A major international operation has led to the arrest of at least 276 individuals involved in cryptocurrency investment scams that targeted American citizens. The crackdown was spearheaded by Dubai Police, in collaboration with the U.S. Federal authorities, and resulted in the closure of nine scam centers. These operations had reportedly caused millions of dollars in losses to unsuspecting investors. This coordinated effort underscores the growing issue of cryptocurrency fraud, which has become increasingly prevalent as more people engage in digital investments. The significant amount seized, totaling $701 million, indicates the scale of these scams and the need for ongoing vigilance in the crypto space.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
BleepingComputer
Instructure, an educational technology company, has confirmed that it suffered a data breach after a cyberattack. The ShinyHunters group, known for its extortion tactics, claims responsibility for the attack. Users of Instructure's platforms, which include tools like Canvas, may have had their personal data compromised. This incident raises concerns about the security of educational technologies and the potential risks to students and educators. As cyberattacks on educational institutions become more frequent, stakeholders need to ensure that proper security measures are in place to protect sensitive information.
Security Affairs
In April 2026, Sistemi Informativi, an IBM Italy subsidiary responsible for IT infrastructure management for various public and private institutions, suffered a significant breach. This incident is believed to be linked to the Chinese cyber operation known as Salt Typhoon. The breach raises alarms about the vulnerability of European digital defenses, especially as it targets a company managing critical infrastructure. The attack underscores the ongoing risks posed by state-sponsored cyber activities and highlights the need for enhanced cybersecurity measures across Europe. Organizations that rely on Sistemi Informativi for IT services may face increased risks as a result of this incident, prompting a review of their security protocols and defenses.
Hackread – Cybersecurity News, Data Breaches, AI and More
VECT 2.0 ransomware is a new and dangerous strain that has been discovered to have serious flaws that can irreversibly destroy files. Victims of this ransomware will find that paying the ransom is futile, as the data is lost permanently, making recovery impossible. This situation poses a significant risk to individuals and organizations worldwide, as it undermines the traditional hope of recovering data through ransom payments. The emergence of VECT 2.0 highlights the evolving tactics of cybercriminals and the need for better preventive measures. Users and organizations are urged to strengthen their cybersecurity defenses to avoid falling victim to this destructive ransomware.
Recent research has revealed that scammers are exploiting Telegram's Mini App feature to conduct crypto scams and distribute Android malware. These operations involve impersonating reputable brands to trick users into providing personal information or investing in fraudulent schemes. The use of Telegram's platform allows these scams to reach a wide audience, putting many users at risk of financial loss and malware infections. This situation raises concerns about the security measures in place on social media platforms and highlights the need for users to be cautious when engaging with unfamiliar applications or links. Overall, this incident serves as a reminder for users to verify the legitimacy of offers and be vigilant against potential scams online.
In a recent development, two U.S. cybersecurity experts have been sentenced for their involvement in a ransomware case. Their actions contributed to the growing issue of ransomware attacks that have been plaguing various sectors, highlighting the ongoing struggles law enforcement faces in combating cybercrime. A third individual connected to the case is awaiting a ruling scheduled for July. Additionally, Trellix has disclosed a breach that raises concerns about the security of its systems, though specific details about the breach have not been shared. These incidents serve as a reminder of the persistent threats in the cybersecurity landscape and the need for organizations to bolster their defenses against such attacks.
Security Affairs
Trellix has reported a security breach involving unauthorized access to a portion of its source code repository. The company has stated that there are no indications of the compromised code being misused. In response to the incident, Trellix quickly initiated an investigation with forensic experts and has notified law enforcement to assist in the matter. While the breach raises concerns about the security of the company’s intellectual property, Trellix assures that no customer data has been affected. This incident serves as a reminder for companies to continually monitor and secure their source code environments to prevent potential exploitation in the future.
Instructure, the developer of the Canvas learning platform, has reported a cybersecurity incident that has prompted an investigation into its potential impact. While details about the nature of the incident are still emerging, the company is assessing how it may affect users and systems. This incident is particularly concerning given Canvas's widespread use in educational institutions, where sensitive student and faculty data could be at risk. As the investigation continues, users are advised to stay alert for any updates and potential security measures that may be necessary to protect their information. The situation underscores the ongoing challenges that educational technology companies face in safeguarding their platforms against cyber threats.
