Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Trivy, an open-source vulnerability scanner developed by Aqua Security, has been compromised for the second time in a month. This breach specifically targeted the GitHub Actions workflows 'aquasecurity/trivy-action' and 'aquasecurity/setup-trivy', which are commonly used for scanning Docker container images for vulnerabilities. Attackers hijacked 75 tags to deliver malware that aims to steal sensitive continuous integration and continuous delivery (CI/CD) secrets. This incident is particularly concerning as it exposes users relying on these tools to potential data breaches and security risks. Organizations using these GitHub Actions should take immediate action to secure their environments and monitor for any unauthorized access or data leaks.

Impact: aquasecurity/trivy-action, aquasecurity/setup-trivy
Remediation: Users should audit their GitHub Actions workflows, revoke any compromised secrets, and update to the latest versions of the affected actions as soon as possible.
Read Original

The ransomware group known as Beast Gang has accidentally exposed files from their central cloud server, revealing their aggressive tactics for attacking network backups. These files show a clear strategy focused on targeting backup systems, which is a common method used by ransomware groups to ensure victims are more likely to pay the ransom. This incident raises serious concerns for organizations that rely on cloud services for data storage and highlights the importance of securing backup systems against potential ransomware attacks. As these tactics become more public, companies may need to reassess their cybersecurity measures to protect against such vulnerabilities. The exposure of these files could also lead to further attacks as other cybercriminals may adopt similar strategies.

Impact: N/A
Remediation: Companies should enhance their backup security, implement regular security audits, and consider offline backup solutions to mitigate risks from ransomware attacks.
Read Original

Ubiquiti has disclosed a serious vulnerability in its UniFi Networking Application, which is used by customers to manage their networking devices. This flaw poses a risk of account takeover, potentially allowing attackers to gain unauthorized access to user accounts. As of now, the vulnerability hasn't been exploited publicly, which gives users a window to secure their systems. The issue affects a wide range of users who rely on the UniFi Networking Application for their networking needs. Given the severity of the flaw, it’s crucial for users to stay informed and take necessary precautions to protect their accounts.

Impact: UniFi Networking Application users; Ubiquiti networking devices
Remediation: Users should apply any available updates for the UniFi Networking Application as soon as they are released. Additionally, implementing strong, unique passwords and enabling two-factor authentication can help mitigate account takeover risks.
Read Original

A severe security vulnerability in Langflow, identified as CVE-2026-33017, has been actively exploited just 20 hours after being disclosed. This flaw, which has a CVSS score of 9.3, is due to missing authentication combined with a code injection issue that could allow attackers to execute arbitrary code remotely. Organizations using Langflow are at risk, as the fast exploitation of such vulnerabilities underscores the need for immediate action. Users and administrators should prioritize addressing this flaw to protect their systems from potential attacks. The rapid responses from malicious actors highlight the urgency for security teams to stay vigilant and proactive against new threats.

Impact: Langflow software, potentially affecting any systems or applications utilizing this platform.
Remediation: Users should immediately apply any available patches for Langflow, review their authentication mechanisms, and implement strict access controls. Regularly updating the software and monitoring for unauthorized access attempts are also recommended.
Read Original

Three men have been charged for attempting to smuggle high-performance servers from the U.S. to China, violating U.S. export control laws. These servers are critical for artificial intelligence applications, and the scheme reportedly involved diverting large quantities of these advanced technologies. The accused individuals face significant legal consequences, and this case raises concerns about national security and the potential misuse of U.S. technology by foreign entities. The situation underscores the ongoing challenges the U.S. faces in controlling sensitive technology exports and protecting intellectual property. This incident highlights the need for vigilance in monitoring and enforcing export regulations related to advanced technologies.

Impact: High-performance servers used for artificial intelligence applications
Remediation: N/A
Read Original

The article discusses the increasing risk of cyberattacks motivated by geopolitical tensions, which are now aimed at disrupting operations rather than demanding ransom. Chief Information Security Officers (CISOs) are advised to focus on limiting lateral movement within their networks and to effectively contain breaches to mitigate the damage caused by these aggressive wiper campaigns. These attacks pose a significant threat to organizations as they can lead to extensive operational disruptions and data loss. As cyber threats evolve, it is crucial for security leaders to implement strong defenses and response strategies to protect their organizations from such incidents. The implications of these attacks extend beyond individual companies, affecting supply chains and national security.

Impact: N/A
Remediation: Limit lateral movement, contain breaches, implement strong network defenses
Read Original

The U.S. government has taken action against Handala, a group linked to Iranian cyber operations, by seizing multiple domains associated with their activities. These operations were primarily focused on psychological tactics aimed at influencing public perception. The seizure underscores the ongoing battle against state-sponsored cyber activities, particularly those originating from Iran. This move is part of a broader strategy to disrupt malicious online operations that can impact political stability and public opinion. By targeting these domains, the U.S. aims to limit Handala's ability to conduct its operations effectively.

Impact: N/A
Remediation: N/A
Read Original

Navia experienced a significant data breach between late December 2025 and mid-January 2026, affecting approximately 2.7 million individuals. Hackers accessed sensitive personal and health plan information, raising serious concerns for those impacted. The breach not only compromises individual privacy but also poses risks of identity theft and fraud. As healthcare data is particularly valuable on the dark web, this incident highlights the ongoing vulnerability of health-related organizations to cyberattacks. Affected individuals may need to monitor their accounts and take steps to protect their personal information.

