Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A major international operation has led to the arrest of at least 276 individuals involved in cryptocurrency investment scams that targeted American citizens. The crackdown was spearheaded by Dubai Police, in collaboration with the U.S. Federal authorities, and resulted in the closure of nine scam centers. These operations had reportedly caused millions of dollars in losses to unsuspecting investors. This coordinated effort underscores the growing issue of cryptocurrency fraud, which has become increasingly prevalent as more people engage in digital investments. The significant amount seized, totaling $701 million, indicates the scale of these scams and the need for ongoing vigilance in the crypto space.

Impact: Cryptocurrency investment scams
Remediation: Increased awareness and vigilance against cryptocurrency scams; reporting suspicious investment opportunities to authorities.
Read Original

Instructure, an educational technology company, has confirmed that it suffered a data breach after a cyberattack. The ShinyHunters group, known for its extortion tactics, claims responsibility for the attack. Users of Instructure's platforms, which include tools like Canvas, may have had their personal data compromised. This incident raises concerns about the security of educational technologies and the potential risks to students and educators. As cyberattacks on educational institutions become more frequent, stakeholders need to ensure that proper security measures are in place to protect sensitive information.

Impact: Instructure's Canvas platform and potentially other educational tools
Remediation: Users should change their passwords and enable two-factor authentication where possible. Instructure is likely to provide further guidance on securing accounts.
Read Original

In April 2026, Sistemi Informativi, an IBM Italy subsidiary responsible for IT infrastructure management for various public and private institutions, suffered a significant breach. This incident is believed to be linked to the Chinese cyber operation known as Salt Typhoon. The breach raises alarms about the vulnerability of European digital defenses, especially as it targets a company managing critical infrastructure. The attack underscores the ongoing risks posed by state-sponsored cyber activities and highlights the need for enhanced cybersecurity measures across Europe. Organizations that rely on Sistemi Informativi for IT services may face increased risks as a result of this incident, prompting a review of their security protocols and defenses.

Impact: Sistemi Informativi (IBM Italy), public and private institutions relying on IT infrastructure management services.
Remediation: Organizations should review and strengthen their cybersecurity measures, particularly those relying on Sistemi Informativi for services.
Read Original
Paying Ransom Won’t Help as VECT 2.0 Ransomware Destroys Data Irreversibly

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

VECT 2.0 ransomware is a new and dangerous strain that has been discovered to have serious flaws that can irreversibly destroy files. Victims of this ransomware will find that paying the ransom is futile, as the data is lost permanently, making recovery impossible. This situation poses a significant risk to individuals and organizations worldwide, as it undermines the traditional hope of recovering data through ransom payments. The emergence of VECT 2.0 highlights the evolving tactics of cybercriminals and the need for better preventive measures. Users and organizations are urged to strengthen their cybersecurity defenses to avoid falling victim to this destructive ransomware.

Impact: N/A
Remediation: Users should implement strong data backup solutions and maintain updated antivirus software to protect against such threats.
Read Original

Recent research has revealed that scammers are exploiting Telegram's Mini App feature to conduct crypto scams and distribute Android malware. These operations involve impersonating reputable brands to trick users into providing personal information or investing in fraudulent schemes. The use of Telegram's platform allows these scams to reach a wide audience, putting many users at risk of financial loss and malware infections. This situation raises concerns about the security measures in place on social media platforms and highlights the need for users to be cautious when engaging with unfamiliar applications or links. Overall, this incident serves as a reminder for users to verify the legitimacy of offers and be vigilant against potential scams online.

Impact: Telegram Mini Apps, Android devices
Remediation: Users should avoid interacting with unknown Mini Apps on Telegram, verify the legitimacy of brands before engaging, and ensure their devices have updated security software.
Read Original

In a recent development, two U.S. cybersecurity experts have been sentenced for their involvement in a ransomware case. Their actions contributed to the growing issue of ransomware attacks that have been plaguing various sectors, highlighting the ongoing struggles law enforcement faces in combating cybercrime. A third individual connected to the case is awaiting a ruling scheduled for July. Additionally, Trellix has disclosed a breach that raises concerns about the security of its systems, though specific details about the breach have not been shared. These incidents serve as a reminder of the persistent threats in the cybersecurity landscape and the need for organizations to bolster their defenses against such attacks.

Impact: Trellix systems
Remediation: N/A
Read Original

Trellix has reported a security breach involving unauthorized access to a portion of its source code repository. The company has stated that there are no indications of the compromised code being misused. In response to the incident, Trellix quickly initiated an investigation with forensic experts and has notified law enforcement to assist in the matter. While the breach raises concerns about the security of the company’s intellectual property, Trellix assures that no customer data has been affected. This incident serves as a reminder for companies to continually monitor and secure their source code environments to prevent potential exploitation in the future.

Impact: Trellix source code repository
Remediation: N/A
Read Original

Instructure, the developer of the Canvas learning platform, has reported a cybersecurity incident that has prompted an investigation into its potential impact. While details about the nature of the incident are still emerging, the company is assessing how it may affect users and systems. This incident is particularly concerning given Canvas's widespread use in educational institutions, where sensitive student and faculty data could be at risk. As the investigation continues, users are advised to stay alert for any updates and potential security measures that may be necessary to protect their information. The situation underscores the ongoing challenges that educational technology companies face in safeguarding their platforms against cyber threats.

