Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Hackers have compromised the popular node-ipc npm package, adding malware designed to steal user credentials in recent versions. This supply chain attack specifically targets developers who rely on node-ipc for inter-process communication in their applications. Users of the affected package are at risk of having their sensitive information, such as passwords and tokens, captured by the malicious code. This incident serves as a reminder of the vulnerabilities that can arise in the software supply chain, affecting not just individual developers but also the larger ecosystem that relies on these packages. Developers are urged to review their dependencies and ensure they are using safe versions of node-ipc to protect their credentials.

Impact: node-ipc npm package
Remediation: Developers should update to the latest safe version of node-ipc and review their project dependencies for any other compromised packages.
Read Original

Microsoft has confirmed that a new zero-day vulnerability in Exchange Server, identified as CVE-2026-42897, is being actively exploited by attackers. This vulnerability has a CVSS score of 8.1, indicating a high level of severity. It stems from improper handling of user input during web page generation, which can lead to cross-site scripting (XSS) attacks. Organizations using affected versions of Exchange Server are at risk, as attackers could exploit this flaw to execute malicious scripts in the context of users' browsers. Microsoft urges users to take immediate action to protect their systems and data from potential breaches.

Impact: Microsoft Exchange Server (specific versions not detailed)
Remediation: Microsoft recommends that users apply available security updates to their Exchange Server installations. Regularly updating systems and monitoring for unusual activity are also advised as general best practices.
Read Original

The REMUS infostealer is a malware that focuses on stealing browser sessions and authentication tokens, which are now considered more valuable than traditional passwords. Researchers from Flare have observed its rapid evolution, emphasizing its capability for session theft and operational scalability. This malware allows attackers to hijack users' online accounts without needing to crack passwords, posing a significant risk to individuals and organizations alike. As cybercriminals increasingly adopt this method, users must be vigilant about their online security practices. The shift towards session theft indicates a growing trend in cyberattacks that could affect a wide range of online services and platforms.

Impact: Browser sessions, authentication tokens
Remediation: Users should enable two-factor authentication where possible and regularly update their passwords. Monitoring account activity for unauthorized access is also recommended.
Read Original

Researchers have identified four vulnerabilities in OpenClaw, a software framework that could be exploited by attackers to steal data, gain higher privileges, and maintain persistent access to systems. These vulnerabilities, referred to as Claw Chain, allow cybercriminals to infiltrate systems, extract sensitive information, and install backdoors for ongoing access. The flaws pose a significant risk to organizations using OpenClaw, as they can lead to serious data breaches and unauthorized control over affected systems. Companies that rely on this software should take immediate action to address these vulnerabilities to protect their data and systems from potential exploitation.

Impact: OpenClaw software framework
Remediation: Users should apply available patches, review system configurations, and monitor for unusual activity to mitigate risks associated with these vulnerabilities.
Read Original

IT subcontractors are facing a new challenge that goes beyond traditional cybersecurity threats like data breaches and ransomware. Starting in 2026, the costs associated with cyber insurance are becoming a significant factor in contract negotiations. Many firms are finding that their insurance premiums or coverage limits are impacting their ability to secure contracts, as clients increasingly prioritize the financial stability provided by insurance over the actual cybersecurity measures in place. This shift may force subcontractors to rethink their approaches to both security and insurance, as the balance between risk management and contract acquisition becomes more complex. As the industry evolves, understanding the implications of insurance on contract viability will be crucial for IT firms moving forward.

Impact: IT subcontractors, cyber insurance policies
Remediation: IT subcontractors should evaluate their insurance policies and consider how coverage limits might affect their contract opportunities. They may also need to enhance their cybersecurity measures to reassure clients about their risk management.
Read Original
Actively Exploited

Cisco has released a patch for a serious security vulnerability (CVE-2026-20182) affecting its Catalyst SD-WAN solutions. This flaw allows attackers to bypass authentication in both the Catalyst SD-WAN Controller and the Catalyst SD-WAN Manager, which are critical components for managing SD-WAN deployments. The vulnerability has been actively exploited by a sophisticated cyber threat actor, putting both on-premises and cloud users at risk. Organizations using these Cisco products should prioritize applying the patch to safeguard their networks from potential breaches. Failure to address this vulnerability could lead to unauthorized access and significant security incidents.

Impact: Cisco Catalyst SD-WAN Controller, Cisco Catalyst SD-WAN Manager, both on-prem and cloud deployments
Remediation: Cisco has released patches for CVE-2026-20182. Users are advised to update their systems immediately to mitigate the risk of exploitation. Specific patch numbers or versions were not provided in the article.
Read Original

Microsoft has issued a warning regarding a zero-day vulnerability in Exchange Server, identified as CVE-2026-42897, which is currently being exploited by attackers. This vulnerability affects various versions of Exchange Server, putting organizations that use this software at risk. Microsoft has not yet released a permanent patch but has provided interim mitigations to help secure affected systems. Users and administrators are urged to implement these mitigations to protect their environments until a comprehensive fix is available. The active exploitation of this vulnerability underscores the urgency for affected organizations to take immediate action.

