South Korea is preparing for its local elections next month, which will serve as a testing ground for new regulations aimed at combating deepfakes. These manipulated videos can spread misinformation and potentially influence public opinion during elections. As deepfakes become more sophisticated and accessible, the South Korean government is keen to see if their legal measures can effectively reduce the impact of these deceptive media. The outcome of this initiative could set a precedent for how other countries approach the regulation of deepfakes and misinformation in electoral processes. This is particularly relevant as deepfake technology poses a growing challenge to democratic processes worldwide.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
A cybersecurity researcher has disclosed a serious vulnerability in Windows, known as 'MiniPlasma', which allows attackers to escalate their privileges to SYSTEM level on fully patched systems. This zero-day exploit poses a significant risk because it can enable unauthorized access to sensitive data and system controls. Users of Windows systems, particularly those in corporate environments, should be on high alert as this exploit can potentially be used in cyberattacks. The researcher has also released a proof-of-concept (PoC) for the exploit, which can facilitate its misuse by malicious actors. This situation underscores the need for immediate attention to system security measures and vigilance against potential exploitation.
Attackers are exploiting a vulnerability in Funnel Builder, a tool used by online stores, to inject e-skimmers. These malicious scripts can steal payment information from unsuspecting customers during transactions. This incident affects e-commerce platforms that utilize Funnel Builder, potentially putting sensitive customer data at risk. As the holiday shopping season approaches, the urgency to address this vulnerability increases, as attackers may ramp up their efforts to exploit it. Companies using this tool should prioritize patching the identified bug to protect their customers and maintain trust.
The Hacker News
CVE-2026-42945A serious vulnerability in NGINX, tracked as CVE-2026-42945, is currently being exploited in the wild, just days after it was disclosed. This flaw is a heap buffer overflow in the ngx_http_rewrite_module, which affects NGINX Plus and NGINX Open versions from 0.6.27 to 1.30.0. The CVSS score of 9.2 indicates a high severity, as it could lead to worker crashes and potentially allow remote code execution (RCE). Organizations using affected versions should prioritize patching their systems to prevent exploitation. Given the active nature of this threat, immediate action is crucial for maintaining security.
Hackread – Cybersecurity News, Data Breaches, AI and More
Scammers are targeting Ledger wallet users in Italy by sending out physical letters that appear to be from the company. These letters contain QR codes designed to trick recipients into revealing their wallet seed phrases. This tactic exploits the trust users have in Ledger, a well-known cryptocurrency hardware wallet provider. By obtaining these seed phrases, scammers can gain access to users' cryptocurrency funds. It's crucial for crypto users to be vigilant and verify the authenticity of any communication they receive, especially those that ask for sensitive information. The incident underscores the ongoing risks associated with cryptocurrency security and the lengths that attackers will go to steal personal information.
Hackread – Cybersecurity News, Data Breaches, AI and More
Grafana has reported a security incident where hackers accessed its source code after obtaining a GitHub token. Fortunately, the company confirmed that no customer data or systems were compromised during this breach. Grafana's response included rejecting a ransom demand from the attackers, indicating they did not negotiate or pay for the stolen code. This incident raises concerns about the security of access tokens and the potential risks associated with code theft, even when customer data remains secure. Companies should review their token management practices to prevent similar incidents in the future.
Help Net Security
Last week, Cisco released a patch for a zero-day vulnerability affecting its SD-WAN product. This flaw could allow attackers to gain unauthorized access to the network and potentially disrupt services. Meanwhile, a previously unpatched vulnerability in Microsoft Exchange Server has been actively exploited by attackers, putting many organizations at risk. These incidents highlight the ongoing challenges companies face in securing their systems against evolving threats. It’s crucial for affected users to apply the latest patches and take proactive measures to protect their networks.
Pwn2Own Berlin 2026 concluded with DEVCORE emerging as the standout performer, successfully identifying 47 unique zero-day vulnerabilities during the event. Over three days, researchers earned a total of $1.29 million in rewards for their discoveries, showcasing the event's focus on security challenges across various platforms and applications. This year's competition not only highlighted the skills of participants but also underscored the ongoing need for robust cybersecurity measures in software development. With the number of zero-day vulnerabilities found, it emphasizes the vulnerabilities present in widely used systems and applications, prompting companies to reassess their security protocols. The event took place in conjunction with OffensiveCon, further connecting the research community with industry professionals.
