Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Trellix has reported a security breach involving unauthorized access to a portion of its source code repository. The company has stated that there are no indications of the compromised code being misused. In response to the incident, Trellix quickly initiated an investigation with forensic experts and has notified law enforcement to assist in the matter. While the breach raises concerns about the security of the company’s intellectual property, Trellix assures that no customer data has been affected. This incident serves as a reminder for companies to continually monitor and secure their source code environments to prevent potential exploitation in the future.

Impact: Trellix source code repository
Remediation: N/A
Read Original

Instructure, the developer of the Canvas learning platform, has reported a cybersecurity incident that has prompted an investigation into its potential impact. While details about the nature of the incident are still emerging, the company is assessing how it may affect users and systems. This incident is particularly concerning given Canvas's widespread use in educational institutions, where sensitive student and faculty data could be at risk. As the investigation continues, users are advised to stay alert for any updates and potential security measures that may be necessary to protect their information. The situation underscores the ongoing challenges that educational technology companies face in safeguarding their platforms against cyber threats.

Impact: Canvas learning platform, user data, educational institutions
Remediation: N/A
Read Original

A new software supply chain attack has been linked to a GitHub account named 'BufferZoneCorp.' This campaign involved malicious Ruby gems and Go modules that were disguised as legitimate libraries. Attackers used these sleeper packages to steal user credentials and tamper with continuous integration (CI) systems. Developers and organizations using Ruby and Go programming languages should be particularly vigilant, as this could compromise their software development processes. It's crucial for teams to verify the sources of their libraries and monitor for any unusual activity to prevent potential breaches.

Impact: Ruby gems, Go modules, CI systems
Remediation: Developers should verify the integrity of libraries before use, monitor for unusual activity, and implement security controls to detect and prevent unauthorized access.
Read Original

A DDoS attack has disrupted services for Ubuntu and Canonical, with the hacktivist group known as The Islamic Cyber Resistance in Iraq 313 Team claiming responsibility. They reportedly employed a DDoS-for-hire service named Beamed to carry out the attack. This incident highlights the vulnerabilities of major tech platforms to such attacks, which can lead to significant service outages and impact users relying on these systems. The ongoing nature of the attack suggests that it could continue to affect services for an indefinite period, raising concerns about the security and resilience of online infrastructure. Users and organizations relying on Ubuntu and Canonical services should be aware of potential disruptions and consider contingency plans.

Impact: Ubuntu, Canonical services
Remediation: N/A
Read Original

A database intended to support a new Medicare directory was accidentally left open to the public, exposing sensitive information, including Social Security numbers, of numerous healthcare providers. This database was part of the Centers for Medicare & Medicaid Services' (CMS) efforts to modernize Medicare. The exposure raises significant concerns about privacy and the potential for identity theft among the affected providers. With healthcare data being a prime target for cybercriminals, this incident underscores the need for stricter security measures when handling sensitive information. Providers are now at risk of fraud and misuse of their personal information due to this oversight.

Impact: Medicare directory database, healthcare providers' personal information
Remediation: Implement stronger access controls and regular audits of database permissions to prevent unauthorized access.
Read Original

Anthropic has introduced Claude Security in public beta, a new tool designed to help developers identify vulnerabilities within their code. Unlike traditional methods that rely on known attack patterns, Claude Security uses the Opus 4.7 model to scan entire codebases, generate verified patches, and trace data flows between components. This approach could significantly improve the security of software by providing deeper insights into potential weaknesses. As software development continues to grow, tools like this are increasingly important for companies looking to safeguard their applications against emerging threats. The introduction of such tools may encourage more developers to prioritize security in their coding practices.

Impact: N/A
Remediation: N/A
Read Original

In response to increasing cybersecurity threats targeting operational technology (OT) networks, the Cybersecurity and Infrastructure Security Agency (CISA) and other federal agencies have released new guidelines recommending a zero trust approach for these systems. As industrial systems become more interconnected, the risks of cyberattacks grow, prompting the need for stronger security measures. The guidance aims to help organizations better protect their OT environments by adopting zero trust principles, which focus on verifying all users and devices before granting access to sensitive systems. This is particularly important as the reliance on digital technologies in industrial sectors continues to expand. Implementing these practices is crucial for safeguarding critical infrastructure against evolving cyber threats.

Impact: N/A
Remediation: Organizations should implement zero trust principles, including verifying all users and devices before granting access.
Read Original

Recent reports have identified vulnerabilities in the EnOcean SmartServer IoT platform that could allow attackers to remotely compromise smart buildings, data centers, and factories. The issues are tied to a security bypass flaw (CVE-2026-22885) and a remote code execution vulnerability (CVE-2026-20761). These vulnerabilities affect instances of the EnOcean SmartServer that are exposed to the internet, making them susceptible to remote exploitation. This situation raises significant concerns for organizations relying on this technology, as it could lead to unauthorized access and control over critical infrastructure. Companies using EnOcean SmartServer should take immediate action to secure their systems against potential attacks.