SCM feed for Latest
A new software supply chain attack has been linked to a GitHub account named 'BufferZoneCorp.' This campaign involved malicious Ruby gems and Go modules that were disguised as legitimate libraries. Attackers used these sleeper packages to steal user credentials and tamper with continuous integration (CI) systems. Developers and organizations using Ruby and Go programming languages should be particularly vigilant, as this could compromise their software development processes. It's crucial for teams to verify the sources of their libraries and monitor for any unusual activity to prevent potential breaches.
A DDoS attack has disrupted services for Ubuntu and Canonical, with the hacktivist group known as The Islamic Cyber Resistance in Iraq 313 Team claiming responsibility. They reportedly employed a DDoS-for-hire service named Beamed to carry out the attack. This incident highlights the vulnerabilities of major tech platforms to such attacks, which can lead to significant service outages and impact users relying on these systems. The ongoing nature of the attack suggests that it could continue to affect services for an indefinite period, raising concerns about the security and resilience of online infrastructure. Users and organizations relying on Ubuntu and Canonical services should be aware of potential disruptions and consider contingency plans.
A database intended to support a new Medicare directory was accidentally left open to the public, exposing sensitive information, including Social Security numbers, of numerous healthcare providers. This database was part of the Centers for Medicare & Medicaid Services' (CMS) efforts to modernize Medicare. The exposure raises significant concerns about privacy and the potential for identity theft among the affected providers. With healthcare data being a prime target for cybercriminals, this incident underscores the need for stricter security measures when handling sensitive information. Providers are now at risk of fraud and misuse of their personal information due to this oversight.
SCM feed for Latest
Anthropic has introduced Claude Security in public beta, a new tool designed to help developers identify vulnerabilities within their code. Unlike traditional methods that rely on known attack patterns, Claude Security uses the Opus 4.7 model to scan entire codebases, generate verified patches, and trace data flows between components. This approach could significantly improve the security of software by providing deeper insights into potential weaknesses. As software development continues to grow, tools like this are increasingly important for companies looking to safeguard their applications against emerging threats. The introduction of such tools may encourage more developers to prioritize security in their coding practices.
SCM feed for Latest
In response to increasing cybersecurity threats targeting operational technology (OT) networks, the Cybersecurity and Infrastructure Security Agency (CISA) and other federal agencies have released new guidelines recommending a zero trust approach for these systems. As industrial systems become more interconnected, the risks of cyberattacks grow, prompting the need for stronger security measures. The guidance aims to help organizations better protect their OT environments by adopting zero trust principles, which focus on verifying all users and devices before granting access to sensitive systems. This is particularly important as the reliance on digital technologies in industrial sectors continues to expand. Implementing these practices is crucial for safeguarding critical infrastructure against evolving cyber threats.
SCM feed for Latest
Recent reports have identified vulnerabilities in the EnOcean SmartServer IoT platform that could allow attackers to remotely compromise smart buildings, data centers, and factories. The issues are tied to a security bypass flaw (CVE-2026-22885) and a remote code execution vulnerability (CVE-2026-20761). These vulnerabilities affect instances of the EnOcean SmartServer that are exposed to the internet, making them susceptible to remote exploitation. This situation raises significant concerns for organizations relying on this technology, as it could lead to unauthorized access and control over critical infrastructure. Companies using EnOcean SmartServer should take immediate action to secure their systems against potential attacks.
The article discusses several cybersecurity topics, including a denial-of-service (DOS) attack that impacts various services. Researchers have noted vulnerabilities in popular platforms like Outlook and cPanel, which could potentially expose user data or disrupt service. Additionally, there are mentions of security concerns related to programming languages such as Ruby and Go, which may affect developers using those technologies. The piece emphasizes the need for companies to stay vigilant and update their systems to prevent exploitation. This is significant as it affects not only individual users but also businesses relying on these platforms for their operations.