A serious vulnerability in the Funnel Builder plugin for WordPress is currently being exploited by attackers to inject harmful JavaScript into WooCommerce checkout pages. This manipulation aims to capture sensitive payment information from users during transactions. The situation was reported by Sansec, revealing that this flaw does not yet have an official Common Vulnerabilities and Exposures (CVE) identifier. Website owners using this plugin should be particularly vigilant, as the lack of a CVE means there may not be a widely known fix available at this time. This incident poses a significant risk, especially for e-commerce sites that rely on WooCommerce for processing payments.
BleepingComputer
The Russian hacker group known as Secret Blizzard has transformed its Kazuar backdoor into a more sophisticated modular peer-to-peer (P2P) botnet. This new version is designed for long-term stealth and effective data collection, making it a significant threat to targeted organizations. The botnet's P2P structure allows it to operate without relying on a central command server, which complicates detection and mitigation efforts. This development raises concerns for businesses and individuals alike, as it could lead to unauthorized data access and prolonged security breaches. Cybersecurity experts are urging organizations to enhance their defenses against these evolving threats, as the Kazuar botnet is likely to be used for various malicious activities, including espionage and data theft.
OpenAI confirmed that a supply chain attack linked to malicious TanStack packages compromised two of its employee devices. This breach exposed sensitive credentials from the company's internal source code repositories. The attackers, part of a group known as TeamPCP, exploited vulnerabilities in the package publishing process to gain access. This incident raises concerns about the security of software supply chains, as it demonstrates how vulnerabilities can lead to significant data exposure. Organizations must be vigilant in monitoring their package management systems to prevent similar attacks.
SCM feed for Latest
TeamPCP has released the source code for a variant of the Shai-Hulud malware, which has been implicated in recent attacks against companies like TanStack. While researchers indicate that this particular version is not the original malware, its release poses a risk as it may enable other attackers to replicate or modify the malware for their own use. The significance of this release lies in the potential for increased attacks against vulnerable systems, as the source code can be used by less skilled cybercriminals. Organizations need to remain vigilant and strengthen their defenses in light of this development to protect against possible exploits stemming from the released code.
SCM feed for Latest
Hackers are using PyInstaller to disguise XWorm malware, which is being delivered through deceptive emails or fake software updates that contain seemingly harmless files. Once a victim opens the infected file, the malware can execute and potentially compromise the user’s system. This tactic not only makes it difficult for antivirus programs to detect the malware but also highlights the ongoing risks associated with social engineering attacks. Users and organizations need to be cautious about unsolicited emails and software updates, ensuring they verify the source before downloading or opening any files. This incident serves as a reminder of the importance of cybersecurity awareness and vigilance in protecting personal and sensitive information.
SCM feed for Latest
The Federal Trade Commission (FTC) is now enforcing the Take It Down Act, a law aimed at combating nonconsensual intimate imagery and AI-generated deepfakes. Under this law, online platforms are required to remove such content within 48 hours after a victim reports it. This is significant as it provides victims with a quicker pathway to protect their privacy and dignity against harmful digital forgeries. The act reflects growing concerns about the misuse of technology to create and share intimate images without consent, which can have devastating effects on individuals. By imposing strict removal timelines, the FTC is taking steps to hold platforms accountable and enhance user safety online.
SCM feed for Latest
During a recent meeting between U.S. officials and Chinese leaders, security concerns prompted American personnel to leave behind certain items, including burner phones and lapel pins that were presented as gifts. This decision reflects ongoing worries about surveillance and data security, particularly in high-stakes diplomatic interactions. By discarding these items, U.S. officials are taking precautionary measures to prevent potential breaches of sensitive information. The move highlights the increasing focus on cybersecurity in international relations and the lengths officials will go to protect their communications. This incident serves as a reminder of the vulnerabilities that can arise when dealing with foreign governments, especially in contexts where trust is limited.