Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

South Korea is preparing for its local elections next month, which will serve as a testing ground for new regulations aimed at combating deepfakes. These manipulated videos can spread misinformation and potentially influence public opinion during elections. As deepfakes become more sophisticated and accessible, the South Korean government is keen to see if their legal measures can effectively reduce the impact of these deceptive media. The outcome of this initiative could set a precedent for how other countries approach the regulation of deepfakes and misinformation in electoral processes. This is particularly relevant as deepfake technology poses a growing challenge to democratic processes worldwide.

Impact: Deepfake technology, misinformation in elections
Remediation: N/A
Read Original

A cybersecurity researcher has disclosed a serious vulnerability in Windows, known as 'MiniPlasma', which allows attackers to escalate their privileges to SYSTEM level on fully patched systems. This zero-day exploit poses a significant risk because it can enable unauthorized access to sensitive data and system controls. Users of Windows systems, particularly those in corporate environments, should be on high alert as this exploit can potentially be used in cyberattacks. The researcher has also released a proof-of-concept (PoC) for the exploit, which can facilitate its misuse by malicious actors. This situation underscores the need for immediate attention to system security measures and vigilance against potential exploitation.

Impact: Fully patched Windows systems, particularly versions that allow privilege escalation to SYSTEM level.
Remediation: Users should apply the latest security patches from Microsoft as they become available. Additionally, organizations should enhance their monitoring and detection capabilities to identify any suspicious activity that may indicate exploitation of this vulnerability.
Read Original

Attackers are exploiting a vulnerability in Funnel Builder, a tool used by online stores, to inject e-skimmers. These malicious scripts can steal payment information from unsuspecting customers during transactions. This incident affects e-commerce platforms that utilize Funnel Builder, potentially putting sensitive customer data at risk. As the holiday shopping season approaches, the urgency to address this vulnerability increases, as attackers may ramp up their efforts to exploit it. Companies using this tool should prioritize patching the identified bug to protect their customers and maintain trust.

Impact: Funnel Builder, e-commerce platforms
Remediation: Patch the Funnel Builder vulnerability as soon as possible to prevent e-skimmer injections.
Read Original

A serious vulnerability in NGINX, tracked as CVE-2026-42945, is currently being exploited in the wild, just days after it was disclosed. This flaw is a heap buffer overflow in the ngx_http_rewrite_module, which affects NGINX Plus and NGINX Open versions from 0.6.27 to 1.30.0. The CVSS score of 9.2 indicates a high severity, as it could lead to worker crashes and potentially allow remote code execution (RCE). Organizations using affected versions should prioritize patching their systems to prevent exploitation. Given the active nature of this threat, immediate action is crucial for maintaining security.

Impact: NGINX Plus and NGINX Open, versions 0.6.27 through 1.30.0.
Remediation: Users should update to the latest versions of NGINX Plus and NGINX Open to mitigate this vulnerability. Specific patch numbers or versions were not mentioned, so users should check the official NGINX website for updates.
Read Original
Scammers Send Physical Phishing Letters to Steal Ledger Wallet Seed Phrases

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Scammers are targeting Ledger wallet users in Italy by sending out physical letters that appear to be from the company. These letters contain QR codes designed to trick recipients into revealing their wallet seed phrases. This tactic exploits the trust users have in Ledger, a well-known cryptocurrency hardware wallet provider. By obtaining these seed phrases, scammers can gain access to users' cryptocurrency funds. It's crucial for crypto users to be vigilant and verify the authenticity of any communication they receive, especially those that ask for sensitive information. The incident underscores the ongoing risks associated with cryptocurrency security and the lengths that attackers will go to steal personal information.

Impact: Ledger cryptocurrency wallets
Remediation: Users should verify the authenticity of any communication from Ledger and avoid sharing their seed phrases. It is advisable to contact Ledger directly through official channels for any concerns.
Read Original
Grafana Says It Rejected Ransom Demand After Source Code Theft

Hackread – Cybersecurity News, Data Breaches, AI and More

Grafana has reported a security incident where hackers accessed its source code after obtaining a GitHub token. Fortunately, the company confirmed that no customer data or systems were compromised during this breach. Grafana's response included rejecting a ransom demand from the attackers, indicating they did not negotiate or pay for the stolen code. This incident raises concerns about the security of access tokens and the potential risks associated with code theft, even when customer data remains secure. Companies should review their token management practices to prevent similar incidents in the future.

Impact: Grafana source code, GitHub token management
Remediation: Review and strengthen token management practices; implement stricter access controls for source code repositories.
Read Original

Last week, Cisco released a patch for a zero-day vulnerability affecting its SD-WAN product. This flaw could allow attackers to gain unauthorized access to the network and potentially disrupt services. Meanwhile, a previously unpatched vulnerability in Microsoft Exchange Server has been actively exploited by attackers, putting many organizations at risk. These incidents highlight the ongoing challenges companies face in securing their systems against evolving threats. It’s crucial for affected users to apply the latest patches and take proactive measures to protect their networks.

Impact: Cisco SD-WAN, Microsoft Exchange Server
Remediation: Cisco has released a patch for the SD-WAN vulnerability. Users of Microsoft Exchange Server should apply any available security updates and review their systems for signs of exploitation.
Read Original

Pwn2Own Berlin 2026 concluded with DEVCORE emerging as the standout performer, successfully identifying 47 unique zero-day vulnerabilities during the event. Over three days, researchers earned a total of $1.29 million in rewards for their discoveries, showcasing the event's focus on security challenges across various platforms and applications. This year's competition not only highlighted the skills of participants but also underscored the ongoing need for robust cybersecurity measures in software development. With the number of zero-day vulnerabilities found, it emphasizes the vulnerabilities present in widely used systems and applications, prompting companies to reassess their security protocols. The event took place in conjunction with OffensiveCon, further connecting the research community with industry professionals.