Impact: Personal and health plan information of 2.7 million individuals
Remediation: N/A
Read Original

The U.S. Justice Department, in collaboration with international law enforcement agencies, has successfully disrupted four Internet of Things (IoT) botnets responsible for massive distributed denial-of-service (DDoS) attacks. These attacks peaked at an astonishing 30 terabits per second, marking them as some of the largest ever recorded. The coordinated effort involved shutting down the infrastructure that allowed these botnets to operate, which had been harnessing compromised IoT devices to flood networks with traffic. This disruption is significant as it not only diminishes the threat of future attacks from these specific botnets but also sends a strong message about the vulnerabilities present in IoT devices. Users and manufacturers alike are reminded of the importance of securing their devices against potential exploitation.

Impact: IoT devices, including smart home appliances and security cameras
Remediation: Users should secure their IoT devices by changing default passwords, keeping firmware updated, and disabling unnecessary features.
Read Original

Since February 27, a series of attacks have been targeting thousands of Magento sites, affecting e-commerce platforms, well-known global brands, and even government services. The attackers are defacing these sites, which not only disrupts business operations but also poses significant risks to customer trust and data security. Many businesses relying on Magento for their online sales are now facing immediate pressure to secure their sites and address vulnerabilities. This ongoing campaign raises concerns about the effectiveness of current security measures and highlights the need for businesses to strengthen their defenses against such malicious activities.

Impact: Magento e-commerce platform, global brands, government services
Remediation: Businesses should review their site security measures, apply any available patches, and consider implementing additional security protocols to protect against defacement attacks.
Read Original
Actively Exploited

Researchers at Sysdig have reported that hackers successfully exploited a significant vulnerability in Langflow, identified as a CVE, in under 20 hours. This rapid exploitation underscores the urgency for users and companies utilizing Langflow to act quickly. The vulnerability could allow attackers to gain unauthorized access or control, posing serious risks to data security. As the threat remains active, organizations relying on this software must prioritize patching and securing their systems to mitigate potential damage. The situation serves as a reminder of the importance of timely updates and vigilance in cybersecurity practices.

Impact: Langflow software
Remediation: Users are advised to apply the latest security patches provided by Langflow immediately.
Read Original

ConnectWise has addressed a significant vulnerability (CVE-2026-3564) in its ScreenConnect remote access platform, which is widely used by managed service providers and IT departments. This flaw allows attackers to potentially hijack remote sessions by misusing ASP.NET machine keys to create forged authentication tokens. The vulnerability arises from inadequate verification of cryptographic signatures, making it possible for hackers to exploit the issue remotely. Organizations that utilize ScreenConnect, whether in cloud-hosted or on-premise configurations, need to prioritize applying the available patches to safeguard their systems. Failure to address this vulnerability could lead to unauthorized access to sensitive information and operations.

Impact: ScreenConnect remote access platform by ConnectWise, affected versions not specified.
Remediation: Users should update to the latest patched version of ScreenConnect provided by ConnectWise to mitigate this vulnerability.
Read Original

A former data analyst contractor from North Carolina was convicted for extorting a Washington, D.C.-based technology company out of $2.5 million. While still employed, he accessed sensitive company data and threatened to release it unless his demands were met. The case raises significant concerns about insider threats, especially as remote work becomes more common and employees have greater access to sensitive information. This incident serves as a reminder for companies to implement robust security measures and monitor access to critical data. The repercussions of such extortion schemes can be severe, impacting both the financial stability of a company and the trust of its clients.

Impact: Washington D.C. technology company, sensitive company data
Remediation: Companies should implement strict access controls, monitor employee activities, and conduct regular security training to mitigate insider threats.
Read Original

A phishing-as-a-service platform known as Tycoon2FA continues to operate despite previous efforts to shut it down. This platform enables cybercriminals to create and distribute phishing attacks that bypass two-factor authentication protections. Users of online services who rely on 2FA are particularly at risk, as attackers can exploit these phishing tools to gain unauthorized access to sensitive accounts. The persistence of Tycoon2FA showcases the challenges law enforcement faces in combating cybercrime and highlights the need for individuals and organizations to remain vigilant against such phishing attempts. As the platform evolves, it poses an ongoing threat to digital security worldwide.

Impact: Users of online services relying on two-factor authentication, cybersecurity firms, and law enforcement agencies.
Remediation: Users should enable additional security measures, such as security keys or app-based authentication, and remain cautious of unsolicited communications asking for sensitive information.
Read Original

Cameron Nicholas Curry, a tech worker from North Carolina, was found guilty of conducting an insider attack that resulted in the theft of sensitive corporate data from a Washington D.C.-based technology company. As his six-month contract was ending, Curry reportedly stole data and demanded a ransom of $2.5 million. This incident raises significant concerns about insider threats, where employees exploit their access to company information for personal gain. Companies need to be vigilant about monitoring employee activities, especially as contracts come to a close, to prevent similar attacks in the future. The case serves as a reminder of the potential risks posed by trusted employees and the importance of cybersecurity measures in protecting sensitive information.

Impact: D.C.-based tech company data
Remediation: Implement stronger monitoring of employee activities, especially during contract terminations. Increase security protocols to restrict access to sensitive data.
Read Original
Page 1 of 120Next