Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Kaspersky researchers have identified a new Remote Access Trojan (RAT) called CrystalX, which is being distributed as Malware-as-a-Service (MaaS). This malware combines features of spyware, information stealers, and prankware, making it particularly versatile and dangerous. Users can unknowingly download CrystalX, leading to their personal information being stolen or their devices being used for malicious purposes. The presence of prankware adds a unique twist, as it can also be used to annoy or embarrass victims. This incident underscores the evolving nature of cyber threats and the need for users to be vigilant about the software they install and the links they click on.

Impact: Users of infected devices, particularly those downloading software from untrusted sources.
Remediation: Users should avoid downloading software from untrusted sources and ensure their security software is up to date.
Read Original

Anthropic has reported an accidental leak of the source code for its closed-source AI model, Claude Code, through an NPM package. The company clarified that while the source code was exposed, there was no breach of customer data or credentials. This incident raises concerns about the protection of proprietary technology, especially since the source code could potentially allow others to replicate or exploit the functionalities of Claude Code. While no immediate risks to users have been identified, the leak highlights the importance of stringent security measures when handling sensitive software components. Companies must remain vigilant to prevent similar incidents in the future.

Impact: Claude Code source code
Remediation: N/A
Read Original

Researchers discovered serious vulnerabilities in the Vim and GNU Emacs text editors that could allow attackers to execute remote code simply by opening a malicious file. This means that users of these popular text editors could be at risk without any interaction beyond opening a file. The vulnerabilities were identified with the help of the Claude AI assistant, which used simple prompts to find the flaws. This is significant as many developers and users rely on these tools for coding and text editing, making a large number of systems potentially vulnerable. Users should be cautious about the files they open and look out for updates from the developers to address these issues.

Impact: Vim, GNU Emacs
Remediation: Users should update to the latest versions of Vim and GNU Emacs as soon as patches are released. Additionally, avoid opening untrusted files.
Read Original

This week, the Axios NPM package, known for its role as a JavaScript HTTP client library, faced a brief compromise that is suspected to be linked to North Korean threat actors. The incident raised alarms among developers and users who rely on this widely used library for web applications. While the exact details of the compromise are still being investigated, it highlights the ongoing risks associated with third-party software dependencies. Users of Axios should stay vigilant and ensure they are using the latest version of the package to mitigate potential vulnerabilities. This incident serves as a reminder for developers to regularly check the integrity of their dependencies and to implement security measures when integrating third-party packages into their projects.

Impact: Axios NPM package
Remediation: Users should update to the latest version of the Axios package.
Read Original

Researchers from Defused have reported ongoing attacks exploiting a serious SQL injection vulnerability in Fortinet's FortiClient EMS, identified as CVE-2026-21643. These intrusions have been active since March 24, raising concerns for organizations using this software. SQL injection vulnerabilities allow attackers to manipulate database queries, potentially leading to unauthorized access and data breaches. Companies utilizing FortiClient EMS are urged to take immediate action to protect their systems and data from these exploits. The situation emphasizes the need for regular security updates and vigilance against emerging threats.

Impact: Fortinet FortiClient EMS
Remediation: Organizations should patch FortiClient EMS to the latest version as soon as possible. Regularly monitor systems for unusual activity and implement web application firewalls to help filter malicious traffic. Conduct a review of database queries to ensure they are secure against SQL injection attacks.
Read Original

A recent phishing campaign has targeted various sectors in Ukraine, including government entities, healthcare providers, financial institutions, educational organizations, and software development firms. Attackers impersonated the country's Computer Emergency Response Team (CERT) to deliver the AGEWHEEZE Remote Access Trojan (RAT) between March 26 and 27. This type of malware allows unauthorized access to infected systems, posing significant risks to sensitive data and operational security. The incidents emphasize the ongoing cyber threats faced by Ukrainian organizations, particularly amid heightened geopolitical tensions. Entities in the affected sectors need to remain vigilant and enhance their cybersecurity measures to mitigate such risks.

Impact: Ukrainian government entities, healthcare providers, financial institutions, educational institutions, software development companies
Remediation: Entities should implement phishing awareness training, strengthen email filtering, and ensure software and systems are updated to protect against RATs.
Read Original

Researchers from Check Point have identified a vulnerability in ChatGPT that could allow a malicious user to exploit a hidden outbound channel within the platform's code execution runtime. They found that a single, specially crafted prompt could trigger this channel, potentially leading to unauthorized data leakage. This issue raises concerns for users and organizations relying on ChatGPT for various applications, as it could expose sensitive information. Following the discovery, OpenAI has patched the vulnerability to address this security flaw. Users of ChatGPT should ensure they are using the latest version to benefit from the fix and safeguard their data.

Impact: ChatGPT
Remediation: OpenAI has patched the vulnerability.
Read Original

Cisco has been targeted in a cyberattack that resulted in the theft of source code from its internal development environment. This breach was made possible through the use of stolen credentials linked to a prior supply chain attack on Trivy, a tool used for scanning container vulnerabilities. The attackers gained access to sensitive source code belonging not only to Cisco but also to its customers, raising serious concerns about the security of their products and services. This incident emphasizes the risks associated with credential theft and the potential for significant impacts on a wide range of users who rely on Cisco's technology. Companies should assess their security protocols to prevent similar breaches in the future.

