, the guide emphasizes a systematic approach where fraudsters carefully vet their suppliers. This shift indicates a more organized and methodical operation within the realm of credit card fraud. The implications are significant, as it suggests that attackers are becoming more sophisticated, which could lead to an increase in successful fraud attempts. As a result, consumers and financial institutions may face heightened risks as these organized networks operate more effectively.
SCM feed for Latest
In November 2022, a group of hackers executed a credential stuffing attack against DraftKings, using stolen usernames and passwords sourced from the dark web. This method allowed them to gain unauthorized access to numerous user accounts, compromising sensitive information for many customers. The incident culminated in a legal case where one of the attackers was sentenced to 30 months in prison. This case serves as a reminder of the dangers of reusing passwords across different platforms, as it can make users vulnerable to such attacks. Companies like DraftKings must ensure robust security measures are in place to protect user data from similar threats in the future.