Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The GlassWorm campaign has evolved significantly since its inception in 2025, now utilizing a Zig-based dropper embedded in a fake Integrated Development Environment (IDE) extension. This method targets developer tools, allowing attackers to compromise systems through malicious software packages. Initially starting with harmful npm packages, the campaign has escalated to large-scale supply chain attacks affecting platforms like GitHub, npm, and Visual Studio Code. Additionally, the attackers have deployed Remote Access Trojans (RATs) via counterfeit browser extensions. This evolution raises concerns for developers and organizations, as it highlights the growing sophistication of supply chain threats in the software development ecosystem.

Impact: GitHub, npm, Visual Studio Code, developer tools
Remediation: Developers should avoid installing unverified extensions and regularly audit their dependencies for malicious packages.
Read Original
FBI Recovers Deleted Signal Messages Through iPhone Notifications

Hackread – Cybersecurity News, Data Breaches, AI and More

Recent court proceedings have revealed that messages sent via the Signal app can still be accessed by the FBI through iPhone notification data, even after users have deleted them. This discovery raises significant concerns about privacy and the effectiveness of end-to-end encryption, as it suggests that deleted messages may not be entirely erased from device records. The implications of this finding are serious for Signal users, particularly those who rely on the app for confidential communications. The case highlights the potential vulnerabilities in how smartphones handle notifications and data retention, prompting users to reconsider the security of their communications. It also raises questions about the extent to which law enforcement can retrieve deleted digital information, which could affect how individuals perceive their privacy in the digital age.

Impact: Signal messaging app, iPhone notifications
Remediation: Users may need to be cautious about the information they share over Signal, as deleted messages could still be accessible via device notifications.
Read Original
Actively Exploited

A serious vulnerability in the open-source Python notebook tool Marimo, identified as CVE-2026-39987, has been exploited within just 10 hours of its disclosure on April 8, 2026. This flaw has a CVSS score of 9.3, indicating its severity and potential impact. Researchers from the Sysdig Threat Research Team reported that attackers began exploiting this vulnerability almost immediately, raising alarms about the security of systems using Marimo. This incident underscores the urgency for users and organizations relying on this tool to take immediate action to protect their systems from potential breaches. Quick exploitation of such vulnerabilities demonstrates the need for timely patching and awareness in the cybersecurity community.

Impact: Marimo (open-source Python notebook tool)
Remediation: Users should apply patches as soon as they are available. It's also advisable to limit access to the Marimo tool and monitor for any unusual activity in systems that use it.
Read Original
ShinyHunters Claims Rockstar Games Snowflake Breach via Anodot

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

ShinyHunters, a known hacking group, claims to have gained access to data from Rockstar Games' Snowflake platform due to a breach involving Anodot, a data analytics company. They have threatened to leak this data on April 14 unless their ransom demands are met. This incident raises concerns about the security of sensitive information related to Rockstar, a major player in the gaming industry. If the breach is legitimate, it could expose user data and proprietary information, impacting both the company and its customers. The situation is still developing, and Rockstar Games has not yet confirmed the breach or provided details on any potential data compromise.

Impact: Rockstar Games, Snowflake platform, Anodot
Remediation: N/A
Read Original

The U.S. Treasury Department's Office of Cybersecurity and Critical Infrastructure Protection has announced a new initiative aimed at sharing cyber threat intelligence with cryptocurrency firms. This program is designed to help these companies better identify, prevent, and respond to cyber threats, especially as attacks on the crypto sector grow more frequent and sophisticated. The initiative comes in response to increasing concerns over security vulnerabilities in the cryptocurrency market, which has become a prime target for cybercriminals. By providing free intelligence resources, the Treasury hopes to strengthen the security posture of these firms and protect consumers. This move reflects a broader recognition of the need for enhanced security measures in the rapidly evolving digital currency landscape.

Impact: Cryptocurrency firms
Remediation: N/A
Read Original

Hims, a telehealth company, has suffered a data breach that exposes sensitive personal health information (PHI) of its users. The breach could reveal details about users' conditions, such as baldness, obesity, or erectile dysfunction. The attackers may misuse this data for identity theft, targeted phishing scams, or other malicious activities. This incident raises serious concerns about the protection of personal health data in the telehealth sector, highlighting the ongoing challenges companies face in safeguarding sensitive information. Users of Hims should be vigilant about potential phishing attempts and monitor their accounts for unusual activity.

Impact: Hims telehealth services and user accounts
Remediation: Users should change their passwords and enable two-factor authentication where possible. Companies should review their security measures and consider additional training for staff on data protection.
Read Original

Cybersecurity teams are facing an increasing number of credential-based attacks, which are becoming more sophisticated and harder to detect. To combat this trend, experts suggest that teams need to shift their detection models to better identify these threats as they evolve. This includes adapting to the changing tactics used by attackers, who often disguise their activities to look like normal business operations. As organizations continue to rely on digital credentials for access, the risk of these types of attacks grows, potentially leading to significant data breaches and financial losses. Companies must stay vigilant and update their security strategies to protect against these emerging threats.

Impact: Credential-based attacks on various systems and organizations
Remediation: Update detection models and security protocols to identify unusual access patterns and behaviors
Read Original

In recent discussions, cybersecurity experts have raised alarms about the implications of Claude Mythos, a new threat that could impact various organizations. Financial institutions, particularly those that traditionally invest less in cybersecurity than larger banks, are urged to take immediate action to bolster their defenses. The meeting between Bessent and Powell, along with top bankers, indicates a growing concern about potential vulnerabilities that could be exploited by attackers. As cyber threats continue to evolve, companies must prioritize their cybersecurity strategies to protect sensitive data and maintain trust with customers. The conversation underscores the need for proactive measures in an increasingly digital landscape.

