Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

French Police Arrest HexDex Hacker Over Mass Data Theft and Leaks

Hackread – Cybersecurity News, Data Breaches, AI and More

French police have arrested a 20-year-old hacker known as HexDex, who is alleged to have stolen and leaked sensitive data from various targets, including government agencies, sports organizations, and private companies. The suspect is accused of orchestrating a series of cyberattacks that compromised a significant amount of confidential information. This incident raises concerns about the security measures in place at these institutions and the potential harm that could come from such data leaks. Authorities are investigating the full extent of the breaches and the impact on those affected. The case serves as a reminder of the ongoing risks posed by cybercriminals and the importance of robust cybersecurity practices.

Impact: Government agencies, sports organizations, private companies
Remediation: N/A
Read Original

The Bitwarden command-line interface (CLI) version 2026.4.0 has been compromised as part of the Checkmarx supply chain attack, which introduced malicious code into the bw1.js file through a compromised GitHub Action. This incident raises concerns for users of Bitwarden, a popular password management tool, as the malicious code could potentially expose sensitive information. Researchers are warning that this breach is part of a larger ongoing campaign, which could impact other software and systems if not addressed. Users of the affected version should take immediate action to secure their systems and check for any unauthorized access. This incident serves as a reminder of the vulnerabilities present in software supply chains and the need for vigilance among developers and users alike.

Impact: Bitwarden CLI version 2026.4.0
Remediation: Users should update to a secure version of Bitwarden CLI and review their systems for any signs of unauthorized access.
Read Original

A recent supply chain attack has targeted the Bitwarden NPM package, linked to a group called TeamPCP. This incident draws parallels to the Shai-Hulud worm, indicating a significant threat to developers using the Bitwarden package for password management solutions. The attack raises concerns about the security of software dependencies, as malicious code can be injected into widely used packages. Developers and organizations relying on Bitwarden should be vigilant and assess their systems for any signs of compromise. The incident underscores the ongoing risks associated with supply chain attacks in the software development ecosystem.

Impact: Bitwarden NPM package
Remediation: Developers should immediately review their use of the Bitwarden package and ensure they are using the latest version. Regular audits of dependencies and monitoring for unusual activity are recommended.
Read Original

Researchers at Kaspersky have identified a new vulnerability in the Remote Procedure Call (RPC) architecture of Windows. This flaw allows an attacker to set up a counterfeit RPC server, which they can then use to gain elevated privileges on a target system. The implications of this vulnerability are significant, as it could enable attackers to execute malicious actions with higher access rights, potentially compromising sensitive data and system integrity. Organizations using affected systems should be vigilant and consider implementing security measures to defend against this exploitation. The discovery emphasizes the need for regular updates and security practices to mitigate such risks.

Impact: Windows RPC architecture
Remediation: Regularly update systems and implement security measures to mitigate risks associated with RPC vulnerabilities.
Read Original
Actively Exploited

A serious security vulnerability in LMDeploy, a toolkit for managing large language models, has been actively exploited less than 13 hours after being made public. This flaw, designated as CVE-2026-33626, has a CVSS score of 7.5 and involves a Server-Side Request Forgery (SSRF) issue, which attackers can use to gain access to sensitive data. This incident poses significant risks for users and organizations that rely on LMDeploy for deploying and serving machine learning models. Given the rapid exploitation of this vulnerability, companies using LMDeploy should take immediate action to safeguard their systems. The swift response from attackers emphasizes the need for stringent monitoring and prompt patching of critical vulnerabilities.

Impact: LMDeploy toolkit for compressing, deploying, and serving large language models.
Remediation: Users should immediately apply any available patches for LMDeploy, review server configurations to mitigate SSRF risks, and monitor for unusual access patterns. Organizations are advised to limit network permissions and validate incoming requests to prevent exploitation.
Read Original

A recent study examining 1,000 Android apps revealed a significant disconnect between the logging practices of developers and the privacy policies drafted by legal teams. Developers often include log statements for debugging and performance tracking, but these logs may not align with what is disclosed in the apps' privacy policies. This inconsistency raises concerns about compliance with regulations like the General Data Protection Regulation (GDPR), as users may not be fully informed about the data being collected and how it's used. The findings suggest that companies need to improve communication between their development and legal teams to ensure transparency and proper user consent. This gap not only affects user trust but also increases the risk of legal repercussions for the companies involved.

Impact: 1,000 Android apps
Remediation: Companies should enhance collaboration between development and legal teams to align logging practices with privacy policies.
Read Original

Cybercriminals have discovered a method to manipulate artificial intelligence systems through indirect prompt injection attacks. This technique tricks AI into revealing sensitive information, executing harmful code, or redirecting users to malicious websites. Such attacks can potentially compromise personal data and security, affecting both individuals and organizations that rely on AI technologies. Researchers emphasize the need for robust security measures to protect against these tactics, as the implications for data privacy and system integrity are significant. Users and companies alike should be aware of these risks and implement strategies to mitigate them.

Impact: AI systems and applications that utilize prompt-based interactions
Remediation: Implement input validation, restrict AI model access, and monitor AI interactions for suspicious activity.
Read Original

Vercel has reported finding more signs of a security compromise affecting its customer base, raising concerns about potential risks to downstream systems. While the exact nature of the exposure remains unclear, the company is actively investigating the situation and working to assess the impact on its clients. This incident is significant because it may not only affect Vercel's direct customers but also third-party systems connected to them, amplifying the risk of broader security issues. Companies using Vercel's services should remain vigilant and monitor for any unusual activity as the investigation unfolds. The situation is still developing, and further updates are expected as Vercel continues to analyze the extent of the compromise.

