Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Actively Exploited

In 2024, cyberattacks involving data extortion surged to 6,800 incidents, marking a significant 63% increase from the previous year. This rise has been largely driven by the intensified activities of ransomware groups such as Qilin, Sp1d3r Hunters, and Clop. These groups are known for stealing sensitive data and then threatening to release it unless a ransom is paid. This trend poses serious risks to organizations across various sectors as they face increasing pressure to protect their data and respond to extortion demands. Companies must enhance their cybersecurity measures to mitigate these risks and safeguard their sensitive information from being exploited by cybercriminals.

Impact: N/A
Remediation: Organizations should strengthen their cybersecurity protocols, regularly back up data, and train employees on recognizing phishing attempts and other common tactics used by ransomware groups.
Read Original
Actively Exploited

ApolloMD, a major healthcare firm based in Georgia with operations across the U.S., disclosed a significant data breach affecting over 626,000 patients. The incident, which occurred in May, was attributed to the Qilin ransomware group. Compromised information includes sensitive data, which raises serious concerns about patient privacy and potential identity theft. As healthcare organizations increasingly face cyber threats, this breach serves as a troubling reminder of the vulnerabilities within the sector. Patients and providers alike need to be vigilant about safeguarding personal information and responding to potential fallout from such attacks.

Impact: Sensitive patient information, including personal health data.
Remediation: Healthcare providers should enhance cybersecurity measures, conduct thorough audits, and inform affected patients about protective steps they can take.
Read Original

The UK government's Science, Innovation and Technology Committee recently questioned ministers about the challenges of preventing sensitive data leaks, particularly in light of a recent incident involving the Ministry of Defence (MoD). In this case, sensitive information was accidentally exposed, putting Afghan informants at risk. This incident raises serious concerns about data security practices within government departments. The committee is focused on ensuring that such lapses do not occur again, especially given the potential dangers to individuals who have assisted UK forces. The discussion highlights the urgent need for better safeguards to protect sensitive data in government systems.

Impact: UK government data systems, Ministry of Defence (MoD)
Remediation: Implement improved data security protocols, conduct regular audits, and provide training for staff on data handling and privacy practices.
Read Original

Recent zero-day vulnerabilities in Ivanti's Endpoint Manager Mobile (EPMM) have sparked renewed concern among cybersecurity experts. These flaws, which can be exploited by attackers, could potentially compromise sensitive data in mobile devices managed by the software. Organizations using EPMM must act quickly to secure their systems, as these vulnerabilities are already being exploited in the wild. Experts are urging a shift away from simply applying patches and towards more robust security measures, including better authentication controls and reducing unnecessary public interfaces. The urgency of the situation emphasizes the need for businesses to prioritize security and stay updated with the latest patches and practices.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Implement patches as they become available; enforce stricter authentication controls; reduce public interfaces.
Read Original

A serious vulnerability has been discovered in BeyondTrust Remote Support and Privileged Remote Access appliances, allowing attackers to execute code remotely without authentication. This flaw has become a target for exploitation after a proof-of-concept (PoC) was made publicly available. Organizations using these systems should be particularly vigilant, as the flaw can lead to unauthorized access and potential data breaches. BeyondTrust has released patches to address this issue, and it’s crucial for users to apply these updates promptly to protect their systems. The urgency of this situation highlights the need for proactive security measures in remote access technologies.

Impact: BeyondTrust Remote Support and Privileged Remote Access appliances
Remediation: Patches have been released; users should update to the latest version of BeyondTrust products.
Read Original

As Valentine's Day approaches, a new report reveals that men are nearly twice as likely as women to fall victim to romance scams. These scams typically involve fraudsters posing as potential romantic partners online, often leading to significant financial losses for victims. The reluctance to discuss these incidents is prevalent, with many individuals feeling ashamed or embarrassed about being scammed. This silence can hinder awareness and prevention efforts, making it crucial for people to openly share their experiences. Given the emotional and financial toll these scams can take, men should be particularly vigilant this Valentine's Day to avoid falling prey to such deceitful tactics.

Impact: N/A
Remediation: Users should be cautious when engaging in online romantic relationships, verify identities through video calls, and avoid sending money or personal information to strangers.
Read Original

Conpet S.A., Romania's national oil pipeline operator, has confirmed that it fell victim to a data breach involving the Qilin ransomware gang last week. The attackers managed to steal sensitive company data, although specific details about the compromised information have not been disclosed. This incident raises concerns about the security of critical infrastructure, particularly in the energy sector. As ransomware attacks continue to target essential services, it highlights the need for stronger cybersecurity measures to protect against such threats. Companies in similar sectors should take this as a warning to review their security protocols and ensure they can respond effectively to potential breaches.

