Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Actively Exploited

The latest Malware newsletter from Security Affairs reports on several significant cybersecurity threats. One notable incident involves new malware specifically targeting users of Cobra DocGuard software, potentially compromising sensitive data. Additionally, Iranian cyber actors have been using Telegram as a command and control channel to distribute malware to predetermined targets, raising concerns about state-sponsored cyber activities. The newsletter also discusses the Trivy supply chain attack, which has now expanded to include compromised Docker images, putting many containerized applications at risk. Lastly, a new malware called VoidStealer has been identified, which manipulates Chrome debugging tools to extract user information. These developments highlight ongoing vulnerabilities in software and the tactics employed by cybercriminals and state actors alike.

Impact: Cobra DocGuard software, Docker images, Google Chrome
Remediation: Users of affected software should update to the latest versions and apply security patches as they become available. It's also recommended to monitor network traffic for unusual activity and to use security tools that can detect and block malware.
Read Original

In a recent cybersecurity incident, the hacking group ShinyHunters has claimed responsibility for breaching a European Commission group linked to Iran, known as Handala. This attack has raised concerns about the security of sensitive information and the potential implications for international relations. Additionally, the group reportedly hacked FBI Director Kash Patel’s personal data, which could expose vulnerabilities in U.S. federal cybersecurity measures. The incidents underline the ongoing risks associated with state-sponsored hacking and the need for improved defenses against such threats. As these attacks come to light, organizations and governments may need to reassess their cybersecurity protocols to protect against similar intrusions in the future.

Impact: European Commission, Handala group, FBI Director Kash Patel
Remediation: Organizations should review and strengthen their cybersecurity measures, including implementing advanced threat detection and response strategies.
Read Original

At the BSides SF 2026 hacker conference, a researcher warned that Software as a Service (SaaS) and cloud assets are increasingly vulnerable to identity-based ransomware attacks. This type of attack exploits weaknesses in identity management systems, allowing attackers to gain unauthorized access and encrypt critical data. Organizations that rely on cloud services for their operations, especially those with inadequate security measures in place, are at significant risk. The researcher emphasized that as more businesses transition to these platforms, the need for robust identity protection becomes essential. Companies should prioritize enhancing their identity security protocols to mitigate these risks and protect sensitive customer information.

Impact: SaaS platforms, cloud services
Remediation: Enhance identity security protocols, implement two-factor authentication, conduct regular security assessments
Read Original

At the RSAC 2026 conference, researchers discussed the emergence of Shai-Hulud worms, which have taken advantage of automatic updates in open-source software repositories. They warned that these types of supply-chain attacks may become more common, posing significant risks to software integrity and security. This could affect a wide range of organizations that rely on open-source software for their operations. The implications are serious, as attackers could potentially infiltrate systems through seemingly legitimate software updates, compromising sensitive data and systems. Companies using open-source solutions need to be vigilant and implement stricter security measures to protect against these evolving threats.

Impact: Open-source software repositories, automatic update systems
Remediation: Implement stricter security measures for software updates, conduct regular audits of dependencies
Read Original
Lloyds Group to Compensate 450,000 Customers After App Glitch

Hackread – Cybersecurity News, Data Breaches, AI and More

Lloyds Banking Group has announced plans to compensate around 450,000 customers due to a glitch in their mobile banking app that unintentionally exposed sensitive customer data. The issue arose when certain users were able to see details of other customers' accounts, including names and transaction histories. This incident raises significant concerns about data privacy and security, as affected individuals may worry about the potential misuse of their information. Lloyds is working to address the problem and ensure that such vulnerabilities are not repeated in the future. The compensation is part of their effort to regain customer trust after this security mishap.

Impact: Lloyds Banking Group mobile banking app
Remediation: Investigation into the glitch and compensation for affected customers
Read Original

An Iranian hacking group named Handala claims to have breached the personal email account of FBI Director Kash Patel, leaking various files and photos. The FBI has acknowledged the incident but stated that no sensitive government data was compromised in the breach. This incident raises concerns about the security of personal accounts held by high-ranking officials, as attackers may seek to exploit such information for various motives. While the FBI is aware of the situation, the lack of exposed government data may provide some reassurance, though it still points to the ongoing risks posed by state-sponsored hacking groups targeting individuals in influential positions.

Impact: Personal email account of FBI Director Kash Patel, potentially impacting confidential communications.
Remediation: Users should enable two-factor authentication on personal email accounts and monitor for any suspicious activity.
Read Original
ShinyHunters Walk Away from BreachForums, Leak 300,000-User Database

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

ShinyHunters, a notorious hacking group, has departed from BreachForums and leaked a database containing information on 300,000 users. This data breach raises alarms as ShinyHunters warns that all active domains associated with the leak are fake, suggesting that users should be cautious of phishing attempts. The group has also threatened to release more data from forum backups, indicating that the situation could worsen. Users affected by this breach may have their personal information exposed, which could lead to identity theft or other malicious activities. This incident underscores the ongoing risks associated with online forums and the potential for significant data leaks.

