Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A serious vulnerability has been identified in the WPvivid backup plugin, tracked as CVE-2026-1357, which has a high severity score of 9.8. This issue affects all versions of the plugin up to version 0.9.123, leaving many WordPress sites potentially at risk. The flaw allows attackers to execute remote code, which could lead to unauthorized access or control over affected systems. Users of the plugin are strongly advised to take immediate action to protect their sites. This vulnerability poses a significant threat, especially for those who have not updated their plugins recently.

Impact: WPvivid backup plugin, all versions up to 0.9.123
Remediation: Users should update the WPvivid backup plugin to the latest version to mitigate this vulnerability.
Read Original

Nation-state hackers from countries like China and Russia have targeted the defense industrial base by exploiting at least two dozen zero-day vulnerabilities in edge devices. These vulnerabilities were used in attempts to breach the networks of defense contractors, raising concerns about national security and the integrity of sensitive military information. The attacks indicate a sophisticated level of planning and execution, as attackers often seek to gain access to critical infrastructure and proprietary technology. This ongoing threat emphasizes the need for defense contractors to enhance their cybersecurity measures and remain vigilant against such espionage efforts. As these hackers continue to evolve their tactics, the potential risks to national defense capabilities grow.

Impact: Edge devices used by defense contractors
Remediation: Defense contractors should implement security patches for affected edge devices, conduct regular security assessments, and enhance monitoring for unusual network activity.
Read Original

As organizations increasingly deploy AI agents that work together, they are inadvertently broadening their attack surface. This shift means that systems are becoming more complex and potentially more vulnerable to cyber threats. The interaction of multiple AI agents can create new entry points for attackers, making it crucial for companies to reassess their security protocols. The article calls attention to the need for stronger defenses and better monitoring as the use of collaborative AI grows. Companies must prepare for the potential risks associated with these advancements to protect sensitive data and maintain operational integrity.

Impact: N/A
Remediation: Companies should reassess their security protocols and implement stronger defenses and monitoring practices.
Read Original
What Interoperability in Healthcare Really Means for Security and Privacy

Hackread – Cybersecurity News, Data Breaches, AI and More

The article discusses how improving interoperability in healthcare systems can enhance patient care but also poses significant security and privacy risks. As healthcare organizations increasingly connect their systems, they expose more data to potential cyberattacks. This expanded attack surface raises compliance concerns and complicates security efforts, putting sensitive patient information at greater risk. The interconnected nature of these systems means that a breach in one area could have cascading effects across multiple platforms, affecting not only the healthcare providers but also patients and their personal data. Organizations must prioritize security measures to address these vulnerabilities as they embrace new technologies.

Impact: Healthcare systems and connected medical devices
Remediation: Organizations should implement stronger security protocols, conduct regular security assessments, and ensure compliance with data protection regulations.
Read Original

Odido, a telecommunications company, reported a significant data breach that exposed the personal information of approximately 6.2 million customers. The incident occurred over the weekend of February 7, when attackers accessed Odido's customer contact system. This breach raises serious concerns about data privacy and security, as it potentially includes sensitive information that could be misused by malicious actors. Customers may now face risks such as identity theft or phishing attacks, making it crucial for them to monitor their accounts and take protective measures. Odido has not disclosed specific details about how the breach happened or what steps they are taking to prevent future incidents.

Impact: Customer contact information for 6.2 million Odido customers
Remediation: N/A
Read Original

A new threat actor known as UAT-9921 has been targeting the technology and financial services sectors using a malware framework called VoidLink. Cisco Talos researchers discovered that UAT-9921 has been active since at least 2019, though this is the first time they have employed VoidLink in their attacks. The malware's modular design suggests it can be adapted for various purposes, raising concerns about its potential to evolve and impact a wide range of systems within these industries. Companies in the tech and finance sectors should be vigilant and enhance their security measures to defend against this emerging threat. The situation highlights the ongoing challenges organizations face in protecting sensitive information from sophisticated cyber attacks.

Impact: Technology and Financial Services sectors, systems using VoidLink malware
Remediation: Enhance security measures, monitor for suspicious activity, and apply the latest security updates.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) is launching a series of town hall meetings aimed at improving communication with stakeholders regarding cyber incident reporting for critical infrastructure. These sessions will provide an opportunity for participants to share their experiences and insights related to cybersecurity incidents. CISA emphasizes the need for timely reporting of cyber events to better protect essential services and infrastructure. The initiative is part of a broader effort to enhance collaboration between government and private sectors in addressing cybersecurity challenges. Engaging with a diverse range of stakeholders is crucial as it allows for a more comprehensive understanding of the current cyber threats facing critical infrastructure.

Impact: N/A
Remediation: N/A
Read Original
The $17 Billion Wake-Up Call: Securing Crypto in the Age of AI Scams

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Cybercrime related to cryptocurrency has surged, with losses reaching $17 billion. This increase is largely driven by AI-enabled scams, including sophisticated deepfakes and fraud kits that make it easier for attackers to manipulate victims. Industrial social engineering tactics are also evolving, making it harder for individuals and companies to protect their digital assets. As these scams become more prevalent, users and businesses must be vigilant and enhance their security measures to safeguard against these emerging threats. The growing intersection of AI technology and cybercrime is reshaping how these attacks are executed, posing significant risks to the crypto community and beyond.

