Italian officials have taken action against the CINEMAGOAL app, a piracy tool that illegally provided access to popular streaming services like Netflix, Disney+, and Spotify. The app was reportedly using stolen authentication codes to bypass payment systems, allowing users to access content without subscriptions. This crackdown is significant as it not only protects the intellectual property rights of these streaming platforms but also highlights ongoing challenges in combating online piracy. By dismantling this network, authorities aim to deter similar activities in the future and safeguard legitimate services. The action is part of a broader effort to enforce copyright laws and ensure users are not misled into using illegal services.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Anthropic announced that its Project Glasswing has identified over 10,000 high- or critical-severity vulnerabilities in widely-used software since its launch last month. This initiative involves collaboration with around 50 partners and focuses on software deemed systemically important on a global scale. These vulnerabilities pose significant risks to organizations and users relying on this software, potentially exposing them to data breaches or cyberattacks. The findings emphasize the urgent need for software developers and companies to address these flaws promptly to safeguard their systems and users. This proactive approach highlights the role of AI in enhancing cybersecurity efforts.
SecurityWeek
A new vulnerability, dubbed 'Underminr', affects around 88 million domains, allowing attackers to hide malicious connections behind trusted domain names. This exploit can bypass DNS filtering mechanisms, making it easier for cybercriminals to manage command-and-control traffic without detection. As a result, organizations that rely on these domains for security may be at greater risk of compromise. The vulnerability raises concerns about the effectiveness of current DNS security measures, as attackers can leverage this flaw to blend in with legitimate traffic. Companies and system administrators are urged to review their DNS filtering strategies to mitigate potential risks associated with this vulnerability.
Cybersecurity researchers have identified a software supply chain attack that compromised several PHP packages associated with Laravel-Lang. The affected packages include laravel-lang/lang, laravel-lang/http-statuses, laravel-lang/attributes, and laravel-lang/actions. These packages were manipulated to deliver a credential-stealing framework that could potentially affect developers and users utilizing these resources. This incident raises concerns about the security of software supply chains, particularly in open-source communities where such packages are widely used. Developers should remain vigilant and review their dependencies to ensure they are not using compromised versions of these packages.
The Hacker News
CVE-2026-48172A severe security vulnerability has been discovered in the LiteSpeed User-End cPanel Plugin, identified as CVE-2026-48172, which has a maximum CVSS score of 10.0. This flaw allows attackers to exploit incorrect privilege assignments, enabling them to execute arbitrary scripts with root privileges. As a result, any cPanel user, including potential attackers or compromised accounts, can take advantage of this vulnerability. The ongoing exploitation of this flaw poses significant risks to server security and data integrity, making it crucial for affected users to take immediate action. The situation emphasizes the need for vigilance among web hosts and cPanel users to prevent unauthorized access and maintain secure environments.
SCM feed for Latest
Ubiquiti has patched three serious vulnerabilities in its UniFi OS, labeled CVE-2026-34908, CVE-2026-34909, and CVE-2026-34910. These flaws could allow unauthorized users to make system changes, access sensitive system files through path traversal, and execute commands remotely via command injection. This is a significant concern for users of UniFi OS, as it could lead to unauthorized access and control over network devices. Ubiquiti is urging all users to apply the updates as soon as possible to protect their systems from potential exploitation. Given the nature of these vulnerabilities, companies using UniFi OS should prioritize updating their systems to ensure their networks remain secure.
SCM feed for Latest
Cisco's recent research has raised concerns about the reliability of AI-generated security incident reports. The study found that large language models (LLMs) can produce inconsistent results, even when querying the same data. This variability can lead to confusion and mistakes in understanding security incidents, which is critical for organizations relying on accurate reporting for their security posture. The findings suggest that companies using AI for cybersecurity reporting need to be cautious and verify the data produced by these systems, as discrepancies could hinder effective incident response. As AI becomes more integrated into security operations, ensuring its accuracy will be vital for maintaining trust and effectiveness in cybersecurity efforts.
SCM feed for Latest
Based Apparel, a merchandise site linked to Kash Patel, was recently hacked to distribute infostealer malware aimed at stealing user credentials. This security incident came to light when a user on X shared the alarming news. The malware poses a serious risk to anyone who visited the site, as it can compromise sensitive information like login details. Users who made purchases or even just browsed the site should take immediate steps to protect their accounts, such as changing passwords and monitoring for suspicious activity. The attack underscores the ongoing risks associated with online shopping and the need for users to remain vigilant about their cybersecurity practices.
