Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A new vulnerability in Linux, referred to as 'Dirty Frag' and tracked under CVE-2026-43284 and CVE-2026-43500, has been disclosed, raising concerns among security researchers and system administrators. This exploit could allow attackers to manipulate memory and potentially execute arbitrary code, impacting a wide range of Linux distributions. The vulnerability was made public before a patch was available, which increases the risk of exploitation by malicious actors. Users of affected systems need to be vigilant, as this vulnerability may already be utilized in attacks. It's crucial for organizations to stay updated and apply any patches as soon as they are released to mitigate potential risks.

Impact: Linux operating systems, various distributions
Remediation: Organizations should monitor for patches related to CVE-2026-43284 and CVE-2026-43500 and apply them immediately upon release. Additionally, users should review their system configurations and implement security best practices to limit exposure.
Read Original
Two US Men Jailed for Helping North Korean Hackers Infiltrate US Firms

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Matthew Knoot and Erick Prince have been sentenced to 18 months in prison for their roles in facilitating North Korean hackers' access to U.S. companies. The pair assisted these hackers by setting up remote laptop farms, which allowed the attackers to infiltrate various firms. This incident raises significant concerns about the vulnerabilities of U.S. businesses to foreign cyber threats. By collaborating with North Korean hackers, Knoot and Prince not only broke the law but also jeopardized the security of sensitive information in the U.S. economy. Their actions serve as a reminder of the ongoing risks posed by state-sponsored cybercrime and the need for robust security measures to protect against such infiltrations.

Impact: U.S. firms, particularly those targeted by North Korean hackers
Remediation: Companies should enhance monitoring of remote access services and educate employees about the risks of unauthorized access.
Read Original
Hackers Trick DigiCert Into Issuing Certificates Used to Sign Malware

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Hackers managed to trick DigiCert into issuing 60 code signing certificates that were then used to sign the Zhong Stealer malware. This incident unfolded when attackers utilized a malicious attachment in a support chat, allowing them to bypass security protocols. As a response, DigiCert has revoked the compromised certificates to prevent further misuse. This breach raises significant concerns about the security of certificate authorities and the potential for malware to appear more legitimate, which could mislead users and organizations. The incident emphasizes the need for tighter security measures in the issuance of digital certificates, as they play a crucial role in establishing trust online.

Impact: DigiCert code signing certificates, Zhong Stealer malware
Remediation: Revocation of compromised certificates
Read Original

The Security Affairs newsletter has issued its latest edition, which includes a focus on the Quasar Linux RAT (QLNX), a fileless Linux implant designed for stealth and persistence. This malware allows attackers to remotely access and control infected systems without leaving traditional traces, making detection difficult. The article emphasizes the importance of awareness around such threats, as they can compromise sensitive data and disrupt operations for individuals and organizations using Linux systems. Users and administrators are urged to implement strong security measures to defend against these types of attacks.

Impact: Linux systems, particularly those vulnerable to remote access threats
Remediation: Implement strong security measures, monitor for unusual activity, and consider using endpoint protection tools that can detect fileless malware.
Read Original

Researchers have discovered a new piece of malware called Quasar Linux RAT (QLNX), which is specifically designed to target developers and DevOps environments. This remote access tool (RAT) can steal sensitive information such as credentials, log keystrokes, and monitor clipboard activity. It also allows attackers to manipulate files and create network tunnels for ongoing access. The stealthy nature of QLNX makes it particularly concerning, as it can operate without leaving traditional traces on the system. This incident highlights the risks developers face and emphasizes the importance of securing development environments against such targeted attacks.

Impact: Linux operating systems, specifically those used in development and DevOps environments.
Remediation: Implement security best practices, such as regular updates, monitoring for unusual activity, and using endpoint protection solutions.
Read Original

The article discusses several cybersecurity topics, including new vulnerabilities and incidents. Notably, it mentions a zero-day exploit affecting Canvas, a learning management system used by educational institutions. This vulnerability could allow attackers to execute unauthorized code, putting sensitive student data at risk. Additionally, it highlights the QuasarRat malware, which has been observed in the wild, targeting various systems. The article also touches on compliance issues faced by companies like Anthropic regarding EU regulations, which can impact their operations. Overall, these developments serve as a reminder for organizations to stay vigilant and update their security measures regularly to protect against evolving threats.

Impact: Canvas LMS, QuasarRat malware
Remediation: Organizations using Canvas should apply any available patches and review their security configurations. Users should also monitor for unusual activity and consider additional security measures.
Read Original
Fake macOS Troubleshooting Sites Used to Steal iCloud Data in ClickFix Scam

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Microsoft researchers have identified a new scam called ClickFix that targets macOS users. Attackers are creating fake troubleshooting guides on platforms like Medium and Craft, tricking users into executing Terminal commands that deploy malicious software known as AMOS and SHub Stealer. This malware is designed to steal iCloud data, which can lead to significant personal and financial loss for affected users. The campaign highlights the need for vigilance among macOS users, as these deceptive tactics can easily lure unsuspecting individuals into compromising their personal information. Awareness and skepticism towards unsolicited troubleshooting advice are crucial in protecting one's digital assets.