Impact: Cisco source code, customer source code
Remediation: Companies should enhance credential security, implement multi-factor authentication, and conduct regular security audits.
Read Original

A cybercrime campaign attributed to the Silver Fox group is targeting Chinese users using typosquatted domains. This campaign involves malicious versions of various applications, such as VPN clients, encrypted messaging services, video conferencing tools, and e-commerce platforms. By creating fake websites that closely resemble legitimate ones, attackers aim to trick users into downloading these harmful applications. This poses a significant risk not only to individual users but also to businesses that rely on these tools for communication and transactions. As cyber threats continue to evolve, users must be vigilant about the sources from which they download software to avoid falling victim to such scams.

Impact: VPN clients, encrypted messengers, video conferencing tools, e-commerce software
Remediation: Users should verify the authenticity of software sources before downloading and consider using official channels or trusted vendors only.
Read Original

A Maryland man named Spalletta has been charged in connection with a $53 million theft involving Uranium Finance, a decentralized finance platform. The allegations state that he exploited vulnerabilities in the platform's smart contracts on two occasions in April 2021. This incident raises concerns about the security of decentralized finance platforms, which are becoming increasingly popular but also susceptible to attacks. The case highlights the need for stronger security measures in cryptocurrency systems to protect users' investments. As decentralized finance continues to grow, incidents like this could undermine trust in the entire sector.

Impact: Uranium Finance platform
Remediation: Strengthening smart contract security, conducting regular audits of code, and implementing user education on safe practices.
Read Original

A significant security vulnerability in TrueConf, a video conferencing software, has been actively exploited in attacks on government networks in Southeast Asia. This vulnerability, identified as CVE-2026-3502, has a CVSS score of 7.8, indicating its severity. The flaw stems from a lack of integrity checks when updating the application, which allows attackers to deliver malicious updates to users. The campaign, named TrueChaos, is specifically targeting government entities, making it a serious concern given the sensitive nature of the information handled by these organizations. Immediate action is necessary to protect affected systems from further exploitation.

Impact: TrueConf video conferencing software
Remediation: Users should immediately update their TrueConf software to the latest version that addresses this vulnerability and implement strict controls over application updates to prevent unauthorized modifications.
Read Original
Actively Exploited

A man from Maryland has been charged with hacking Uranium Finance, a decentralized finance platform, leading to the theft of $53 million. The suspect allegedly exploited vulnerabilities in the platform's smart contracts to siphon off funds. After the hack, he reportedly laundered the stolen cryptocurrency through various methods to conceal its origin. This incident raises concerns about the security of decentralized finance platforms and the potential for similar attacks, emphasizing the need for improved security measures in the sector. Law enforcement continues to investigate the case, which could have broader implications for cryptocurrency regulations and user trust.

Impact: Uranium Finance platform
Remediation: Improve smart contract security audits and implement stricter transaction monitoring.
Read Original

A recent report reveals that credential theft is a significant factor driving various cyberattacks, including ransomware incidents and breaches of Software-as-a-Service (SaaS) platforms. This trend indicates a shift in focus for cybersecurity efforts, moving from merely preventing breaches to actively detecting and responding to the misuse of legitimate access credentials. The report emphasizes that attackers are increasingly using stolen logins to carry out sophisticated attacks, which complicates the security landscape for many organizations. As a result, businesses must enhance their monitoring capabilities to identify unauthorized use of accounts and protect sensitive information. This shift is particularly crucial as nation-state actors also exploit these vulnerabilities for geopolitical purposes, further elevating the stakes in cybersecurity.

Impact: Ransomware, SaaS platforms, Industrial systems, Nation-state attacks
Remediation: Organizations should implement stronger monitoring of account access, multi-factor authentication, and regular audits of user activity to mitigate risks associated with credential theft.
Read Original

Venom Stealer is a new type of malware that allows cybercriminals to continuously collect sensitive information from infected devices. This software has features that enable it to maintain persistence, which means it can stay on a system even after a reboot or other attempts to remove it. The malware targets login credentials, session data, and cryptocurrency assets, putting users' financial security at risk. As it automates the data harvesting process, attackers can siphon off valuable information without needing to be present. This poses a significant threat to individuals and organizations that rely on digital platforms for transactions and communications.

Impact: Users of infected devices, particularly those handling sensitive credentials and cryptocurrency assets.
Remediation: Users should ensure their antivirus software is up to date and consider implementing multi-factor authentication for sensitive accounts. Regularly changing passwords and monitoring accounts for unauthorized activity is also advised.
Read Original

The shift to cloud and Software as a Service (SaaS) platforms in higher education has led to significant security challenges as traditional campus security boundaries fade away. Experts are raising concerns about the oversight of cloud security in educational institutions, emphasizing the need for better management of critical services, institutional data, and user identities that now exist in numerous cloud environments. With this transition, universities may be exposing themselves to a range of cybersecurity risks, including data breaches and unauthorized access. The article suggests that educational institutions need to reassess their security strategies to protect sensitive information effectively. This is particularly important as the reliance on cloud services continues to grow, making it vital for schools to implement strong security measures.

Impact: Cloud services, SaaS platforms used in higher education
Remediation: Educational institutions should reassess and strengthen their cloud security strategies
Read Original
Page 1 of 135Next