Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

TeamPCP has released the source code for a variant of the Shai-Hulud malware, which has been implicated in recent attacks against companies like TanStack. While researchers indicate that this particular version is not the original malware, its release poses a risk as it may enable other attackers to replicate or modify the malware for their own use. The significance of this release lies in the potential for increased attacks against vulnerable systems, as the source code can be used by less skilled cybercriminals. Organizations need to remain vigilant and strengthen their defenses in light of this development to protect against possible exploits stemming from the released code.

Impact: TanStack and other unspecified organizations
Remediation: Organizations should enhance security measures and monitor for unusual activity. Patching systems and employing intrusion detection systems may also be advisable to mitigate risks.
Read Original
Actively Exploited

Hackers are using PyInstaller to disguise XWorm malware, which is being delivered through deceptive emails or fake software updates that contain seemingly harmless files. Once a victim opens the infected file, the malware can execute and potentially compromise the user’s system. This tactic not only makes it difficult for antivirus programs to detect the malware but also highlights the ongoing risks associated with social engineering attacks. Users and organizations need to be cautious about unsolicited emails and software updates, ensuring they verify the source before downloading or opening any files. This incident serves as a reminder of the importance of cybersecurity awareness and vigilance in protecting personal and sensitive information.

Impact: XWorm malware, affected users of deceptive emails and fake software updates
Remediation: Users should be cautious with unsolicited emails and software updates; ensure to verify sources before downloading files.
Read Original

The Federal Trade Commission (FTC) is now enforcing the Take It Down Act, a law aimed at combating nonconsensual intimate imagery and AI-generated deepfakes. Under this law, online platforms are required to remove such content within 48 hours after a victim reports it. This is significant as it provides victims with a quicker pathway to protect their privacy and dignity against harmful digital forgeries. The act reflects growing concerns about the misuse of technology to create and share intimate images without consent, which can have devastating effects on individuals. By imposing strict removal timelines, the FTC is taking steps to hold platforms accountable and enhance user safety online.

Impact: Online platforms that host user-generated content
Remediation: Platforms must establish and implement processes to remove nonconsensual imagery within 48 hours of receiving a report.
Read Original

During a recent meeting between U.S. officials and Chinese leaders, security concerns prompted American personnel to leave behind certain items, including burner phones and lapel pins that were presented as gifts. This decision reflects ongoing worries about surveillance and data security, particularly in high-stakes diplomatic interactions. By discarding these items, U.S. officials are taking precautionary measures to prevent potential breaches of sensitive information. The move highlights the increasing focus on cybersecurity in international relations and the lengths officials will go to protect their communications. This incident serves as a reminder of the vulnerabilities that can arise when dealing with foreign governments, especially in contexts where trust is limited.

Impact: N/A
Remediation: N/A
Read Original

ESET has reported a new campaign by the hacking group known as Ghostwriter, which is targeting the Ukrainian government. The campaign starts with a spear-phishing email that contains a PDF attachment disguised as an official document from Ukrtelecom, a key telecommunications provider in Ukraine. This type of attack aims to trick recipients into opening the attachment, potentially leading to further malicious activity. The focus on Ukrainian government entities indicates a continued effort by cybercriminals to exploit vulnerabilities in the region, particularly amid ongoing geopolitical tensions. Such attacks can undermine trust in government communications and disrupt essential services.

Impact: Ukrtelecom, Ukrainian government agencies
Remediation: Users should be cautious about unsolicited emails and verify the authenticity of attachments before opening them. Implementing email filtering and security awareness training can also help mitigate risks.
Read Original

A vulnerability in the Funnel Builder plugin for WordPress, which is used by over 40,000 websites, has been exploited by attackers to steal payment data. This flaw allows unauthenticated users to change global settings through an unprotected checkout endpoint. As a result, any website using this plugin could be at risk of having sensitive payment information compromised. Website owners should take immediate action to secure their sites, as the potential for financial loss and damage to customer trust is significant. This incident serves as a reminder for users to regularly update their plugins and monitor for security patches.

Impact: Funnel Builder plugin for WordPress, used by over 40,000 websites
Remediation: Website owners should update the Funnel Builder plugin to the latest version as soon as a patch is available, and review their website security settings to ensure proper protection against unauthorized access.
Read Original

The Federal Trade Commission (FTC) is stepping up its enforcement of the Take It Down Act, which aims to combat the online sharing of explicit images without consent. The agency plans to impose significant fines on those who violate the law and has promised to initiate investigations against offenders. While this move is a strong statement against non-consensual sharing, experts have raised concerns about the FTC's resources and priorities in handling such cases. The effectiveness of these measures will depend on how the agency allocates its resources in the face of ongoing challenges in online safety. This law is particularly important as it seeks to protect individuals from harmful digital practices that can have lasting emotional and social consequences.

Impact: Take It Down Act violations
Remediation: N/A
Read Original

Hackers have compromised the popular node-ipc npm package, adding malware designed to steal user credentials in recent versions. This supply chain attack specifically targets developers who rely on node-ipc for inter-process communication in their applications. Users of the affected package are at risk of having their sensitive information, such as passwords and tokens, captured by the malicious code. This incident serves as a reminder of the vulnerabilities that can arise in the software supply chain, affecting not just individual developers but also the larger ecosystem that relies on these packages. Developers are urged to review their dependencies and ensure they are using safe versions of node-ipc to protect their credentials.

