The cybersecurity community is closely observing whether Iranian hackers will adhere to a ceasefire that does not specifically mention them. Historically, ceasefires in geopolitical conflicts have not significantly impacted the frequency of cyberattacks. Experts suggest that despite a temporary halt in physical hostilities, cyber operations often continue unabated. This raises concerns for organizations and governments that might be targeted by Iranian cyber actors, as they may not feel bound by such agreements. The situation underscores the ongoing risk that cyber threats pose, irrespective of diplomatic efforts.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Hackers have compromised the update system for the Smart Slider 3 Pro plugin, which is used in WordPress and Joomla websites. These attackers managed to distribute a malicious version of the plugin that contains multiple backdoors, allowing them to access and control affected sites. This incident puts users of both platforms at risk, as the malicious code can lead to data breaches and unauthorized actions on their websites. Website administrators should be particularly vigilant, as the compromised update could have far-reaching consequences if not addressed promptly. Users are strongly advised to check their installations and update to the latest secure versions to mitigate any potential damage.
The FBI has taken significant action against the Russian hacking group APT28, which is linked to the GRU, the Russian military intelligence agency. This operation targeted routers that APT28 had compromised, allowing them to access a range of networks. According to Brett Leatherman, the FBI's cyber chief, this group's ability to propagate attacks from routers made their threat particularly concerning. By disrupting this access, the FBI aims to protect various organizations from potential espionage and data breaches. This incident underscores the persistent risk posed by state-sponsored cyber actors and highlights the importance of securing network infrastructure to prevent similar intrusions in the future.
SCM feed for Latest
Sensitive documents from the Los Angeles Police Department have reportedly been leaked online by a group known as World Leaks. The breach has exposed around 7.7 terabytes of data, which includes over 337,000 files. This incident raises serious concerns about the security of law enforcement data and the potential implications for public safety and privacy. With such a large volume of sensitive information now accessible, there is a heightened risk of misuse or further exploitation. The LAPD and other authorities will need to take immediate action to assess the extent of the breach and protect against future incidents.
SCM feed for Latest
On April 7, 2026, ChipSoft, a healthcare software vendor based in the Netherlands, suffered a ransomware attack that has been confirmed by Z-CERT, the country's computer emergency response team for the healthcare sector. This incident raises serious concerns about the security of healthcare data, as ransomware attacks can disrupt medical services and compromise sensitive patient information. The attack's timing is particularly alarming given the essential role that healthcare software plays in patient care and operations. Authorities are likely working to assess the full impact of the breach and to assist affected healthcare providers in managing the fallout. This incident underscores the ongoing vulnerabilities in the healthcare sector regarding cybersecurity threats.
Researchers at RSAC discovered a way to bypass Apple Intelligence's AI guardrails using techniques called Neural Exect and Unicode manipulation. This vulnerability could allow attackers to exploit the AI's systems, potentially leading to unauthorized access or misuse of the technology. The implications of this breach are significant, as it raises concerns about the security and reliability of AI systems used by Apple and possibly other tech companies. Users and developers relying on Apple Intelligence need to be aware of this vulnerability to ensure their systems are secure. The researchers' findings emphasize the importance of ongoing scrutiny and improvement of AI security measures.
Cybersecurity Blog | SentinelOne
Edge devices, which connect various networks and serve as points of entry, are increasingly becoming targets for cyber attackers. These devices can be exploited to gain unauthorized access to systems, allowing attackers to persist within networks and pivot to steal sensitive identity information. This trend raises concerns for organizations relying on edge computing, as vulnerabilities in these devices can lead to significant data breaches. Ensuring the security of edge devices is crucial, as they play a pivotal role in the overall security posture of an organization. Companies need to prioritize safeguarding these devices to protect against modern cyber threats.
A hack-for-hire campaign has been uncovered, believed to be linked to an actor with possible connections to the Indian government. This campaign has primarily targeted journalists, activists, and officials across the Middle East and North Africa (MENA) region. Notably, two Egyptian journalists known for their criticisms of the government were among the individuals affected. The findings, reported by Access Now, Lookout, and SMEX, raise significant concerns about the safety and privacy of those who report on sensitive issues in these regions. The implications of such targeted attacks extend beyond individual safety, potentially stifling freedom of expression and press in the affected areas.