Impact: Microsoft Exchange Server versions affected by CVE-2026-42897.
Remediation: Microsoft has shared mitigations for CVE-2026-42897 until a permanent patch can be released. Specific details on the mitigations were not provided in the article.
Read Original

The article emphasizes the growing importance of AI resilience in the face of security breaches, suggesting that companies should focus not only on speed but also on the durability of their AI systems. It argues that as AI becomes more integrated into business operations, the potential for breaches increases, and organizations must prepare to withstand these attacks. This resilience involves safeguarding both the AI models and the training data used to create them. The piece calls for businesses to rethink their security strategies and invest in robust defenses to ensure their survival in an increasingly AI-driven world. This is particularly relevant as the frequency and sophistication of cyberattacks continue to rise.

Impact: AI models, training data, enterprise security systems
Remediation: Companies should invest in AI resilience strategies, including securing AI models and training data.
Read Original

American Lending Center, a non-bank lender, recently confirmed that a ransomware attack it experienced nearly a year ago has impacted the personal data of approximately 123,000 individuals. The company took time to thoroughly investigate the breach before disclosing it to the public. While specific details about how the attackers gained access or the type of data compromised have not been released, the incident raises concerns about the security of sensitive financial information. Affected individuals may face risks such as identity theft or financial fraud as a result of this breach. It serves as a reminder for companies to prioritize cybersecurity measures to protect client data.

Impact: Personal data of 123,000 individuals, potentially including financial information.
Remediation: N/A
Read Original
Actively Exploited

Recent findings reveal that some AI-driven video age-verification systems can be easily deceived using simple disguises, like a fake mustache. This raises significant concerns for platforms relying on these systems to prevent underage access to content. Researchers demonstrated that these AI checks, designed to ensure compliance with age restrictions, may not be as secure as intended. The implications of this vulnerability could be serious, as it allows minors to bypass safeguards meant to protect them. Companies that implement age-verification measures need to reassess their systems to ensure they cannot be easily tricked and to better protect their users.

Impact: AI-based video age-verification systems
Remediation: Companies should enhance their age-verification technologies and consider additional verification methods to prevent easy circumvention.
Read Original

OpenAI reported that two of its employee devices were compromised due to a supply chain attack linked to TanStack, specifically the Mini Shai-Hulud incident. Fortunately, the company confirmed that no user data, production systems, or intellectual property were altered or stolen during this attack. Upon discovering the malicious activity, OpenAI swiftly initiated an investigation and took measures to contain the situation. This incident underscores the ongoing risks associated with supply chain vulnerabilities, highlighting the need for organizations to remain vigilant against such attacks. While no sensitive information was impacted, the event serves as a reminder of the potential threats lurking in software dependencies.

Impact: OpenAI employee devices, TanStack software components
Remediation: Applied necessary macOS updates and security patches
Read Original

OpenAI recently experienced a supply chain attack known as the TanStack incident, which led to the compromise of two employee devices. During the attack, attackers were able to steal credential material from OpenAI's code repositories, potentially exposing sensitive information related to their operations. This incident raises concerns about the security of development environments and the risks posed by supply chain vulnerabilities, which can affect not only the targeted company but also its users and partners. As organizations increasingly rely on external libraries and tools, incidents like this highlight the need for stronger security measures to protect against similar attacks in the future.

Impact: OpenAI code repositories, employee devices
Remediation: N/A
Read Original

ESET has reported that the Ghostwriter group, also known as FrostyNeighbor, has resumed its cyberattacks on Ukrainian government organizations. This activity has been ongoing since at least March 2026 and follows a pattern similar to their previous campaigns. The group appears to be targeting sensitive government systems, which raises concerns about the security of critical infrastructure in Ukraine. As the conflict in the region continues, these attacks could have serious implications for government operations and national security. Researchers emphasize the need for heightened vigilance and improved cybersecurity measures within affected organizations.

Impact: Ukrainian government organizations
Remediation: Organizations should enhance their cybersecurity protocols and monitor for suspicious activity.
Read Original

Microsoft has issued a warning about a serious cross-site scripting (XSS) vulnerability, identified as CVE-2026-42897, affecting on-premises versions of Microsoft Exchange Server. This vulnerability allows unauthorized attackers to spoof users over a network, posing significant risks to organizations that have not yet applied any fixes. The affected versions include Microsoft Exchange Server Subscription Edition RTM, 2019, and 2016, while Exchange Online remains unaffected. Microsoft is currently working on a permanent fix, but until it is released, they have provided temporary mitigations for users to implement. Organizations using the affected versions should take immediate action to safeguard their systems from potential exploitation.

Impact: Microsoft Exchange Server Subscription Edition RTM, Microsoft Exchange Server 2019, Microsoft Exchange Server 2016
Remediation: Microsoft has provided temporary mitigations for the vulnerability while a permanent fix is in development. Users are advised to implement these mitigations immediately to protect against potential exploitation.
Read Original

The hacking group TeamPCP has released the source code for a piece of malware called the Shai-Hulud Worm. This release is particularly concerning as the group is actively encouraging other cybercriminals to utilize the code for supply chain attacks, even offering monetary rewards for successful exploits. Such attacks can have serious implications, as they target the software and services that organizations rely on, potentially compromising a wide range of systems. By making this code publicly available, TeamPCP is increasing the risk of these types of attacks, which could affect various sectors that depend on secure supply chains. Organizations should be vigilant and review their security measures to mitigate potential risks associated with this malware.

Impact: N/A
Remediation: Organizations should review their security measures and monitor for suspicious activity related to supply chain attacks.
Read Original
Page 1 of 201Next