Impact: node-ipc npm package
Remediation: Developers should update to the latest safe version of node-ipc and review their project dependencies for any other compromised packages.
Read Original

Microsoft has confirmed that a new zero-day vulnerability in Exchange Server, identified as CVE-2026-42897, is being actively exploited by attackers. This vulnerability has a CVSS score of 8.1, indicating a high level of severity. It stems from improper handling of user input during web page generation, which can lead to cross-site scripting (XSS) attacks. Organizations using affected versions of Exchange Server are at risk, as attackers could exploit this flaw to execute malicious scripts in the context of users' browsers. Microsoft urges users to take immediate action to protect their systems and data from potential breaches.

Impact: Microsoft Exchange Server (specific versions not detailed)
Remediation: Microsoft recommends that users apply available security updates to their Exchange Server installations. Regularly updating systems and monitoring for unusual activity are also advised as general best practices.
Read Original

The REMUS infostealer is a malware that focuses on stealing browser sessions and authentication tokens, which are now considered more valuable than traditional passwords. Researchers from Flare have observed its rapid evolution, emphasizing its capability for session theft and operational scalability. This malware allows attackers to hijack users' online accounts without needing to crack passwords, posing a significant risk to individuals and organizations alike. As cybercriminals increasingly adopt this method, users must be vigilant about their online security practices. The shift towards session theft indicates a growing trend in cyberattacks that could affect a wide range of online services and platforms.

Impact: Browser sessions, authentication tokens
Remediation: Users should enable two-factor authentication where possible and regularly update their passwords. Monitoring account activity for unauthorized access is also recommended.
Read Original

Researchers have identified four vulnerabilities in OpenClaw, a software framework that could be exploited by attackers to steal data, gain higher privileges, and maintain persistent access to systems. These vulnerabilities, referred to as Claw Chain, allow cybercriminals to infiltrate systems, extract sensitive information, and install backdoors for ongoing access. The flaws pose a significant risk to organizations using OpenClaw, as they can lead to serious data breaches and unauthorized control over affected systems. Companies that rely on this software should take immediate action to address these vulnerabilities to protect their data and systems from potential exploitation.

Impact: OpenClaw software framework
Remediation: Users should apply available patches, review system configurations, and monitor for unusual activity to mitigate risks associated with these vulnerabilities.
Read Original

IT subcontractors are facing a new challenge that goes beyond traditional cybersecurity threats like data breaches and ransomware. Starting in 2026, the costs associated with cyber insurance are becoming a significant factor in contract negotiations. Many firms are finding that their insurance premiums or coverage limits are impacting their ability to secure contracts, as clients increasingly prioritize the financial stability provided by insurance over the actual cybersecurity measures in place. This shift may force subcontractors to rethink their approaches to both security and insurance, as the balance between risk management and contract acquisition becomes more complex. As the industry evolves, understanding the implications of insurance on contract viability will be crucial for IT firms moving forward.

Impact: IT subcontractors, cyber insurance policies
Remediation: IT subcontractors should evaluate their insurance policies and consider how coverage limits might affect their contract opportunities. They may also need to enhance their cybersecurity measures to reassure clients about their risk management.
Read Original
Actively Exploited

Cisco has released a patch for a serious security vulnerability (CVE-2026-20182) affecting its Catalyst SD-WAN solutions. This flaw allows attackers to bypass authentication in both the Catalyst SD-WAN Controller and the Catalyst SD-WAN Manager, which are critical components for managing SD-WAN deployments. The vulnerability has been actively exploited by a sophisticated cyber threat actor, putting both on-premises and cloud users at risk. Organizations using these Cisco products should prioritize applying the patch to safeguard their networks from potential breaches. Failure to address this vulnerability could lead to unauthorized access and significant security incidents.

Impact: Cisco Catalyst SD-WAN Controller, Cisco Catalyst SD-WAN Manager, both on-prem and cloud deployments
Remediation: Cisco has released patches for CVE-2026-20182. Users are advised to update their systems immediately to mitigate the risk of exploitation. Specific patch numbers or versions were not provided in the article.
Read Original

Microsoft has issued a warning regarding a zero-day vulnerability in Exchange Server, identified as CVE-2026-42897, which is currently being exploited by attackers. This vulnerability affects various versions of Exchange Server, putting organizations that use this software at risk. Microsoft has not yet released a permanent patch but has provided interim mitigations to help secure affected systems. Users and administrators are urged to implement these mitigations to protect their environments until a comprehensive fix is available. The active exploitation of this vulnerability underscores the urgency for affected organizations to take immediate action.

Impact: Microsoft Exchange Server versions affected by CVE-2026-42897.
Remediation: Microsoft has shared mitigations for CVE-2026-42897 until a permanent patch can be released. Specific details on the mitigations were not provided in the article.
Read Original

The article emphasizes the growing importance of AI resilience in the face of security breaches, suggesting that companies should focus not only on speed but also on the durability of their AI systems. It argues that as AI becomes more integrated into business operations, the potential for breaches increases, and organizations must prepare to withstand these attacks. This resilience involves safeguarding both the AI models and the training data used to create them. The piece calls for businesses to rethink their security strategies and invest in robust defenses to ensure their survival in an increasingly AI-driven world. This is particularly relevant as the frequency and sophistication of cyberattacks continue to rise.

Impact: AI models, training data, enterprise security systems
Remediation: Companies should invest in AI resilience strategies, including securing AI models and training data.
Read Original
Page 1 of 201Next