Impact: Various software and applications used in cybersecurity
Remediation: N/A
Read Original

A serious vulnerability in the Funnel Builder plugin for WordPress is currently being exploited by attackers to inject harmful JavaScript into WooCommerce checkout pages. This manipulation aims to capture sensitive payment information from users during transactions. The situation was reported by Sansec, revealing that this flaw does not yet have an official Common Vulnerabilities and Exposures (CVE) identifier. Website owners using this plugin should be particularly vigilant, as the lack of a CVE means there may not be a widely known fix available at this time. This incident poses a significant risk, especially for e-commerce sites that rely on WooCommerce for processing payments.

Impact: Funnel Builder plugin for WordPress, WooCommerce checkout pages
Remediation: Website owners should immediately review their use of the Funnel Builder plugin and consider disabling it until a patch or workaround is made available. Regularly monitor for updates from the plugin's developers and apply any fixes as soon as they are released. Additionally, users should implement security measures such as web application firewalls to help mitigate potential attacks.
Read Original

The Russian hacker group known as Secret Blizzard has transformed its Kazuar backdoor into a more sophisticated modular peer-to-peer (P2P) botnet. This new version is designed for long-term stealth and effective data collection, making it a significant threat to targeted organizations. The botnet's P2P structure allows it to operate without relying on a central command server, which complicates detection and mitigation efforts. This development raises concerns for businesses and individuals alike, as it could lead to unauthorized data access and prolonged security breaches. Cybersecurity experts are urging organizations to enhance their defenses against these evolving threats, as the Kazuar botnet is likely to be used for various malicious activities, including espionage and data theft.

Impact: Kazuar backdoor, peer-to-peer botnet, targeted organizations
Remediation: Organizations should implement advanced threat detection systems, regularly update their security protocols, and conduct thorough network monitoring to identify unusual activities.
Read Original

OpenAI confirmed that a supply chain attack linked to malicious TanStack packages compromised two of its employee devices. This breach exposed sensitive credentials from the company's internal source code repositories. The attackers, part of a group known as TeamPCP, exploited vulnerabilities in the package publishing process to gain access. This incident raises concerns about the security of software supply chains, as it demonstrates how vulnerabilities can lead to significant data exposure. Organizations must be vigilant in monitoring their package management systems to prevent similar attacks.

Impact: OpenAI employee devices, internal source code repositories
Remediation: Organizations should review and secure their package publishing processes, implement stricter access controls, and monitor for unauthorized changes or access.
Read Original

TeamPCP has released the source code for a variant of the Shai-Hulud malware, which has been implicated in recent attacks against companies like TanStack. While researchers indicate that this particular version is not the original malware, its release poses a risk as it may enable other attackers to replicate or modify the malware for their own use. The significance of this release lies in the potential for increased attacks against vulnerable systems, as the source code can be used by less skilled cybercriminals. Organizations need to remain vigilant and strengthen their defenses in light of this development to protect against possible exploits stemming from the released code.

Impact: TanStack and other unspecified organizations
Remediation: Organizations should enhance security measures and monitor for unusual activity. Patching systems and employing intrusion detection systems may also be advisable to mitigate risks.
Read Original
Actively Exploited

Hackers are using PyInstaller to disguise XWorm malware, which is being delivered through deceptive emails or fake software updates that contain seemingly harmless files. Once a victim opens the infected file, the malware can execute and potentially compromise the user’s system. This tactic not only makes it difficult for antivirus programs to detect the malware but also highlights the ongoing risks associated with social engineering attacks. Users and organizations need to be cautious about unsolicited emails and software updates, ensuring they verify the source before downloading or opening any files. This incident serves as a reminder of the importance of cybersecurity awareness and vigilance in protecting personal and sensitive information.

Impact: XWorm malware, affected users of deceptive emails and fake software updates
Remediation: Users should be cautious with unsolicited emails and software updates; ensure to verify sources before downloading files.
Read Original

The Federal Trade Commission (FTC) is now enforcing the Take It Down Act, a law aimed at combating nonconsensual intimate imagery and AI-generated deepfakes. Under this law, online platforms are required to remove such content within 48 hours after a victim reports it. This is significant as it provides victims with a quicker pathway to protect their privacy and dignity against harmful digital forgeries. The act reflects growing concerns about the misuse of technology to create and share intimate images without consent, which can have devastating effects on individuals. By imposing strict removal timelines, the FTC is taking steps to hold platforms accountable and enhance user safety online.

Impact: Online platforms that host user-generated content
Remediation: Platforms must establish and implement processes to remove nonconsensual imagery within 48 hours of receiving a report.
Read Original

During a recent meeting between U.S. officials and Chinese leaders, security concerns prompted American personnel to leave behind certain items, including burner phones and lapel pins that were presented as gifts. This decision reflects ongoing worries about surveillance and data security, particularly in high-stakes diplomatic interactions. By discarding these items, U.S. officials are taking precautionary measures to prevent potential breaches of sensitive information. The move highlights the increasing focus on cybersecurity in international relations and the lengths officials will go to protect their communications. This incident serves as a reminder of the vulnerabilities that can arise when dealing with foreign governments, especially in contexts where trust is limited.

Impact: N/A
Remediation: N/A
Read Original
Page 1 of 202Next