Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Bitrefill, a crypto-powered gift card retailer, reported that it suffered a cyberattack earlier this month, which it believes was carried out by the North Korean hacking group known as Lazarus, specifically its Bluenoroff sector. This group is known for targeting financial platforms and cryptocurrency services to steal funds. The attack raises concerns about the security of cryptocurrency transactions and the potential for further targeting of similar online services. As cyberattacks from state-sponsored groups continue to evolve, companies in the crypto space may need to enhance their defenses to protect against such threats. The implications of this incident could lead to increased scrutiny and tighter security measures across the industry.

Impact: Bitrefill, cryptocurrency services
Remediation: N/A
Read Original

The FBI has taken control of two websites associated with the Handala hacktivist group following a severe cyberattack on Stryker, a major medical technology company. This attack resulted in the destruction of around 80,000 medical devices, raising significant concerns about patient safety and the reliability of healthcare technology. The Handala group claimed responsibility for the attack, which underscores the ongoing risks that organizations in the healthcare sector face from cyber threats. The seizure of these websites aims to disrupt Handala's operations and prevent further attacks. This incident highlights the critical need for enhanced cybersecurity measures in the medical technology industry to protect sensitive devices and patient data.

Impact: Stryker medical devices, approximately 80,000 devices affected
Remediation: Organizations should enhance their cybersecurity protocols and assess the security of their medical devices to prevent similar attacks.
Read Original

The Marquis data breach has affected approximately 672,000 individuals, a significant reduction from earlier estimates that suggested over 1.6 million might be impacted. This breach raises concerns over the security of personal information, as affected individuals may have had their data exposed. The specifics of what data was compromised have not been detailed, but such incidents can lead to identity theft and other forms of fraud. Organizations must take this breach seriously and assess their own data protection measures to prevent similar incidents in the future. The incident serves as a reminder of the vulnerabilities that exist in handling personal data.

Impact: Personal information of 672,000 individuals
Remediation: N/A
Read Original
Actively Exploited

A Russian advanced persistent threat (APT) group has been exploiting a critical cross-site scripting (XSS) vulnerability in Zimbra, identified as CVE-2025-66376, with a severity score of 7.2. The attackers are sending HTML emails that contain insufficiently sanitized scripts, which execute when opened by users. This campaign specifically targets individuals in Ukraine, highlighting the ongoing cyber conflict in the region. The exploitation of this vulnerability could allow attackers to compromise user accounts and access sensitive information. Organizations using Zimbra should be particularly vigilant and take immediate action to secure their systems.

Impact: Zimbra Collaboration, affected versions unspecified.
Remediation: Users should apply any available patches for Zimbra Collaboration as soon as possible. Additionally, organizations are advised to implement email filtering solutions to block potentially malicious HTML emails and to educate users on the risks of opening unknown emails.
Read Original

A recent surge in mobile banking malware has targeted over 1,200 financial apps worldwide, shifting the focus of fraud from traditional methods to user devices. This malware is designed to compromise mobile banking applications, putting sensitive user information at risk. The attack affects a wide range of banking services, potentially impacting millions of users who rely on their smartphones for financial transactions. As attackers continue to evolve their tactics, it’s crucial for financial institutions to enhance their security measures and for users to remain vigilant about the apps they download and the permissions they grant. The ongoing threat emphasizes the need for increased awareness around mobile security practices among both consumers and companies.

Impact: Over 1,200 mobile banking applications globally
Remediation: Users should ensure their mobile apps are up to date, avoid downloading apps from unofficial sources, and regularly monitor their bank accounts for suspicious activity. Financial institutions should implement stronger authentication measures and user education on security practices.
Read Original

Password reset processes can be vulnerable to privilege escalation attacks, as they are often less secure than regular logins. Attackers exploit weaknesses in these workflows to gain unauthorized access to accounts, potentially leading to serious data breaches. Specops Software outlines several strategies to fortify these procedures, emphasizing the need for stronger verification methods during resets. This is particularly important for organizations that manage sensitive information, as a compromised account can have significant repercussions. By implementing better security practices, companies can better protect their users and maintain trust.

Impact: Password reset workflows across various online services
Remediation: Implement stronger verification methods for password resets, such as multi-factor authentication and security questions that are harder to guess.
Read Original

Ubiquiti has addressed two vulnerabilities in its UniFi Network Application, including a serious flaw that could let attackers take control of user accounts. This vulnerability is particularly concerning as it affects the security of network management for users, potentially allowing unauthorized access to sensitive information and settings. Users of the application should ensure they update to the latest version to mitigate this risk. The company has emphasized the importance of applying these patches promptly to maintain network security. As cyber threats continue to evolve, staying updated with software patches is crucial for protecting against potential account takeovers.

Impact: Ubiquiti UniFi Network Application
Remediation: Users should update to the latest version of the UniFi Network Application to apply the patches.
Read Original

Researchers have uncovered a toolkit used by the Beast Ransomware group, detailing their methods from initial reconnaissance to the final encryption of files. This toolkit includes various tools that allow the attackers to gather intelligence on their targets, exploit vulnerabilities, and encrypt victims' data for ransom. The discovery is significant because it provides insight into the operational techniques of the group, potentially helping organizations bolster their defenses against future attacks. Companies in sectors that typically face ransomware threats should pay close attention to these findings and review their security measures accordingly. The information also serves as a reminder of the ongoing risks posed by ransomware actors, who continue to evolve their tactics.

