Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Actively Exploited

Hackers have been exploiting the QEMU machine emulator in at least two separate campaigns aimed at deploying ransomware and remote access tools. This abuse allows attackers to bypass security measures, making it harder for organizations to detect their malicious activities. The implications are significant, as this could potentially lead to data breaches and unauthorized access to sensitive information. Companies using QEMU should be vigilant and assess their defenses against these types of attacks to safeguard their systems. Researchers are urging affected organizations to review their security protocols and update their defenses accordingly.

Impact: QEMU emulator
Remediation: Organizations should review their security protocols and ensure that their defenses against unauthorized access are updated.
Read Original

Bluesky, a social media platform, was hit by a significant distributed denial-of-service (DDoS) attack that lasted around 24 hours. A pro-Iran hacker group has claimed responsibility for this disruption. Users experienced difficulties accessing the platform during the attack, impacting their ability to communicate and interact online. This incident raises concerns about the security of social media platforms and the potential for politically motivated cyberattacks to affect users worldwide. As cyber threats become more sophisticated, it emphasizes the need for companies to bolster their defenses against such attacks.

Impact: Bluesky social media platform
Remediation: N/A
Read Original

The Senate has approved a short-term extension of a controversial surveillance program used by U.S. intelligence agencies, allowing it to remain in effect until April 30. This decision comes after a series of contentious votes in the House, where lawmakers debated the implications of the program on privacy and civil liberties. The surveillance powers in question are part of a broader debate about national security and the balance between safety and individual rights. Critics argue that such programs can infringe on personal privacy, while supporters claim they are essential for national security. This extension reflects ongoing tensions in Congress over how to handle surveillance in an increasingly digital age.

Impact: U.S. surveillance programs
Remediation: N/A
Read Original

Vercel experienced a security breach due to a compromise of a third-party AI tool called Context.ai, which was being used by one of its employees. The breach occurred when attackers gained access to the employee's Google Workspace account, enabling them to infiltrate limited internal systems and access non-sensitive data. While the breach did not expose highly sensitive information, it raises concerns about the security of third-party tools and their impact on corporate networks. Vercel has reported this incident, and it serves as a reminder for companies to scrutinize the security measures of any external tools they integrate into their operations. Users and organizations relying on third-party applications must remain vigilant to protect their data and systems.

Impact: Vercel internal systems, Google Workspace accounts, Context.ai tool
Remediation: Companies should review and tighten security protocols for third-party tools, monitor employee accounts for suspicious activity, and implement multi-factor authentication where possible.
Read Original

Researchers from GreyNoise have identified a pattern in network activity that may indicate upcoming vulnerabilities in edge devices, particularly those used in security tools. This trend could serve as an early-warning system for organizations to prepare for potential attacks. By analyzing what they call 'background noise' in network traffic, these researchers aim to help defenders anticipate where threats might emerge. This proactive approach is crucial as it allows companies to bolster their defenses before vulnerabilities can be exploited. The findings emphasize the need for continuous monitoring and analysis of network behavior to stay ahead of cyber threats.

Impact: Edge devices used in security tools, potentially affecting various vendors and systems
Remediation: Companies should implement continuous monitoring of network traffic and consider adjusting security protocols based on identified patterns.
Read Original

Research shows that about half of the 6 million FTP servers accessible over the Internet do not use encryption, making them vulnerable to various attacks. This outdated protocol, which has been around for over 50 years, can expose sensitive data during transmission. Both businesses and individual users are at risk, as attackers can intercept unencrypted data, leading to potential breaches and data theft. The lack of encryption means that sensitive information, such as login credentials and personal data, can be easily compromised. Organizations should consider upgrading to more secure protocols to protect their data and mitigate these risks.

Impact: FTP servers lacking encryption
Remediation: Organizations should upgrade to secure file transfer protocols such as SFTP or FTPS to ensure data encryption during transmission.
Read Original

The National Cyber Security Centre (NCSC) has announced a coordinated plan aimed at strengthening the cybersecurity resilience of the National Health Service (NHS) in the UK. This initiative comes in response to ongoing concerns about cyber threats targeting healthcare systems, especially in light of recent attacks that have compromised patient data and disrupted services. The NCSC's strategy includes improving the overall security posture of NHS organizations by providing guidance, resources, and support to help them better defend against potential cyber incidents. This effort is crucial as the NHS plays a vital role in public health, and any cyber disruption could have serious implications for patient care and safety.

Impact: N/A
Remediation: N/A
Read Original

Grinex, a Russian cryptocurrency exchange, has reported a theft of $13 million, claiming that Western intelligence agencies were responsible for the incident. The exchange has not provided detailed evidence to support its allegations, but it underscores the growing tensions between Russia and Western nations, particularly in the realm of digital assets. The incident raises concerns among users of cryptocurrency platforms about the security measures in place to protect their investments. As the crypto landscape evolves, incidents like this highlight the need for exchanges to bolster their security protocols and for users to remain vigilant about potential risks. This event could also affect trust in cryptocurrency exchanges, especially those operating in politically charged environments.