SCM feed for Latest
The Belarus-linked hacking group Ghostwriter, also known as UAC-0057 and UNC1151, has launched a multi-stage cyberattack targeting Ukraine. Researchers have identified that the group is using the Prometheus learning platform as bait to lure victims into their traps. This tactic raises concerns as it not only threatens the security of individuals and organizations in Ukraine but also highlights the ongoing cyber warfare linked to the conflict in the region. The implications are significant, as such attacks can disrupt critical infrastructure and undermine trust in digital platforms, especially in a time of heightened tensions. As the situation evolves, vigilance is essential for those engaged in online education and other sectors potentially impacted by these tactics.
SCM feed for Latest
A recent report by Hunt.io has uncovered over 1,350 command and control (C2) servers operating across 14 countries in the Middle East. Notably, Saudi Telecom Company (STC) has been linked to more than 72% of these servers, often through systems that have been compromised by attackers. This concentration of malicious infrastructure raises concerns for cybersecurity in the region, as it suggests that many customer systems are being exploited for nefarious purposes. The presence of so many C2 servers indicates a significant risk for data breaches and other cyber incidents, affecting both businesses and individuals who rely on these services. Stakeholders in the region should be vigilant and take steps to secure their networks.
Authorities in Europe and North America have successfully taken down a criminal VPN service known as First VPN, which was being used by 25 different ransomware groups to hide their activities, including data breaches and denial-of-service attacks. The operation was primarily led by law enforcement in France and the Netherlands, with support from other countries since December. This dismantling is significant because it disrupts the network that these cybercriminals relied on to carry out their attacks, making it harder for them to operate anonymously. By targeting the infrastructure that supports these ransomware operations, authorities hope to reduce the frequency and impact of future cyberattacks. This action underscores the ongoing international effort to combat cybercrime and protect organizations from ransomware threats.
In a significant law enforcement operation, Dutch financial crime investigators have arrested two men and confiscated 800 servers from a web hosting company implicated in facilitating cyberattacks, misinformation campaigns, and other malicious activities. The servers were reportedly used to support illegal operations, raising concerns about the role of web hosting services in cybercrime. This seizure reflects a growing effort by authorities to combat the infrastructure that supports cybercriminals. The impact of these arrests could disrupt ongoing cyber operations and serve as a warning to other hosting providers about the legal consequences of enabling such activities. The effectiveness of these measures will depend on the ongoing investigations and potential legal actions against those involved.
SCM feed for Latest
Malwarebytes has uncovered a phishing scam on Facebook that specifically targets users aged 40 and older. This scheme lures victims with fake offers for Aldi meat boxes, enticing them to provide personal information or financial details. The attackers are exploiting the trust users may have in social media platforms, making it crucial for older adults to be vigilant about suspicious offers. This incident serves as a reminder that scammers often tailor their tactics to exploit specific demographics, highlighting the need for increased awareness among users. Protecting personal information online is essential, especially when faced with seemingly harmless promotions.
SCM feed for Latest
State officials are urging Congress to reauthorize the State and Local Cybersecurity Grant Program (SLCGP), which has been crucial for local governments struggling with cybersecurity issues. Many of these governments lack the necessary staff and resources to effectively protect themselves against cyber threats. The SLCGP has provided essential funding and support, helping to strengthen cybersecurity defenses at the local level. Without the grant program, these municipalities may find it increasingly difficult to safeguard sensitive data and infrastructure from cyberattacks. This call to action underscores the ongoing need for federal support in enhancing local cybersecurity capabilities.
Schneier on Security
A contractor for the Cybersecurity & Infrastructure Security Agency (CISA) accidentally exposed sensitive credentials in a public GitHub repository. This leak included access details for several highly privileged AWS GovCloud accounts and internal CISA systems, along with documentation on how the agency builds and deploys software. Security experts have labeled this incident as one of the most serious data leaks involving government information in recent years. The exposure raises significant concerns about the security of sensitive government operations and the potential for misuse of the leaked credentials. It underscores the importance of maintaining strict access controls and oversight for contractors handling sensitive data.