Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Cisco has addressed several critical and high-severity vulnerabilities that could potentially allow attackers to bypass authentication, execute malicious code, escalate privileges, and access sensitive data. The company released patches for two critical vulnerabilities and six high-severity issues, including CVE-2026-20093, which has a significant CVSS score indicating its severity. These vulnerabilities affect various Cisco products, making it crucial for users and organizations to apply the patches promptly. Failure to address these flaws could lead to unauthorized access and significant security breaches. It's important for companies to stay updated with security patches to mitigate these risks effectively.

Impact: Cisco products affected include unspecified software versions that utilize the vulnerable components.
Remediation: Cisco has released patches for the identified vulnerabilities. Users are advised to apply these patches as soon as they are available to prevent potential exploitation.
Read Original

Windows 11 users who attempted to install a problematic preview update released in March are encouraged to download a new out-of-band update that fixes installation errors. This recent update addresses issues that may have prevented users from successfully applying the earlier version. Affected users should check for the latest updates in their system settings to ensure they have the fix installed. This situation is important because installation errors can disrupt users' workflows and impact system stability. Keeping software up to date is crucial for security and performance.

Impact: Windows 11
Remediation: Users should download the new out-of-band update to fix installation errors from the March preview update.
Read Original

Stryker, a major player in the medical technology sector, recently recovered from a cyberattack attributed to the Iranian hacking group Handala. This attack involved a wiper malware that compromised the company's systems, disrupting operations and potentially affecting patient care and medical device functionality. Although Stryker has announced that its systems are back online, the implications of such an attack raise concerns about the security of healthcare infrastructure. Cyberattacks on medical technology firms can have serious consequences, not only for the companies involved but also for healthcare providers and patients relying on their products. The incident serves as a reminder of the ongoing risks facing the medtech industry and the need for enhanced cybersecurity measures.

Impact: Stryker's medical devices and operational systems
Remediation: N/A
Read Original
Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Recent research from Varonis Threat Labs has identified a new cybersecurity threat called Storm infostealer, which operates as a subscription service. This malicious software is designed to bypass the encryption used by Google Chrome, putting users' sensitive information at risk. It primarily targets web browsers, cryptocurrency wallets, and various online accounts. This is concerning because it can lead to identity theft and financial loss for affected individuals. As this service gains traction, it raises alarms about the potential for widespread exploitation of personal data.

Impact: Google Chrome, cryptocurrency wallets, online accounts
Remediation: Users should ensure their browsers and wallets are up-to-date and consider using additional security measures such as two-factor authentication. Regularly monitoring account activity is also recommended.
Read Original

A new security report reveals that GitHub is being exploited by cybercriminals as a covert channel for a multi-stage malware campaign. The attackers are using LNK files to communicate with command and control (C2) servers hosted on GitHub, which allows them to embed decoders and utilize PowerShell for maintaining persistence on infected systems. This approach enables the malware to exfiltrate sensitive data effectively. Organizations and users who may be affected include those who frequently download files from GitHub or run scripts without proper security measures in place. The use of a legitimate platform like GitHub complicates detection and highlights the need for enhanced vigilance in cybersecurity practices.

Impact: GitHub, Windows systems, PowerShell
Remediation: Users should avoid downloading untrusted LNK files and ensure that their antivirus software is up to date. Implementing strict security policies regarding script execution and monitoring network traffic for unusual activities may also help mitigate risks.
Read Original
Actively Exploited

Researchers at Halcyon report that a ransomware variant known as Akira can now execute a full attack in less than an hour. This rapid attack capability poses a significant risk to organizations, as it allows cybercriminals to inflict damage and demand ransom payments in a very short timeframe. The speed of these attacks could overwhelm traditional defenses and response strategies, putting sensitive data and operational continuity at risk. Companies should be aware of this evolving threat and consider enhancing their cybersecurity measures to mitigate potential impacts. This development underscores the need for vigilance and proactive security planning in the face of increasingly sophisticated ransomware tactics.

Impact: Ransomware attacks targeting various organizations
Remediation: Companies should enhance their cybersecurity measures, including regular backups, employee training, and intrusion detection systems.
Read Original

The latest ThreatsDay Bulletin highlights a range of pressing cybersecurity threats impacting various systems. Researchers are reporting on the alarming trend of chaining together minor vulnerabilities to create significant backdoors, which could allow attackers to gain unauthorized access. Additionally, there are ongoing concerns about Android rootkits and methods for evading AWS CloudTrail logging, raising red flags for cloud security. These developments underscore the need for organizations to stay vigilant and proactive in patching software and monitoring their systems for unusual activity. With cyber threats evolving quickly, it’s crucial for companies to keep their defenses updated and educate their teams on the latest risks.

Impact: Android devices, AWS CloudTrail, various software with known vulnerabilities
Remediation: Regularly update software, patch known vulnerabilities, monitor for unusual activity
Read Original

In January 2026, Nacogdoches Memorial Hospital experienced a significant data breach when hackers infiltrated its internal network, compromising the personal and health information of approximately 250,000 individuals. The stolen data includes sensitive health records, which can lead to identity theft and fraud. This breach raises concerns about the hospital's cybersecurity measures and the potential risks for affected patients. As healthcare organizations increasingly become targets for cybercriminals, the incident underscores the need for stronger protections and response strategies in the medical field. The hospital is likely to face scrutiny regarding its data security protocols and the impact on patient trust moving forward.