Impact: Grinex cryptocurrency exchange
Remediation: N/A
Read Original

Microsoft has issued emergency updates to address issues that arose after the installation of the April 2026 security updates on Windows Server systems. These out-of-band updates were necessary due to problems that could disrupt server functionality for users. Affected systems include various versions of Windows Server, particularly those that had recently applied the April updates. Organizations relying on these servers need to apply the updates promptly to avoid potential disruptions. By addressing these issues quickly, Microsoft aims to minimize any impact on businesses and maintain system stability.

Impact: Windows Server systems affected by April 2026 security updates
Remediation: Apply the out-of-band updates released by Microsoft following the April 2026 security updates.
Read Original

Researchers have identified a new malware strain named ZionSiphon, which is targeting water treatment and desalination systems in Israel. This malware is capable of establishing persistence within the systems, modifying local configuration files, and scanning for operational technology services on the local network. The specific focus on critical infrastructure, such as water supply systems, raises concerns about the potential for severe disruptions. As these systems are vital for public health and safety, the discovery of ZionSiphon underscores the need for enhanced cybersecurity measures in the sector. This incident highlights the ongoing risks to essential services from cyber threats, particularly in regions with geopolitical tensions.

Impact: Israeli water treatment and desalination systems
Remediation: Organizations should enhance their network security protocols, monitor for suspicious activity, and consider implementing intrusion detection systems. Regular updates and security patches for operational technology systems are also recommended.
Read Original

Vercel, a cloud development platform, has confirmed a security breach after hackers claimed to have accessed its systems and are now trying to sell the stolen data. The company has not disclosed the specific details of the breach, such as how many users or projects may be affected. This incident raises concerns about the security of data hosted on Vercel's platform, which is widely used by developers for building web applications. As the situation develops, users of Vercel should remain vigilant and take precautions to secure their own data. The potential sale of this stolen information could lead to further exploitation or misuse if it falls into the wrong hands.

Impact: Vercel cloud development platform
Remediation: Users should review their security practices and consider changing credentials associated with Vercel services.
Read Original

Apple account change notifications are being exploited by scammers to distribute phishing emails that appear to be legitimate. These emails, sent from Apple's own servers, falsely claim that the recipient's iPhone purchase has been confirmed, tricking users into clicking on malicious links. This tactic increases the likelihood that these emails will bypass spam filters and reach users' inboxes. As a result, unsuspecting Apple users may fall victim to these scams, risking their personal information. It’s essential for users to be cautious and verify any unexpected notifications they receive, even if they seem to come from trusted sources like Apple.

Impact: Apple accounts, iPhones
Remediation: Users should verify any account change notifications directly through Apple’s official website or app, and avoid clicking on links in unsolicited emails.
Read Original

Recent research from Proofpoint reveals that hackers are increasingly targeting logistics firms, aiming to steal cargo and divert payments. These cyberattacks are reportedly connected to organized crime, leading to significant losses in the industry. Attackers employ coordinated remote access campaigns to infiltrate trucking and logistics companies, which raises concerns about the security of supply chains. This trend poses a serious risk not only to the affected companies but also to the broader economy, as disruptions in logistics can impact the availability of goods. Companies in the logistics sector need to enhance their cybersecurity measures to protect against these rising threats.

Impact: Logistics firms, trucking companies
Remediation: Companies should implement stronger cybersecurity protocols, including multi-factor authentication and regular security audits.
Read Original
Actively Exploited

The Security Affairs Malware newsletter released its latest edition, spotlighting several significant malware incidents. One notable case involves a watering hole attack on users of CPU-Z and HWMonitor, where attackers leverage a compromised website to infect visitors with malware. Another alarming incident is the discovery of a fake 'Claude' site that installs malware, granting attackers remote access to victims' computers. Additionally, the newsletter discusses JanelaRAT, a financial threat specifically targeting users in Latin America. These incidents underline the ongoing risks that users face from malicious software designed to exploit vulnerabilities and compromise personal information.

Impact: CPU-Z, HWMonitor, fake Claude website, JanelaRAT targeting Latin American users
Remediation: Users should avoid visiting suspicious websites and ensure their software is up to date with the latest security patches. Employing comprehensive antivirus solutions could also help mitigate risks associated with these types of malware.
Read Original
ShowDoc Vulnerability Patched in 2020 Now Used in Active Server Takeovers

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Hackers are currently exploiting a vulnerability in ShowDoc, identified as CVE-2025-0520, which was discovered five years ago. This flaw allows attackers to deploy web shells, enabling remote code execution (RCE) and complete server takeovers on affected systems. The exploitation of this vulnerability is happening globally, impacting various organizations that use ShowDoc. It’s crucial for users and companies to address this issue promptly to prevent unauthorized access and potential data breaches. Security teams should prioritize patching their systems to mitigate the risk posed by this vulnerability.

Impact: ShowDoc (version not specified), potentially all installations of ShowDoc that have not been updated since the vulnerability was disclosed.
Remediation: Users should apply any available patches for ShowDoc immediately. If patches are not available, disabling the affected services or restricting access to them can help mitigate risks. Additionally, organizations should review their server configurations and implement monitoring for any unauthorized changes.
Read Original
Page 1 of 161Next