Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

RubyGems, the popular package manager for the Ruby programming language, has suspended new registrations after more than 500 malicious packages were uploaded during a recent attack. The incident primarily targeted RubyGems itself rather than end users. While the exact motives behind this attack remain unclear, it raises concerns about the security of software supply chains. Developers who rely on RubyGems for their projects may need to be cautious about the integrity of packages they download. This situation underscores the need for ongoing vigilance in monitoring package sources and ensuring that only trusted packages are used in development environments.

Impact: RubyGems package manager
Remediation: RubyGems has suspended new registrations and may require users to verify package integrity before installation.
Read Original

Researchers from the Norwegian University of Science and Technology and the University of the Aegean have developed a new open-source Wi-Fi cyber range designed specifically for security training. Unlike typical training programs that treat Wi-Fi as just another component alongside other wireless technologies, this new resource focuses solely on the IEEE 802.11 standard, which is crucial as Wi-Fi is often the primary entry point for cyber attackers targeting corporate networks. This initiative addresses a significant gap in hands-on training environments, providing a dedicated platform for professionals to enhance their skills in defending against Wi-Fi related security threats. By making this tool freely available, the researchers aim to improve the overall security posture of organizations that rely heavily on wireless networks.

Impact: Wi-Fi networks, corporate networks
Remediation: N/A
Read Original

The U.S. House Committee on Homeland Security has called for testimony from executives at Instructure regarding two significant cyberattacks on its Canvas platform, executed by the ShinyHunters extortion group. These attacks compromised sensitive student data and caused disruptions in schools, particularly during critical final exam periods. The incidents raised alarms about the security measures in place to protect educational institutions, as they directly affect students' academic performance and privacy. The committee's inquiry highlights the growing concern over cyber threats targeting educational technology, emphasizing the need for stronger safeguards against such breaches. As schools increasingly rely on digital platforms, the implications of these attacks could lead to calls for more stringent regulations and practices to protect student information.

Impact: Canvas platform by Instructure
Remediation: N/A
Read Original

A new malware known as 'Mini Shai-Hulud' has compromised hundreds of open-source packages in a significant supply-chain attack. This malware has targeted major registries, disguising itself behind legitimate release signatures, which allows it to infiltrate software updates unnoticed. As a result, developers and organizations relying on these open-source packages may unknowingly integrate malicious code into their applications. This incident emphasizes the vulnerabilities present in the software update process and raises concerns about the security of open-source software. Researchers are urging developers to be vigilant and to verify the integrity of their dependencies before use.

Impact: Hundreds of open-source packages across major registries
Remediation: Developers should verify the integrity of their software dependencies and consider implementing additional security measures for package management.
Read Original
Canvas Hackers ShinyHunters Say Their Official Domain Was Suspended

Hackread – Cybersecurity News, Data Breaches, AI and More

The hacking group ShinyHunters has reported that their domain, shinyhunte.rs, was suspended following a series of attacks on the Canvas Learning Management System (LMS). As a result, they have moved their operations entirely to their dark web site, which uses the .onion domain. This shift highlights the ongoing challenges in combating cybercriminal activities, especially those targeting educational platforms. The suspension of their domain could hinder their ability to communicate and distribute stolen data, but it also indicates the persistent nature of such groups in adapting to law enforcement actions. Users of Canvas and other educational institutions should remain vigilant as these incidents can impact the security of sensitive student information.

Impact: Canvas LMS, shinyhunte.rs domain
Remediation: N/A
Read Original

A recent wave of attacks, referred to as 'Mini' Shai-Hulud, has compromised hundreds of packages from popular repositories like npm and PyPI. Attackers are exploiting trusted OpenID Connect (OIDC) tokens to bypass integrity checks, allowing them to distribute malicious code disguised as legitimate packages. This situation puts developers and organizations at risk, as they may unknowingly incorporate these tainted packages into their projects. The incident serves as a reminder for users to scrutinize package sources and implement additional security measures when managing dependencies. Ongoing vigilance is crucial to mitigate the potential fallout from these compromised packages.

Impact: npm and PyPI packages
Remediation: Developers should verify package integrity and sources, implement stricter dependency management practices, and stay updated on security advisories related to package repositories.
Read Original

Fortinet has issued urgent security patches to address two serious vulnerabilities in its FortiSandbox and FortiAuthenticator products. These flaws could allow attackers to execute commands or arbitrary code, posing a significant risk to organizations using these systems. The vulnerabilities affect both security and authentication processes, making them critical to address promptly. Users and administrators are advised to apply the patches immediately to protect their environments from potential exploitation. This situation underscores the need for ongoing vigilance in managing software security and ensuring systems are updated.

Impact: FortiSandbox, FortiAuthenticator
Remediation: Security patches have been released; users should update to the latest versions as soon as possible.
Read Original
Fake Claude Code Installer Targets Developers With Browser Credential Stealer

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Researchers at Ontinue have identified a malware campaign that is specifically targeting developers. The campaign uses fake installers for a software called Claude Code to trick users into downloading malware that steals browser credentials, including passwords and cookies. This is particularly concerning for developers as they often store sensitive information in their browsers. The use of fake installers raises alarms about the increasing sophistication of cyber attacks aimed at software developers, who may be more vulnerable due to their technical backgrounds and reliance on various tools. Users are advised to be cautious when downloading software and to verify sources before installation.