Impact: EnOcean SmartServer IoT platform instances, specifically those exposed to the internet.
Remediation: Organizations should immediately review their EnOcean SmartServer deployments, applying any available patches and implementing security measures such as network segmentation and firewalls to limit exposure. Regular monitoring for unusual activity is also recommended.
Read Original

The article discusses several cybersecurity topics, including a denial-of-service (DOS) attack that impacts various services. Researchers have noted vulnerabilities in popular platforms like Outlook and cPanel, which could potentially expose user data or disrupt service. Additionally, there are mentions of security concerns related to programming languages such as Ruby and Go, which may affect developers using those technologies. The piece emphasizes the need for companies to stay vigilant and update their systems to prevent exploitation. This is significant as it affects not only individual users but also businesses relying on these platforms for their operations.

Impact: Outlook, cPanel, Ruby, Go
Remediation: Users should apply the latest patches for Outlook and cPanel, and developers are advised to review and update their code in Ruby and Go.
Read Original

North Korean hackers are increasingly targeting cryptocurrency, with reports indicating that 76% of all stolen crypto in 2026 has ties to the country. These attacks have become so frequent that they are occurring on a weekly basis, raising concerns among security experts. Researchers suggest that artificial intelligence may be playing a role in these sophisticated heists, potentially enhancing the attackers' capabilities. This trend poses significant risks not only to individual investors but also to the broader cryptocurrency market, which is already vulnerable to theft and fraud. As these incidents escalate, it becomes crucial for users and companies to strengthen their security measures to protect against such attacks.

Impact: Cryptocurrency platforms, wallets, exchanges
Remediation: Users and companies should enhance security protocols, including multi-factor authentication and regular security audits.
Read Original
Actively Exploited

SonicWall has issued firmware updates to address three vulnerabilities that could be exploited by attackers, particularly ransomware groups. These flaws affect certain models of SonicWall firewalls, and experts are warning that unpatched devices may quickly become targets for exploitation. Users of SonicWall products are urged to apply the updates as soon as possible to protect their systems. The swift response from SonicWall indicates the seriousness of these vulnerabilities and the potential risks associated with leaving them unaddressed. Organizations relying on SonicWall firewalls should prioritize these updates to avoid falling victim to cyberattacks.

Impact: SonicWall firewalls, specific models not detailed
Remediation: Firmware updates released by SonicWall; specific patch numbers not mentioned
Read Original

A Vietnamese-linked phishing campaign, dubbed AccountDumpling, has been uncovered, targeting Facebook users. This operation employs Google AppSheet as a tool to send phishing emails aimed at stealing Facebook account credentials. Researchers estimate that around 30,000 accounts have been compromised, with the attackers selling the stolen information through an underground marketplace. This incident raises concerns about the effectiveness of current phishing defenses, as even reputable platforms like Google can be misused for malicious purposes. Users are advised to remain vigilant and employ strong security measures to protect their accounts.

Impact: Facebook accounts
Remediation: Users should enable two-factor authentication on their Facebook accounts and be cautious of unsolicited emails, especially those requesting personal information.
Read Original

The Federal Communications Commission (FCC) has taken steps to combat robocalls and enhance cybersecurity by approving new rules aimed at telecommunications companies. These rules require companies to implement stricter identity verification processes for customers before enabling service. This move is part of a broader effort to reduce fraudulent calls and protect consumers from scams. By tightening the 'Know Your Customer' requirements, the FCC aims to hold service providers accountable for verifying the identities of their clients, which could ultimately help to reduce the number of robocalls that plague many users. This initiative affects all major telecom companies and emphasizes the need for better security practices in the industry.

Impact: Telecommunications companies
Remediation: Implement stricter identity verification processes for customer onboarding
Read Original
Hackers Use Jenkins Access to Deploy DDoS Botnet Against Gaming Servers

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Hackers are exploiting poorly configured Jenkins servers to launch a distributed denial-of-service (DDoS) attack against gaming servers, particularly targeting infrastructure associated with Valve Corporation. This attack leverages the Jenkins automation server, which is often used for continuous integration and deployment. Misconfigurations in these servers make it easier for attackers to gain unauthorized access and deploy their botnets. The implications are significant for gamers and the gaming industry, as DDoS attacks can disrupt services and lead to extended downtimes. Companies operating gaming platforms need to ensure their Jenkins servers are properly secured to mitigate the risk of such attacks in the future.

Impact: Jenkins servers, Valve Corporation infrastructure, gaming servers
Remediation: Ensure proper configuration of Jenkins servers, implement security best practices for server management, regularly audit server settings to prevent unauthorized access.
Read Original

The House of Representatives has passed a bill to extend Section 702 of the Foreign Intelligence Surveillance Act for an additional three years. This section allows the government to collect foreign intelligence data, which includes surveillance of non-U.S. citizens outside the country. While the House has shown support for the extension, the Senate’s stance remains uncertain, raising questions about the future of this surveillance program. The implications of this legislation are significant, as it affects privacy rights and government oversight of surveillance practices. As the debate continues, stakeholders from various sectors, including civil rights organizations and tech companies, are likely to voice their concerns over the balance between national security and individual privacy.

Impact: Section 702 of the Foreign Intelligence Surveillance Act
Remediation: N/A
Read Original
Page 1 of 181Next