Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Booking.com has reported a data breach involving unauthorized access to its systems, which has compromised sensitive reservation and user data. The company is urging affected users to reset their reservation PINs as a precautionary measure. This incident raises significant concerns for travelers who use the booking platform, as the exposed data could potentially be used for fraudulent activities. Booking.com has not disclosed the exact number of users affected or the specific data that was accessed, but the breach underscores the ongoing risks associated with online booking systems. Users are advised to monitor their accounts for any suspicious activity and to take steps to secure their information.

Impact: Booking.com user accounts and reservation data
Remediation: Users are advised to reset their reservation PINs.
Read Original

Anthropic has introduced a new AI model called Claude Mythos Preview, which has raised concerns in the cybersecurity community due to its potential for cyberattack capabilities. To mitigate these risks, Anthropic is not releasing the model to the public and has initiated Project Glasswing. This project aims to test the model against a variety of software—both public and proprietary—to identify and fix vulnerabilities before they can be exploited by malicious actors. The focus on preemptively addressing weaknesses highlights the growing intersection of AI technology and cybersecurity. As AI models become more advanced, the potential for misuse increases, making it crucial for companies to stay ahead of potential threats.

Impact: Claude Mythos Preview, public domain software, proprietary software
Remediation: Identify and patch vulnerabilities in software tested against the model
Read Original

Security researchers have identified a new Android banking trojan called Mirax, which is targeting users across Europe. This malware utilizes a method known as Malware-as-a-Service (MaaS) to infect devices, allowing cybercriminals to gain remote access and turn affected smartphones into residential proxy nodes. By doing this, attackers can route their malicious activities through the compromised devices, making it harder to trace their actions back to them. This poses a significant risk to users, as their personal data and banking information could be at risk. The emergence of Mirax highlights ongoing vulnerabilities in mobile security and the need for users to remain vigilant against such threats.

Impact: Android devices
Remediation: Users should ensure their devices are protected with up-to-date security software, avoid downloading apps from untrusted sources, and regularly monitor their bank accounts for suspicious activity.
Read Original

Booking.com has reported that hackers gained access to user information, although the company has not disclosed how many customers were affected. They have stated that the situation has been contained, but specifics about the type of data compromised remain unclear. This incident raises concerns for users who may have shared sensitive booking details on the platform. Protecting user data is crucial for maintaining trust in online services, especially in industries like travel where personal information is frequently exchanged. Booking.com will likely need to assess its security measures to prevent future breaches and reassure customers about their data safety.

Impact: Booking.com user accounts and associated booking information
Remediation: N/A
Read Original

A new infostealer called 'Storm' has emerged, capable of hijacking user sessions by decrypting data on the server side rather than locally. This technique allows attackers to bypass traditional security measures like passwords and multi-factor authentication (MFA). Researchers from Varonis have demonstrated how the infostealer sends sensitive browser data directly to the attackers' servers, raising significant concerns about user privacy and account security. The implications are serious, as organizations relying on standard security protocols may find themselves vulnerable to these sophisticated attacks. Companies should be vigilant and assess their security measures to protect against this evolving threat.

Impact: Web browsers and online accounts that rely on session management and MFA.
Remediation: Implement enhanced security measures such as stronger session management, continuous monitoring of user sessions, and consider additional layers of authentication beyond MFA.
Read Original

Recent allegations suggest that Microsoft is engaging in corporate espionage through its LinkedIn browser extension, raising concerns about user privacy. However, security researchers are analyzing these claims and have found mixed results regarding the extent of data collection by the extension. While some users are worried about their information being tracked or misused, the research indicates that the data collection practices may not be as invasive as initially claimed. This debate over LinkedIn's data handling practices is crucial as it could impact user trust and privacy standards across similar platforms. Understanding the reality behind these accusations is important for users who rely on LinkedIn for networking and job opportunities.

Impact: LinkedIn browser extension
Remediation: Users should review their privacy settings on LinkedIn and consider limiting permissions for the browser extension.
Read Original

A recent report indicates that AI browser extensions are more likely to contain known security vulnerabilities compared to other types of extensions. The study found that these AI tools often request permissions related to cookies, scripting, and tabs, which can increase the risk of exploitation. Users of these extensions may unknowingly expose themselves to threats as these vulnerabilities can allow attackers to manipulate browser behavior or access sensitive data. This situation raises concerns for both individual users and organizations that rely on these AI tools for productivity. As the popularity of AI extensions grows, it becomes increasingly important for developers to prioritize security in their design and for users to remain vigilant about the permissions granted to these tools.

Impact: AI browser extensions
Remediation: Users should review the permissions requested by AI extensions and consider avoiding those that ask for unnecessary access. Developers are encouraged to conduct regular security audits and updates to mitigate known vulnerabilities.
Read Original

An international law enforcement operation has successfully frozen over $12 million linked to cryptocurrency scams and identified more than 20,000 victims. The crackdown revealed that suspected losses from cryptocurrency fraud worldwide exceed $45 million. One notable case involved a victim from the UK who lost more than £52,000. According to the FBI, cryptocurrency scams are a significant issue, with total losses reaching $11.3 billion. This incident underscores the ongoing risks associated with cryptocurrency investments, highlighting the need for increased awareness and caution among potential investors.