Impact: Vercel's customer base and associated third-party systems
Remediation: N/A
Read Original

Chinese state-sponsored hackers are increasingly using networks of compromised devices, known as botnets, to carry out cyberattacks. This approach allows them to conduct operations with minimal costs and risks, while maintaining plausible deniability. The use of botnets amplifies their capabilities, enabling them to launch large-scale attacks against various targets without the need for extensive resources. This trend poses significant risks to organizations worldwide, as it complicates detection and response efforts. Companies and users should be vigilant about securing their devices to prevent them from being hijacked for these malicious purposes.

Impact: Compromised devices, IoT devices, servers
Remediation: Ensure all devices are updated with the latest security patches, implement network security measures to detect unusual activity, and regularly audit devices for vulnerabilities.
Read Original

A new piece of malware named ZionSiphon has emerged, reportedly aimed at disrupting water supplies in Israel. However, experts from Dragos, a cybersecurity firm specializing in operational technology, have assessed the malware as ineffective and likely the work of inexperienced individuals utilizing artificial intelligence. This raises questions about the actual capabilities of the malware and the seriousness of the threat it poses. Despite the sensational headlines, experts suggest that the hype surrounding ZionSiphon may outweigh its real-world impact. Understanding the limitations of such attacks is crucial for water facility operators, who must remain vigilant but not overly alarmed by exaggerated claims.

Impact: Water supply systems in Israel
Remediation: N/A
Read Original

Researchers from Unit 42 have found that attackers are now using artificial intelligence to exploit vulnerabilities in cloud systems with impressive speed. This capability allows cybercriminals to automate attacks, potentially leading to more significant breaches and data theft. The report emphasizes the growing sophistication of these AI-driven attacks, making it vital for organizations to bolster their security measures. Companies that rely heavily on cloud infrastructure must stay vigilant and update their defenses to counter these emerging threats. As AI technology continues to evolve, the risk of such attacks will likely increase, necessitating a proactive approach to cloud security.

Impact: Cloud systems and services
Remediation: Companies should implement stronger security protocols, regularly update their cloud services, and conduct thorough vulnerability assessments.
Read Original

A coalition of twelve allied agencies has issued a warning regarding a shift in tactics by Chinese hackers, who are reportedly using common routers to build covert hacking networks. These everyday devices, often overlooked in terms of security, can be exploited to gain unauthorized access to sensitive information. Organizations are advised to enhance their security measures by regularly updating router firmware, changing default passwords, and monitoring network traffic for unusual activity. This development is particularly concerning given the widespread use of consumer-grade routers, which could be leveraged to compromise a vast number of networks. The implications are significant, as this tactic could enable attackers to infiltrate both personal and corporate systems without detection.

Impact: Everyday routers from various vendors
Remediation: Regularly update router firmware, change default passwords, monitor network traffic for unusual activity
Read Original

A North Korean hacking group known as HexagonalRodent has reportedly stolen up to $12 million in cryptocurrency from Web3 developers. This operation, linked to the state-backed group Famous Chollima, took place between January and March of this year. The attackers targeted individuals and organizations involved in Web3 technology, which includes decentralized applications and blockchain development. The stolen funds could be used to finance North Korea's activities, raising concerns about the implications for both the cryptocurrency industry and international security. As the threat from state-sponsored cybercrime continues to grow, developers in the tech space need to enhance their security measures to protect against such sophisticated attacks.

Impact: Web3 developers and associated cryptocurrency assets
Remediation: Developers should enhance security practices, including using multi-factor authentication and regular software updates. Implementing robust cybersecurity measures and monitoring for suspicious activity is also advised.
Read Original

A critical vulnerability in Microsoft SharePoint, identified as CVE-2026-32201, is currently being exploited by attackers. Over 1,300 SharePoint servers exposed to the internet remain at risk, with fewer than 200 instances patched since the last Patch Tuesday. This zero-day spoofing flaw allows unauthorized access, which could lead to significant data breaches or further intrusions. Organizations using SharePoint should prioritize applying available updates to mitigate the risk and secure their systems against ongoing attacks. The situation underscores the urgency for users to remain vigilant and proactive in patch management.

Impact: Microsoft SharePoint servers exposed to the internet, specifically those with the vulnerability CVE-2026-32201.
Remediation: Organizations should apply the latest patches provided by Microsoft for SharePoint to address CVE-2026-32201. Regularly check for updates and ensure that all internet-exposed instances are secured.
Read Original

Rituals, a Dutch cosmetics company, has reported a data breach that has compromised the personal information of customers in its 'My Rituals' membership database. While the exact number of affected individuals remains undisclosed, the breach raises concerns about the security of customer data in an era where personal information is increasingly targeted by cybercriminals. This incident serves as a reminder for companies to prioritize data protection measures and for customers to be vigilant about their personal information. Rituals has yet to provide detailed guidance on how affected customers can protect themselves or what steps the company is taking to address the breach. Such breaches can lead to identity theft and other security risks, making it crucial for both companies and consumers to take proactive measures against data vulnerabilities.

Impact: My Rituals membership database
Remediation: N/A
Read Original
Page 1 of 169Next