Impact: Canvas learning platform, user data, educational institutions
Remediation: N/A
Read Original

A new software supply chain attack has been linked to a GitHub account named 'BufferZoneCorp.' This campaign involved malicious Ruby gems and Go modules that were disguised as legitimate libraries. Attackers used these sleeper packages to steal user credentials and tamper with continuous integration (CI) systems. Developers and organizations using Ruby and Go programming languages should be particularly vigilant, as this could compromise their software development processes. It's crucial for teams to verify the sources of their libraries and monitor for any unusual activity to prevent potential breaches.

Impact: Ruby gems, Go modules, CI systems
Remediation: Developers should verify the integrity of libraries before use, monitor for unusual activity, and implement security controls to detect and prevent unauthorized access.
Read Original

A DDoS attack has disrupted services for Ubuntu and Canonical, with the hacktivist group known as The Islamic Cyber Resistance in Iraq 313 Team claiming responsibility. They reportedly employed a DDoS-for-hire service named Beamed to carry out the attack. This incident highlights the vulnerabilities of major tech platforms to such attacks, which can lead to significant service outages and impact users relying on these systems. The ongoing nature of the attack suggests that it could continue to affect services for an indefinite period, raising concerns about the security and resilience of online infrastructure. Users and organizations relying on Ubuntu and Canonical services should be aware of potential disruptions and consider contingency plans.

Impact: Ubuntu, Canonical services
Remediation: N/A
Read Original

A database intended to support a new Medicare directory was accidentally left open to the public, exposing sensitive information, including Social Security numbers, of numerous healthcare providers. This database was part of the Centers for Medicare & Medicaid Services' (CMS) efforts to modernize Medicare. The exposure raises significant concerns about privacy and the potential for identity theft among the affected providers. With healthcare data being a prime target for cybercriminals, this incident underscores the need for stricter security measures when handling sensitive information. Providers are now at risk of fraud and misuse of their personal information due to this oversight.

Impact: Medicare directory database, healthcare providers' personal information
Remediation: Implement stronger access controls and regular audits of database permissions to prevent unauthorized access.
Read Original

Anthropic has introduced Claude Security in public beta, a new tool designed to help developers identify vulnerabilities within their code. Unlike traditional methods that rely on known attack patterns, Claude Security uses the Opus 4.7 model to scan entire codebases, generate verified patches, and trace data flows between components. This approach could significantly improve the security of software by providing deeper insights into potential weaknesses. As software development continues to grow, tools like this are increasingly important for companies looking to safeguard their applications against emerging threats. The introduction of such tools may encourage more developers to prioritize security in their coding practices.

Impact: N/A
Remediation: N/A
Read Original

In response to increasing cybersecurity threats targeting operational technology (OT) networks, the Cybersecurity and Infrastructure Security Agency (CISA) and other federal agencies have released new guidelines recommending a zero trust approach for these systems. As industrial systems become more interconnected, the risks of cyberattacks grow, prompting the need for stronger security measures. The guidance aims to help organizations better protect their OT environments by adopting zero trust principles, which focus on verifying all users and devices before granting access to sensitive systems. This is particularly important as the reliance on digital technologies in industrial sectors continues to expand. Implementing these practices is crucial for safeguarding critical infrastructure against evolving cyber threats.

Impact: N/A
Remediation: Organizations should implement zero trust principles, including verifying all users and devices before granting access.
Read Original

Recent reports have identified vulnerabilities in the EnOcean SmartServer IoT platform that could allow attackers to remotely compromise smart buildings, data centers, and factories. The issues are tied to a security bypass flaw (CVE-2026-22885) and a remote code execution vulnerability (CVE-2026-20761). These vulnerabilities affect instances of the EnOcean SmartServer that are exposed to the internet, making them susceptible to remote exploitation. This situation raises significant concerns for organizations relying on this technology, as it could lead to unauthorized access and control over critical infrastructure. Companies using EnOcean SmartServer should take immediate action to secure their systems against potential attacks.

Impact: EnOcean SmartServer IoT platform instances, specifically those exposed to the internet.
Remediation: Organizations should immediately review their EnOcean SmartServer deployments, applying any available patches and implementing security measures such as network segmentation and firewalls to limit exposure. Regular monitoring for unusual activity is also recommended.
Read Original

The article discusses several cybersecurity topics, including a denial-of-service (DOS) attack that impacts various services. Researchers have noted vulnerabilities in popular platforms like Outlook and cPanel, which could potentially expose user data or disrupt service. Additionally, there are mentions of security concerns related to programming languages such as Ruby and Go, which may affect developers using those technologies. The piece emphasizes the need for companies to stay vigilant and update their systems to prevent exploitation. This is significant as it affects not only individual users but also businesses relying on these platforms for their operations.

Impact: Outlook, cPanel, Ruby, Go
Remediation: Users should apply the latest patches for Outlook and cPanel, and developers are advised to review and update their code in Ruby and Go.
Read Original
Page 1 of 182Next