Impact: Cryptocurrency scams affecting individuals and investors globally
Remediation: Individuals are advised to conduct thorough research before investing in cryptocurrency and to report suspicious activities to law enforcement.
Read Original

OpenAI has confirmed that it was affected by a supply chain hack linked to North Korean attackers, specifically involving a compromised macOS code signing certificate. This incident raises concerns about the security of software supply chains, as attackers can use such certificates to sign malicious software, making it appear legitimate. OpenAI is now taking steps to mitigate any potential risks associated with this breach. The impact of this incident could extend beyond OpenAI, affecting users who rely on their software for various applications. The situation underscores the need for enhanced security measures in software development and distribution to protect against similar future attacks.

Impact: OpenAI's macOS applications that utilize the compromised code signing certificate.
Remediation: OpenAI is taking action to secure its systems but specific remediation steps have not been detailed.
Read Original

Last week, Anthropic took action to limit access to its Mythos Preview model after it autonomously discovered and exploited zero-day vulnerabilities across all major operating systems and web browsers. This incident raises alarms among cybersecurity experts, with Palo Alto Networks' Wendi Whitmore warning that similar capabilities could soon be available to malicious actors. According to CrowdStrike's 2026 Global Threat Report, the average time for eCrime to escalate into an attack is just 29 minutes, emphasizing the urgency for organizations to address vulnerabilities quickly. The implications of such advanced AI-driven exploits could make it significantly easier for attackers to compromise systems, putting countless users and organizations at risk. Companies need to be vigilant and enhance their security protocols to prevent potential breaches.

Impact: All major operating systems and web browsers
Remediation: Organizations should enhance their security protocols and monitor for unusual activity; specific patches or updates were not mentioned.
Read Original

Google is enhancing the security of its Pixel smartphones by focusing on the cellular baseband modem, which is responsible for mobile network communication. In the previous Pixel 9 model, the company implemented measures to mitigate memory-related vulnerabilities. With the upcoming Pixel 10, Google is taking further steps by incorporating a DNS parser built in the Rust programming language into the modem firmware. This change aims to bolster the device's defenses against potential exploitation of the modem, which can process external data. By addressing these vulnerabilities, Google is working to protect users from possible attacks that could compromise their devices through the modem interface.

Impact: Google Pixel 10 smartphones
Remediation: N/A
Read Original

The FBI has successfully dismantled a phishing operation known as W3LL, which was linked to fraudulent activities totaling around $20 million. This operation utilized a specialized phishing kit that enabled attackers to trick individuals into providing sensitive information. The takedown is a significant step in combating online fraud, as phishing remains a common tactic used by cybercriminals to exploit unsuspecting users. The operation's disruption not only affects the criminals behind it but also aims to protect potential victims from falling prey to similar scams. Authorities are urging individuals and businesses to remain vigilant against phishing attempts, which can lead to financial loss and data breaches.

Impact: N/A
Remediation: Users are advised to be cautious of unsolicited communications and verify the authenticity of requests for personal information.
Read Original
Alleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand

Hackread – Cybersecurity News, Data Breaches, AI and More

A German national, suspected of being a key figure in the DDoS-for-hire scene, was arrested in Thailand. This individual is believed to be the mastermind behind services like Fluxstress and Neldowner, which have been used to launch distributed denial-of-service (DDoS) attacks globally. His arrest marks a significant step in combating online cybercrime, particularly as DDoS attacks continue to disrupt businesses and services across various sectors. The operation he led allowed users to pay for attacks that could overwhelm targets, causing significant downtime and financial losses. His capture may deter others from engaging in similar illegal activities and could lead to further investigations into the networks supporting these services.

Impact: N/A
Remediation: N/A
Read Original

In a significant crackdown on identity fraud, Dutch police arrested eight men, aged 20 to 34, during an operation targeting the VerifTools platform on April 7 and 8. The suspects are linked to identity fraud, forgery, and various cybercrime offenses. Authorities seized a substantial amount of evidence, including smartphones, laptops, cash, cryptocurrency, and weapons. This investigation stems from a case that began on August 27, 2025, when police discovered that VerifTools was facilitating the creation of fake identification documents. The seizure of over 915,655 fake IDs raises concerns about the ease with which such fraudulent activities can be carried out and the potential risks to personal security and public safety.

Impact: VerifTools platform, fake identification documents
Remediation: N/A
Read Original

Kaspersky's GReAT team has reported on a new campaign involving JanelaRAT, a type of remote access trojan that specifically targets financial information from users in Latin America. This malware is designed to steal sensitive data, including banking credentials, by infecting victims' devices through a series of sophisticated techniques. The infection process and the functionality of the malware have both been updated, making it more dangerous than previous versions. This campaign is particularly concerning as it highlights the ongoing risks to financial security for users in the region, especially given the rise of online banking and digital transactions. Users in Latin America need to be aware of this threat and take steps to protect their financial information.

Impact: Users in Latin America, financial institutions, banking systems
Remediation: Users should ensure their antivirus software is up to date, avoid clicking on suspicious links, and be cautious with unsolicited emails or messages.
Read Original
Page 1 of 152Next