Impact: Personal and health information of 250,000 individuals
Remediation: N/A
Read Original
Actively Exploited

Mercor, an AI recruiting firm, is currently facing a significant security incident after a supply chain attack attributed to the cybercriminal group Lapsus$. The attackers claim to have stolen around 4 terabytes of data from the company. This breach raises serious concerns about the security of sensitive information related to recruitment and hiring processes, which could potentially impact both job seekers and employers using Mercor's services. The firm is actively investigating the breach to assess the extent of the damage and to implement necessary security measures. The situation highlights the risks associated with supply chain vulnerabilities, especially in sectors that rely heavily on technology and data management.

Impact: Mercor data, AI recruiting systems
Remediation: N/A
Read Original
Why GitHub Developers Are Targeted by Token Giveaway Scams

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

GitHub developers are increasingly being targeted by token giveaway scams, which promise fake rewards in exchange for personal information or cryptocurrency. These scams typically involve malicious links or repositories that appear legitimate but are designed to trick users into giving away sensitive data. Experts recommend that developers verify repositories, links, and maintainers before engaging with any offers. The urgency often created by these scams can lead to hasty decisions, resulting in compromised wallets and stolen tokens. This growing trend is a significant concern for the developer community, as falling victim to these scams can have serious financial and reputational consequences.

Impact: GitHub, cryptocurrency wallets
Remediation: Verify repositories and links; avoid clicking on suspicious offers; be cautious with wallet actions.
Read Original
Actively Exploited

Researchers have identified a new type of malware called CrystalX RAT, which poses serious risks to users by spying on them and stealing sensitive information. This remote access Trojan (RAT) can also alter device configurations, making it a potent tool for cybercriminals. The malware's sophisticated capabilities suggest that it could be used in targeted attacks against individuals or organizations. Users need to be vigilant and ensure their security measures are up to date to protect against this emerging threat. The discovery of CrystalX RAT emphasizes the ongoing challenges in cybersecurity and the need for continuous awareness and protection against evolving malware.

Impact: N/A
Remediation: Users should update their security software and conduct regular system scans. Implementing strong passwords and two-factor authentication can also help mitigate risks.
Read Original

WhatsApp has informed around 200 users that they were deceived into installing a counterfeit version of its iOS app, which contained spyware. Most of the affected individuals are based in Italy. The attackers reportedly employed social engineering tactics to trick users into downloading the malicious app. This incident raises concerns about the security of mobile applications and highlights the need for users to be vigilant about the sources from which they download software. With spyware potentially compromising personal information, it is crucial for users to ensure they are using legitimate applications from trusted sources.

Impact: WhatsApp iOS app
Remediation: Users should verify app downloads through official app stores and be cautious of unsolicited links or downloads.
Read Original

Microsoft is currently addressing an issue that affects some users of Classic Outlook trying to send emails through Outlook.com. The problem has been acknowledged as part of ongoing investigations into email delivery failures. While the company has not specified the exact number of users impacted, it is clear that those relying on Classic Outlook for their email communications are experiencing significant disruptions. This situation is important because it highlights the challenges users may face with legacy software in modern environments, potentially affecting business communications and personal messaging. Microsoft is working on a solution, but users should be aware of potential delays in their email delivery until the issue is resolved.

Impact: Classic Outlook users on Outlook.com
Remediation: Microsoft is investigating the issue and working on a solution; no specific patches or updates mentioned.
Read Original

A recent report from E2e-assure reveals that around 80% of critical infrastructure providers could face significant downtime, potentially costing them up to £5 million, due to cyber-attacks targeting operational technology (OT). These attacks can disrupt essential services, affecting everything from energy supply to transportation systems. The findings underscore the urgent need for these organizations to bolster their cybersecurity measures to protect against increasing threats. As cyber incidents become more common, the financial implications could be severe, leading to not just loss of revenue but also compromised public safety. This situation calls for immediate attention as critical infrastructure remains a prime target for malicious actors.

Impact: Critical infrastructure providers, operational technology systems
Remediation: Strengthen cybersecurity measures, conduct regular security assessments, implement incident response plans
Read Original

WhatsApp has taken action against a fake version of its app created by the Italian spyware vendor SIO/Asigint, which targeted around 200 users, primarily in Italy. This malicious app was designed to install spyware on users' devices, compromising their privacy and security. WhatsApp is urging affected users to uninstall the fake app and reinstall the official version to protect themselves from potential data breaches. The incident serves as a reminder of the dangers posed by unofficial apps, which can often carry hidden threats. Users need to be vigilant and ensure they download apps only from trusted sources to avoid similar risks.

Impact: WhatsApp, SIO/Asigint
Remediation: Users are advised to uninstall the fake app and reinstall the official WhatsApp application.
Read Original
Page 1 of 138Next