BleepingComputer
Eurail B.V., which operates digital passes for 33 national railways in Europe, reported a data breach that occurred in December 2025, affecting over 300,000 individuals. The breach involved the theft of personal information, although specific details about what data was compromised have not been disclosed. This incident raises serious concerns about the security of personal information in the travel industry, especially as digital services become more prevalent. Affected individuals may face risks such as identity theft or fraud. Eurail has not provided specific steps taken to address the breach or protect users going forward, making it crucial for those impacted to monitor their accounts closely.
Infosecurity Magazine
A recent report from the SANS Institute reveals a significant rise in non-human identities (NHIs), with AI agents contributing to a 76% increase. This surge is concerning because NHIs can be used by malicious actors to impersonate legitimate users, leading to potential security breaches and fraud. Organizations are now facing challenges in governance and identity management as these AI-driven identities proliferate. The report emphasizes the need for companies to reassess their identity verification processes to mitigate risks associated with these non-human entities. As AI continues to evolve, understanding its impact on cybersecurity becomes increasingly vital for businesses and security professionals.
Infosecurity Magazine
Google's threat intelligence team has identified a new extortion group known as UNC6783, which appears to be linked to the Raccoon persona. This group is specifically targeting Business Process Outsourcing (BPO) companies and helpdesk services, indicating a shift in focus towards sectors that handle sensitive customer data. The group's tactics may involve ransomware or other extortion methods, which poses significant risks to affected organizations. Companies in the BPO sector should be vigilant and enhance their security measures to protect against potential breaches and data leaks. As this threat evolves, understanding the methods and motivations behind it will be crucial for businesses in these industries.
SecurityWeek
In December 2025, a data breach at Eurail compromised the personal information of approximately 300,000 individuals. Hackers managed to access sensitive data, including names and passport numbers, from the European travel company's network. This incident raises concerns about the security of personal information and highlights the risks associated with storing such data online. Affected individuals could face identity theft or fraud due to the exposure of their passport details. Companies in the travel sector must enhance their cybersecurity measures to protect customer data and prevent similar breaches in the future.
SecurityWeek
A recent hack targeted Bitcoin Depot, a Bitcoin ATM operator, resulting in the theft of over 50 bitcoins, valued at approximately $3.6 million. The attacker gained access to the company’s wallets by stealing login credentials, allowing them to transfer the funds without detection. This incident raises concerns about the security of cryptocurrency operations and the potential risks associated with user credential management. As cryptocurrency continues to gain popularity, incidents like this highlight the need for stronger security measures to protect digital assets. Companies operating in the crypto space must ensure they have robust security practices in place to prevent similar attacks in the future.
Help Net Security
Research from Token Security reveals that 65% of agentic chatbots are unused yet still possess live access credentials, posing a significant security risk. Itamar Apelblat, CEO of Token Security, points out that organizations often treat these AI agents as mere experiments rather than as securely managed identities. This oversight can lead to vulnerabilities similar to those seen with orphaned service accounts, which are difficult to monitor and secure. Additionally, the study found that 51% of actions taken by external agents depend on these credentials, raising concerns about unauthorized access and data breaches. Companies need to reassess how they manage AI agents to mitigate these risks and enhance their overall security posture.
Researchers from Cisco Talos have found that attackers are exploiting the email notification systems of popular SaaS platforms like GitHub and Jira to distribute phishing and spam emails. By sending these malicious emails from the platforms' own servers, the attackers bypass standard email security measures such as SPF, DKIM, and DMARC. This tactic allows them to deliver phishing messages that appear legitimate, effectively tricking users into engaging with the content. This incident raises serious concerns for organizations using these platforms, as it highlights a potential vulnerability in their email communication processes. Users of GitHub and Jira should be particularly vigilant about unexpected emails, even if they seem to come from trusted sources.