Impact: Conpet S.A. (national oil pipeline operator in Romania)
Remediation: Companies should review and strengthen their cybersecurity measures, particularly for critical infrastructure. Specific remediation steps were not detailed.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) is planning to hold feedback sessions to gather input on new regulations regarding cyber incident reporting. This initiative follows the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), which aims to improve how organizations report cyber attacks. However, some industry experts believe that these town halls may not effectively address the pressing needs of the current cybersecurity landscape. They argue that the timing may not be ideal for such discussions, given the urgency surrounding cyber threats. The outcome of these sessions could influence how well organizations prepare for and respond to future cyber incidents, making it crucial for stakeholders to engage in the process.

Impact: N/A
Remediation: N/A
Read Original

Researchers have identified a series of malicious packages in both the npm and Python Package Index (PyPI) repositories, linked to a recruitment-themed campaign by the Lazarus Group, which is associated with North Korea. This operation, dubbed graphalgo, reportedly began in May 2025, aiming to trick developers into downloading harmful software disguised as legitimate packages. The malicious payloads can compromise user systems and potentially lead to data theft or other cybercrimes. Developers using these package repositories should be particularly cautious and verify the authenticity of packages before installation, as this incident emphasizes the ongoing risks associated with open-source software ecosystems. Awareness and vigilance are crucial for maintaining security in the software development community.

Impact: npm packages, Python Package Index (PyPI) packages
Remediation: Developers should verify the authenticity of packages before installation and monitor for any unusual activity in their environments.
Read Original

The article discusses how attackers are increasingly hijacking trusted AI workflows rather than relying on single exploits. This method allows cybercriminals to exploit established processes, making detection harder for organizations. Companies are urged to manage AI workflows with the same level of security as they do their production applications to prevent such attacks. This shift in tactics poses a significant risk, as it can undermine the trust in AI systems used across various industries. Ensuring robust security measures in AI implementations is essential to protect sensitive data and maintain operational integrity.

Impact: AI workflows, production applications
Remediation: Implement security protocols for AI workflows similar to those for production apps
Read Original

Researchers have identified four significant vulnerabilities in artificial intelligence systems, including prompt injection and deepfake fraud. These flaws are being exploited faster than security teams can respond, raising concerns about the safety of AI applications. The vulnerabilities lack known fixes, which means that users and companies relying on AI technologies are at risk. This situation poses a challenge not only for tech firms but also for consumers who may fall victim to fraud or misinformation propagated by malicious actors. As AI continues to integrate into various sectors, the urgency to address these vulnerabilities becomes increasingly critical.

Impact: AI systems, especially those utilizing natural language processing and deepfake technology
Remediation: N/A
Read Original

1Password has introduced a new open source benchmark called the Security Comprehension and Awareness Measure (SCAM) to address a gap in AI security. Research indicates that while some AI models can accurately identify phishing websites, when these models operate as autonomous agents with access to tools like email and password managers, they can still fall for scams. The SCAM benchmark aims to evaluate whether these AI agents can safely handle sensitive information without leaking credentials. This initiative is important as it seeks to enhance the security of AI applications, helping to prevent potential misuse by attackers. By focusing on the behavior of AI in real-world scenarios, 1Password is taking a proactive step in AI safety.

Impact: AI models, password vaults, email systems
Remediation: Implement the SCAM benchmark for testing AI agents
Read Original

A recent forecast from FIRST anticipates that the number of Common Vulnerabilities and Exposures (CVEs) could surpass 50,000 in 2026. This significant increase poses a challenge for security teams who will need to manage and address these vulnerabilities effectively. As organizations continue to rely heavily on technology, the growing number of CVEs could strain resources and complicate planning for security measures. Security teams will need to prioritize their responses and strengthen their strategies to handle the influx of vulnerabilities. This situation emphasizes the need for companies to invest in better tools and training to keep up with the evolving security landscape.

Impact: N/A
Remediation: N/A
Read Original
Actively Exploited

Apple has addressed a serious zero-day vulnerability, identified as CVE-2026-20700, which was used in targeted attacks last year. This flaw, a memory corruption issue in the dyld component of Apple's operating systems, could allow attackers to execute arbitrary code on affected devices. Specifically, the vulnerability impacts versions of iOS prior to iOS 26 and was reportedly exploited in sophisticated attacks against select individuals. Users of these older versions should update their devices to protect against potential exploitation.

Impact: Affected products include Apple's iOS versions prior to iOS 26, particularly those using the dyld component.
Remediation: Users are advised to update their devices to the latest version of iOS to mitigate the vulnerabilities associated with CVE-2026-20700.
Read Original

A new report from TrendAI warns that many existing security tools are ill-equipped to defend against attacks targeting AI skills artifacts. These artifacts, which include models and datasets used in artificial intelligence, are increasingly seen as potential vulnerabilities by attackers. The report highlights that as AI technology advances, the security measures in place need to evolve accordingly. Companies that utilize AI in their operations may find themselves at risk if they do not adapt their security strategies to cover these new attack surfaces. This is particularly concerning as the integration of AI becomes more widespread across various industries.

Impact: AI skills artifacts, machine learning models, datasets
Remediation: Companies should update their security protocols to include safeguards specifically for AI components and regularly audit their AI systems for vulnerabilities.
Read Original
Page 1 of 99Next