Impact: N/A
Remediation: Organizations should enhance their cybersecurity protocols, conduct regular security assessments, and implement robust backup solutions to mitigate the impact of potential ransomware attacks.
Read Original
Fake Windsurf IDE Extension Uses Solana Blockchain to Steal Developer Data

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Researchers at Bitdefender have uncovered a malicious extension for the Windsurf IDE that exploits the Solana blockchain to steal developer credentials. This fraudulent extension targets developers who may unknowingly install it, putting their sensitive information at risk. The use of blockchain technology in this attack makes it particularly concerning, as it could allow for more sophisticated tracking and data theft. Developers need to be vigilant about the extensions they install, as this incident highlights the potential dangers associated with seemingly innocuous tools. The implications of such attacks can be significant, affecting not only individual developers but also the broader ecosystem of software development.

Impact: Windsurf IDE, developer credentials
Remediation: Developers should avoid installing unverified extensions and regularly review their development tools for any suspicious activity.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) is advising U.S. organizations to take immediate steps to secure their Microsoft Intune systems. This warning comes after a cyberattack targeted Stryker, a major medical technology company, exploiting vulnerabilities in the Intune endpoint management tool. The breach led to significant disruptions in Stryker's operations, raising concerns about the security of similar systems across various organizations. CISA recommends that users follow Microsoft's security guidance to bolster their defenses against potential attacks. This incident highlights the need for vigilance in managing endpoint systems, particularly in sectors that handle sensitive data.

Impact: Microsoft Intune, Stryker systems
Remediation: Organizations should follow Microsoft guidance to strengthen Intune configurations.
Read Original

The UK's Financial Conduct Authority (FCA) has introduced new rules aimed at simplifying the process of reporting cyber incidents and issues related to third-party vendors. These updates are designed to provide clearer guidelines for financial firms, ensuring that they report incidents promptly and transparently. This move comes in response to the increasing frequency and complexity of cyber threats facing the financial sector. By establishing more straightforward reporting protocols, the FCA hopes to enhance the overall security posture of financial institutions and improve their ability to manage risks associated with third-party relationships. This change will affect all regulated firms within the UK’s financial services industry, emphasizing the importance of robust incident management practices.

Impact: UK financial firms and their third-party vendors
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about active exploitation of a recently patched vulnerability in SharePoint, identified as CVE-2026-20963. This remote code execution flaw allows attackers to run malicious code on affected systems, posing a significant risk to organizations using the software. Microsoft released a patch for this vulnerability back in January, but the discovery of in-the-wild exploitation suggests that some users may not have applied the update. Organizations using SharePoint should prioritize implementing the latest security updates to protect against potential breaches. Failing to address this vulnerability could lead to unauthorized access and data compromise, making it crucial for companies to stay vigilant and proactive in their cybersecurity practices.

Impact: SharePoint, affected versions unspecified.
Remediation: Organizations should apply the Microsoft patch released in January 2026 for CVE-2026-20963 to mitigate the risk of exploitation.
Read Original

Arcjet has introduced a new feature called AI Prompt Injection Protection aimed at defending production AI systems from prompt injection attacks. This capability identifies harmful prompts at the application's boundary, allowing developers to intercept and block malicious instructions before they can affect the AI model's inference process. As more companies rapidly deploy AI features, ensuring their security has become increasingly challenging. This solution is particularly relevant given that prompt injection attacks can manipulate AI systems, potentially leading to unauthorized access or misuse of sensitive data. By implementing this protection, organizations can better secure their AI applications against emerging threats.

Impact: Production AI systems utilizing Arcjet's AI Prompt Injection Protection
Remediation: Implement AI Prompt Injection Protection from Arcjet to block hostile prompts before they reach AI models.
Read Original

The European Union has imposed sanctions on several companies based in China and Iran due to their involvement in cyberattacks. These sanctions prevent the listed entities from entering or conducting business within the EU. The move is part of broader efforts to counteract malicious cyber activities that could threaten EU member states and their interests. By targeting these companies, the EU aims to hold them accountable for their actions and deter future cyber incidents. This decision underscores the EU's commitment to enhancing cybersecurity and protecting its digital infrastructure from foreign threats.

Impact: N/A
Remediation: N/A
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted government agencies about two significant security vulnerabilities affecting the Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint. Both flaws, identified as CVE-2025-66376 and another not specified in the article, have been found to be actively exploited by attackers. The CVE-2025-66376 vulnerability has a CVSS score of 7.2, indicating a moderate to high risk. Organizations using these platforms are urged to apply the necessary patches to protect against potential attacks. The exploitation of these vulnerabilities underscores the need for timely updates and vigilance in cybersecurity practices, especially for government entities.

Impact: Synacor Zimbra Collaboration Suite (ZCS), Microsoft Office SharePoint
Remediation: Government agencies are advised to apply patches for the vulnerabilities in Zimbra and SharePoint as soon as possible. Specific patch numbers or versions were not mentioned in the article.
Read Original
Page 1 of 118Next