Impact: Developers using fake Claude Code installers, browsers storing passwords and cookies.
Remediation: Users should avoid downloading software from unverified sources and consider using security tools to detect malware.
Read Original

Škoda Auto has reported a data breach following a hack of its online shop, which has resulted in the theft of personal information from an undisclosed number of customers. The company, part of the Volkswagen Group, has not revealed specific details about the types of data compromised. This incident raises concerns about the security of online shopping platforms and the sensitivity of customer data stored by automotive companies. Affected customers should be vigilant for potential phishing attempts or identity theft in the wake of this breach. The incident underscores the ongoing risks faced by businesses that handle personal information online.

Impact: Škoda Auto online shop customer data
Remediation: Customers are advised to monitor their accounts for suspicious activity and change passwords as a precaution.
Read Original
Pwn2Own Berlin 2026 Hits Capacity as Rejected Hackers Release 0-Days

Hackread – Cybersecurity News, Data Breaches, AI and More

Pwn2Own Berlin 2026 has reached full capacity for the first time, leading some researchers who were unable to participate to disclose zero-day exploits publicly. These exploits target widely used software and hardware, specifically Firefox and NVIDIA products, as well as various AI platforms. This situation raises concerns for users and companies relying on these technologies, as zero-day vulnerabilities can be exploited by attackers before patches are released. The public disclosure of these vulnerabilities means that organizations need to act quickly to assess their exposure and implement necessary security measures. This incident emphasizes the ongoing arms race between security researchers and hackers in the cybersecurity landscape.

Impact: Firefox, NVIDIA products, AI platforms
Remediation: Organizations should monitor for updates from affected vendors, apply security patches as soon as they are available, and review their systems for potential vulnerabilities. Additionally, users should consider implementing security best practices such as regular software updates and using security tools that can help detect and mitigate exploits.
Read Original

Researchers have discovered that a tokenizer library file used in Hugging Face AI models can be manipulated, allowing attackers to hijack the model's outputs and exfiltrate sensitive data. This vulnerability affects the integrity of AI models hosted on the Hugging Face platform, which are widely utilized in various applications, including natural language processing tasks. If exploited, this could lead to unauthorized access to data processed by these models, posing risks to both developers and end-users. It is crucial for organizations using these models to be aware of this issue and take steps to secure their implementations. The manipulation of a single file demonstrates how even small changes can have significant security implications.

Impact: Hugging Face AI models using the tokenizer library
Remediation: Users should review and secure their implementations of Hugging Face models, and monitor for updates or patches from Hugging Face regarding this issue.
Read Original

Sasha Levin, a co-maintainer of the Linux kernel, has introduced a proposal for a runtime killswitch designed to disable vulnerable kernel functions temporarily. This mechanism would be accessible through securityfs, allowing system administrators to quickly mitigate risks associated with known vulnerabilities. The proposal aims to provide a practical solution for managing vulnerabilities in the Linux kernel, which is critical given the widespread use of Linux in servers and devices. By enabling a quick response to potential exploits, this initiative could help enhance the security posture of systems utilizing the Linux kernel. The implementation of such a killswitch is especially relevant as cyber threats continue to evolve, targeting vulnerabilities in operating systems.

Impact: Linux kernel and its various distributions
Remediation: Implement the proposed runtime killswitch mechanism via securityfs to disable vulnerable functions temporarily.
Read Original

A newly discovered vulnerability, identified as CVE-2026-41940, is affecting cPanel and WebHost Manager, allowing attackers to exploit it shortly after it was made public. The threat actor known as Mr_Rot13 has been observed using this flaw to deploy a backdoor known as Filemanager, which can grant unauthorized access to compromised systems. This situation poses serious risks to web hosting providers and their customers, as it could lead to data breaches and unauthorized control over hosted websites. Companies using affected versions of cPanel and WebHost Manager need to take immediate action to secure their systems and protect sensitive data from being exploited. The urgency of addressing this vulnerability cannot be overstated, given the potential for widespread impact on affected users.

Impact: cPanel, WebHost Manager, affected versions not specified.
Remediation: Users should update their cPanel and WebHost Manager to the latest versions as soon as patches are released. Additional security measures such as reviewing access logs and implementing stricter firewall rules are recommended to mitigate potential exploitation.
Read Original

West Pharmaceutical Services recently fell victim to a ransomware attack that forced the company to take its systems offline worldwide. Hackers not only encrypted files but also exfiltrated sensitive data, raising concerns about the potential impact on the company's operations and the confidentiality of customer information. This incident highlights the growing threat of ransomware attacks in the healthcare sector, where the implications can be particularly severe given the sensitive nature of the data involved. Companies in similar industries should take this event as a wake-up call to bolster their cybersecurity measures and prepare for potential attacks. The full extent of the damage and the specific data compromised is still under investigation.

Impact: West Pharmaceutical Services systems, potentially affecting customer data and operational capabilities.
Remediation: N/A
Read Original

A group identified as TeamPCP has been linked to a series of supply chain attacks that have affected several popular software packages, including those from TanStack, UiPath, Mistral AI, OpenSearch, and Guardrails AI. These attacks involved modifying npm and PyPI packages to include a hidden JavaScript file named 'router_init.js', which is designed to gather information about how the software is executed. This kind of attack can significantly impact users, as it compromises the integrity of software dependencies that many developers rely on. The obfuscation of the malicious code makes it difficult for users to detect the threat. As this campaign unfolds, developers and users of the affected packages should remain vigilant and consider reviewing their dependencies to ensure they are not using compromised versions.

Impact: TanStack, UiPath, Mistral AI, OpenSearch, Guardrails AI (npm and PyPI packages)
Remediation: Users should review and update their dependencies to ensure they are using unmodified versions of the affected packages.
Read Original
Page 1 of 196Next