Impact: N/A
Remediation: Companies should enhance their cybersecurity budgets and strategies to address potential vulnerabilities.
Read Original

The FBI and NSA have issued a warning about Russian hackers taking advantage of vulnerabilities in routers. These attackers are reportedly exploiting weaknesses to gain unauthorized access to networks, potentially compromising personal and corporate data. This issue affects a wide range of router models, but specific brands and versions have not been disclosed. Users and businesses are encouraged to take proactive measures to secure their routers, as these vulnerabilities could lead to significant security breaches. Ensuring that firmware is updated and default settings are changed are among the recommended steps to mitigate the risk.

Impact: Routers from various vendors
Remediation: Update router firmware, change default settings, disable remote management, use strong passwords, and enable firewall features.
Read Original

Zephyr Energy recently disclosed a significant financial loss of £700,000 due to a business email compromise (BEC) attack. Cybercriminals likely gained access to the company's email or accounting systems, allowing them to alter payment details without detection. This incident points to the growing threat of BEC attacks, where attackers manipulate communication to deceive organizations into making fraudulent payments. The financial implications for Zephyr Energy are substantial, and it raises concerns about the security measures in place to protect sensitive information. Companies need to be vigilant about email security to prevent similar attacks in the future.

Impact: N/A
Remediation: N/A
Read Original

Iranian-linked hackers have targeted U.S. critical infrastructure by exploiting vulnerabilities in nearly 4,000 internet-connected programmable logic controllers (PLCs) made by Rockwell Automation. These devices are essential for controlling various industrial processes, making them prime targets for cyberattacks that could disrupt operations. The exposure of these PLCs raises significant concerns about the security of critical infrastructure, as successful attacks could lead to severe disruptions in industries such as manufacturing and energy. Researchers are urging companies using these devices to take immediate action to strengthen their cybersecurity measures and protect against potential intrusions. This incident serves as a reminder of the ongoing risks posed by state-sponsored cyber activities and the need for enhanced defenses in industrial environments.

Impact: Programmable Logic Controllers (PLCs) by Rockwell Automation
Remediation: Companies should enhance cybersecurity measures, including network segmentation, regular software updates, and monitoring for unusual activity.
Read Original

The Financial Industry Regulatory Authority (FINRA) has established a new Financial Intelligence Fusion Center aimed at tackling cybersecurity threats and fraud in the financial sector. This initiative is designed to enhance the collaboration between various financial institutions and regulatory bodies to share intelligence and improve responses to cyber threats. The center will focus on analyzing data, identifying emerging threats, and providing actionable insights to better protect investors and financial markets. By fostering cooperation among different players in the industry, FINRA hopes to strengthen defenses against increasingly sophisticated cybercriminals. The establishment of this center comes at a time when the financial sector is facing heightened risks from cyberattacks and fraudulent activities, making this initiative particularly timely and necessary.

Impact: Financial institutions, investors, regulatory bodies
Remediation: N/A
Read Original
Actively Exploited

In October 2025, researchers identified a new malware strain named LucidRook, which is targeting non-governmental organizations (NGOs) in Taiwan. The malware is delivered through RAR or 7-Zip archives that use social engineering tactics to entice users into executing a dropper called LucidPawn. This method of distribution raises concerns about the security of NGOs, which often handle sensitive information and may not have the same level of cybersecurity resources as larger organizations. The attacks reflect a growing trend of cybercriminals focusing on specific groups, potentially aiming to disrupt their operations or steal valuable data. As these organizations face increasing risks, the need for heightened security measures becomes more critical.

Impact: NGOs in Taiwan
Remediation: Organizations should implement rigorous security training for employees, use advanced email filtering, and ensure that antivirus software is up to date. Regularly backing up data and monitoring network traffic for unusual activity are also recommended.
Read Original

The article discusses the ongoing concerns among cryptographers about the potential impact of quantum computing on current encryption methods. As quantum computers become more powerful, they could potentially decrypt data that is currently secured by traditional algorithms. This has prompted the US National Institute of Standards and Technology (NIST) to work on developing post-quantum cryptography (PQC) to address these vulnerabilities. The timing of when quantum computers will reach this level of capability remains uncertain, but experts are actively preparing for the implications. This situation is significant as it could affect the security of sensitive data across various sectors, highlighting the need for organizations to begin transitioning to quantum-resistant encryption methods.

Impact: Current encryption algorithms, legacy systems, sensitive data protection
Remediation: Transition to post-quantum cryptography (PQC) methods
Read Original

Chevin Fleet Solutions has confirmed that its FleetWave environments, hosted in Azure in both the UK and the US, were taken offline due to a cybersecurity incident. This precautionary measure was implemented to ensure the safety and integrity of user data and services. While specific details about the nature of the incident have not been disclosed, the downtime affects users who rely on FleetWave for fleet management solutions. The decision to take the systems offline suggests that the company is taking the threat seriously and prioritizing security over service availability. Users and organizations that utilize FleetWave should stay updated on the situation and follow any guidance provided by Chevin regarding service restoration and data security.

Impact: FleetWave environments hosted in Azure (UK and US)
Remediation: N/A
Read Original
Page 1 of 150Next