Impact: Cryptocurrency platforms, digital wallets, and users of crypto assets
Remediation: Users should implement multi-factor authentication, regularly update security software, and educate themselves about the latest scam tactics. Companies should enhance their user verification processes and monitor for unusual transactions.
Read Original

Hackers have begun exploiting a serious vulnerability in BeyondTrust Remote Support known as CVE-2026-1731, which allows unauthenticated remote code execution. This flaw was identified and a proof of concept (PoC) was released just a day prior to the exploitation attempts, indicating a rapid response from malicious actors. Organizations using BeyondTrust Remote Support should be particularly vigilant, as this vulnerability poses significant risks, potentially allowing attackers to take control of affected systems. The quick exploitation of this flaw underscores the importance of timely patch management and security measures to protect sensitive data and systems from unauthorized access. Users are urged to monitor for updates and apply any patches as soon as they become available to mitigate risks.

Impact: BeyondTrust Remote Support
Remediation: Organizations should apply any available patches for BeyondTrust Remote Support as soon as possible. Regularly review security settings and ensure that systems are updated to the latest versions to protect against this vulnerability.
Read Original

In December 2025, npm implemented significant changes to its authentication process following the Sha1-Hulud incident, which was a notable supply-chain attack. While these updates are a positive move toward enhancing security, they do not fully protect npm projects from future supply-chain attacks or malware. Users of npm should remain vigilant, as the platform is still vulnerable to potential malware threats. This situation serves as a reminder that even after security improvements, the risk of attacks persists, and both developers and organizations need to adopt best practices to safeguard their projects. Staying informed and proactive is essential for a safer Node community.

Impact: npm projects and dependencies
Remediation: Adopt best security practices for npm projects; monitor dependencies for vulnerabilities.
Read Original

The Dutch National Police have arrested a 21-year-old man from Dordrecht in connection with the distribution of a malicious tool known as JokerOTP. This bot is designed to intercept one-time passwords (OTPs), which are commonly used to secure online accounts and financial transactions. Authorities believe the suspect was selling the bot through a Telegram account and possessed license keys related to it. This arrest is part of a broader effort by police to combat cybercrime and follows two previous arrests in the same investigation. The use of tools like JokerOTP poses significant risks to individuals and organizations, as it can facilitate unauthorized access to sensitive information and financial resources.

Impact: JokerOTP password-stealing bot
Remediation: Users should avoid using unknown software from untrusted sources and enable two-factor authentication wherever possible to enhance security.
Read Original

Industrial control systems are still relying on outdated communication protocols that prioritize reliability over security features like authentication and data integrity. This leaves networks vulnerable, allowing attackers to impersonate devices, send unauthorized commands, or alter messages without being detected. A new guidance document from the Cybersecurity and Infrastructure Security Agency (CISA) explains the reasons behind the slow adoption of more secure versions of these industrial protocols. Despite their availability, many organizations are hesitant to implement them, which raises serious concerns about the security of critical infrastructure. The continued use of legacy systems could lead to significant risks for industries that depend on these technologies.

Impact: Industrial control systems, legacy communication protocols
Remediation: Organizations should consider upgrading to secure versions of industrial protocols and implement stronger authentication measures.
Read Original

The Tianfu Cup, a prominent hacking competition in China, has been revived but now operates under tighter secrecy than in previous years. While the contest has a reputation for showcasing advanced hacking skills and finding vulnerabilities, the rewards for successful exploits are reportedly lower than they were during its peak. This shift in focus and reduced incentives may impact the level of participation and the quality of exploits demonstrated. Given the competition's history, its revival raises questions about China's stance on cybersecurity and the implications for global tech companies, which may face new vulnerabilities as a result of the research presented at the event. Observers will be watching closely to see how this contest evolves and what it means for the cybersecurity community internationally.

Impact: N/A
Remediation: N/A
Read Original
Actively Exploited

In 2024, cyberattacks involving data extortion surged to 6,800 incidents, marking a significant 63% increase from the previous year. This rise has been largely driven by the intensified activities of ransomware groups such as Qilin, Sp1d3r Hunters, and Clop. These groups are known for stealing sensitive data and then threatening to release it unless a ransom is paid. This trend poses serious risks to organizations across various sectors as they face increasing pressure to protect their data and respond to extortion demands. Companies must enhance their cybersecurity measures to mitigate these risks and safeguard their sensitive information from being exploited by cybercriminals.

Impact: N/A
Remediation: Organizations should strengthen their cybersecurity protocols, regularly back up data, and train employees on recognizing phishing attempts and other common tactics used by ransomware groups.
Read Original
Actively Exploited

ApolloMD, a major healthcare firm based in Georgia with operations across the U.S., disclosed a significant data breach affecting over 626,000 patients. The incident, which occurred in May, was attributed to the Qilin ransomware group. Compromised information includes sensitive data, which raises serious concerns about patient privacy and potential identity theft. As healthcare organizations increasingly face cyber threats, this breach serves as a troubling reminder of the vulnerabilities within the sector. Patients and providers alike need to be vigilant about safeguarding personal information and responding to potential fallout from such attacks.

Impact: Sensitive patient information, including personal health data.
Remediation: Healthcare providers should enhance cybersecurity measures, conduct thorough audits, and inform affected patients about protective steps they can take.
Read Original
Page 1 of 100Next