Impact: macOS, iCloud
Remediation: Users should avoid executing unknown Terminal commands and be cautious of unsolicited troubleshooting guides. Regularly update macOS and enable two-factor authentication for iCloud accounts to enhance security.
Read Original

Instructure, the edtech company known for its learning management systems, is facing a serious cybersecurity incident as the hacker group ShinyHunters claims responsibility for a second attack. This breach reportedly puts personal identifiable information (PII) of hundreds of millions of users at risk. The company is currently struggling to regain control and secure its systems from these hackers. The implications of this breach are significant, as it could lead to identity theft and other forms of exploitation for affected individuals. As the situation unfolds, users and institutions relying on Instructure's services need to stay vigilant about their data security.

Impact: Instructure's learning management systems and associated user data
Remediation: N/A
Read Original

A newly discovered zero-day vulnerability, dubbed 'Dirty Frag', affects most Linux distributions and allows attackers to escalate their privileges to root level. This means that a malicious actor could gain full control over a compromised system, putting sensitive data and operations at risk. The vulnerability is particularly concerning because it impacts a wide range of systems, making it a significant threat for both individual users and organizations that rely on Linux. Researchers are urging users and system administrators to take immediate action to secure their systems. The exact details of how this vulnerability can be exploited are still being analyzed, but the potential for active exploitation is high, prompting a call for swift remediation efforts.

Impact: Most Linux distributions
Remediation: Users should update their systems as soon as patches are available from their respective distribution maintainers.
Read Original

The Australian Cyber Security Center (ACSC) has alerted organizations about a new campaign distributing the Vidar Stealer malware through a method known as ClickFix. This technique employs social engineering tactics to trick users into downloading the malware, which is designed to steal sensitive information. The warning comes amidst growing concerns over the effectiveness of such tactics in infiltrating networks. Organizations in Australia need to be particularly vigilant as this campaign targets them directly, emphasizing the importance of user education and robust security practices. Failure to address these threats could lead to significant data breaches and financial losses.

Impact: Vidar Stealer malware
Remediation: Organizations should enhance user awareness training on social engineering tactics and implement robust email filtering solutions to block malicious content.
Read Original

A California man has been sentenced to over six years in prison for his involvement in a massive cryptocurrency heist that netted around $250 million. The criminal group he was part of targeted individuals believed to hold significant amounts of cryptocurrency from late 2023 to early 2025. They employed social engineering tactics to gain unauthorized access to victims' digital wallets, effectively stealing their assets. This incident illustrates the growing risk of cryptocurrency theft, particularly as more people invest in digital currencies. It serves as a stark reminder for cryptocurrency holders to enhance their security measures and remain vigilant against social engineering scams.

Impact: Cryptocurrency wallets, digital assets
Remediation: Users should implement strong security practices, such as two-factor authentication and educating themselves about social engineering tactics.
Read Original

A significant security incident has emerged involving U.S. military data exposed through a vulnerability in an open directory belonging to CMI Management Inc., a government contractor. This exposure was discovered following a tip-off to Cybernews, raising concerns about the potential accessibility of sensitive information. The data breach could have serious implications for national security, as it may include critical military-related information that should be kept confidential. Despite notifications from the Cybersecurity and Infrastructure Security Agency (CISA), the vulnerability remained unaddressed, highlighting lapses in data protection practices. The incident serves as a reminder for contractors handling government data to prioritize robust security measures and for agencies to ensure that vulnerabilities are promptly resolved.

Impact: U.S. military data, CMI Management Inc.
Remediation: Companies handling sensitive government data should implement strict access controls and regularly audit their directory listings to prevent unauthorized exposure.
Read Original

During the Milano Cortina 2026 Winter Games, which took place from February 6 to February 23, there was a significant increase in Distributed Denial of Service (DDoS) attacks. Researchers reported that the volume of attacks surged to six to ten times higher than historical levels, with a notable peak of over 2,200 attacks occurring on February 23. This spike in activity indicates that attackers were likely targeting the event's online infrastructure, which could disrupt services for attendees and viewers. The surge in DDoS attacks during such a high-profile event raises concerns for organizations involved in the games, as they need to bolster their cybersecurity measures to protect against these disruptions. Ensuring the integrity of digital platforms is crucial for both the event's success and the safety of participants and spectators.

Impact: N/A
Remediation: Organizations should enhance DDoS mitigation strategies, implement traffic filtering, and consider using cloud-based DDoS protection services.
Read Original

Poland's Internal Security Agency (ABW) has reported that hackers have successfully breached industrial control systems at five water treatment plants across the country. The attackers, believed to be linked to Russian advanced persistent threat (APT) groups, managed to gain access to systems that control vital equipment. This incident is part of a broader campaign that raises concerns about cybersecurity in critical infrastructure. The ability to alter equipment settings poses significant risks not only to the water supply but also to public safety. As these types of cyberattacks become more common, it is crucial for nations to bolster their defenses against potential hybrid warfare tactics.

Impact: Water treatment facilities, industrial control systems (ICS)
Remediation: Strengthening cybersecurity measures for industrial control systems, regular audits of security protocols, employee training on recognizing phishing attempts and other social engineering tactics.
Read Original

A recent report reveals that children can easily bypass online age verification systems. Many young users are familiar with various methods to circumvent these checks, often learning from their own experiences or from peers. This raises significant concerns about the effectiveness of age verification processes, which are designed to protect minors from accessing inappropriate content. The implications are serious, as ineffective age restrictions can expose children to harmful material online. As the internet continues to be a major source of information and entertainment for younger audiences, improving these verification systems becomes increasingly important to ensure their safety.

Impact: Online age verification systems
Remediation: Improve age verification methods and implement more robust checks to prevent circumvention.
Read Original
Page 1 of 192Next