Impact: 300,000 user accounts from BreachForums
Remediation: Users should monitor their accounts for unusual activity and consider changing passwords, especially if they reused them across different sites.
Read Original

Researchers from OX Security have found that AI coding assistants often make the same types of mistakes as human developers. This suggests that while these tools can increase productivity, they are not infallible and can introduce coding errors into software. The study emphasizes the need for developers to treat AI tools like junior developers, meaning they should verify and review the code generated by these assistants thoroughly. This approach is crucial for companies relying on AI for software development, as it highlights the importance of maintaining coding standards and ensuring quality control. The findings serve as a reminder that while AI can assist in coding, human oversight is still essential to catch errors that could lead to vulnerabilities in applications.

Impact: AI coding assistants used in software development
Remediation: Developers should review and verify AI-generated code to catch potential errors.
Read Original

The European Commission reported a cyberattack that targeted its cloud infrastructure, specifically affecting the systems that host its Europa.eu websites. The attack was detected on March 24 and was swiftly contained, with measures put in place to prevent any disruption to website availability. Fortunately, there was no impact on the Commission's internal networks. Initial investigations indicate that while the attack was serious enough to warrant immediate action, it did not compromise the integrity or accessibility of the websites involved. This incident raises concerns about the security of cloud systems used by public institutions and emphasizes the need for robust cybersecurity measures.

Impact: Cloud infrastructure hosting Europa.eu websites
Remediation: Incident contained with mitigation measures applied
Read Original

The article discusses the rise of scam baiting, where individuals actively engage with scammers to waste their time and expose their tactics. This practice has gained traction as a means to combat online fraud while providing entertainment. With advancements in AI, some scammers are using automated systems to enhance their operations, making it harder for victims to spot deceit. The article emphasizes the ethical implications of scam baiting and the potential risks involved, highlighting that while it can be a form of resistance against scammers, it may also lead to unintended consequences for those who engage in it. As scammers evolve, so must the strategies to combat them, raising questions about the effectiveness and safety of such countermeasures.

Impact: N/A
Remediation: N/A
Read Original

Iranian hackers known as Handala have claimed to have compromised the personal data of FBI Director Kash Patel. The FBI has confirmed that Patel's personal email was targeted, but they stated that no government information was accessed during this breach. This incident raises concerns about the security of personal information for high-ranking officials, especially given the ongoing threat posed by state-sponsored hackers. The fact that a figure like Patel is targeted highlights the potential risks to national security and the importance of robust personal cybersecurity measures for public officials. While the FBI is investigating the incident, the situation serves as a reminder of the vulnerabilities that exist even at the highest levels of government.

Impact: FBI Director Kash Patel's personal email
Remediation: N/A
Read Original

TeamPCP, a group known for supply chain attacks, has targeted the Telnyx Python package by releasing two malicious versions (4.87.1 and 4.87.2) on March 27, 2026. These versions, available on the Python Package Index (PyPI), are designed to steal sensitive user data by hiding their credential-stealing features within .WAV files. This incident poses a significant risk to developers and organizations that rely on the Telnyx package for their applications, as it can lead to unauthorized access to sensitive data. Users who downloaded these versions may unknowingly expose their credentials, making it crucial for the community to act swiftly to mitigate potential damage.

Impact: Telnyx Python package versions 4.87.1 and 4.87.2
Remediation: Users should immediately remove the malicious versions of the Telnyx package and replace them with a secure version. It is also recommended to review and reset any credentials that may have been compromised.
Read Original

Researchers at Endor Labs have reported that the TeamPCP group has compromised the Telnyx package on the Python Package Index (PyPI). Versions 4.87.1 and 4.87.2 of the Telnyx SDK, which is used for the Telnyx AI Voice Agent service, were modified to include malicious code. The first version contained non-functional malicious code, while the second version may pose a greater risk. This incident highlights the ongoing risks associated with supply chain attacks, where attackers modify legitimate software to distribute malware. Developers and organizations using this SDK should be vigilant and consider removing or updating their versions immediately to mitigate any potential threats.

Impact: Telnyx SDK versions 4.87.1 and 4.87.2 on PyPI
Remediation: Remove or update the Telnyx SDK to the latest secure version.
Read Original

Recent reports indicate a significant decline in infrastructure attacks that could lead to physical consequences, specifically a 25% drop in incidents targeting operational technology (OT) at industrial and critical infrastructure sites. This decrease appears to be linked to a temporary lull in ransomware attacks and hackers' limited understanding of OT systems. While this might seem like positive news, the underlying issue remains that many attackers still lack expertise in these environments, which could change. This situation raises concerns about the long-term security posture of critical infrastructure, as attackers could eventually adapt and exploit these vulnerabilities. Companies operating in these sectors should remain vigilant and enhance their security measures to protect against potential threats in the future.

Impact: Operational technology systems at industrial and critical infrastructure sites
Remediation: Companies should enhance their security measures and monitor for potential threats.
Read Original

The European Commission is looking into a security breach involving its Amazon cloud infrastructure. Unauthorized access was gained by a threat actor, raising concerns about the potential exposure of sensitive data. This incident is particularly significant because it affects a major governmental body within the European Union, which handles important regulatory and policy decisions. The investigation aims to assess the scope of the breach and determine any necessary actions to safeguard data moving forward. This incident serves as a reminder of the vulnerabilities that can exist even within high-profile organizations and the importance of robust security measures in cloud environments.

Impact: Amazon cloud infrastructure, European Commission data
Remediation: N/A
Read Original
Page 1 of 131Next