Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Companies House, the British agency responsible for company registration in the UK, recently confirmed that a security flaw in its WebFiling service exposed sensitive business information since October 2025. The agency temporarily took the service offline on Friday to address the issue, which raised concerns about the privacy of companies' data. While they have since restored the service, the breach could have serious implications for businesses relying on the registry for compliance and reporting. Companies should review their security practices and remain vigilant about potential misuse of their exposed information. This incident underscores the need for robust security measures in public-facing services.

Impact: WebFiling service of Companies House, UK business data
Remediation: Service was taken offline to fix the security flaw; specific patches or updates not mentioned.
Read Original

A security firm executive was targeted in a sophisticated phishing attack that utilized advanced techniques to deceive the victim. The attackers sent a DKIM-signed email that appeared legitimate, employing trusted redirect infrastructure and compromised servers to facilitate the attack. They also created phishing pages protected by Cloudflare, making them harder to detect. This incident raises concerns about the security measures in place for executives and highlights the need for increased vigilance against such tactics. Companies must ensure their employees are trained to recognize phishing attempts, especially those involving seemingly legitimate communications.

Impact: DKIM-signed emails, Cloudflare-protected phishing pages
Remediation: Companies should implement employee training on phishing recognition and consider enhancing email filtering and security measures.
Read Original

A recent social engineering campaign is targeting individuals by impersonating well-known companies like PayPal and Amazon. Attackers are using customer support interactions through LiveChat to trick users into revealing sensitive information, including credit card details and personal data. This type of phishing attack takes advantage of the trust that users place in these popular services, making it easier for the criminals to manipulate their victims. It's crucial for users to stay vigilant and verify the authenticity of any communication claiming to be from these companies, especially when asked for personal information. As these tactics become more sophisticated, both consumers and companies must be cautious about sharing sensitive data online.

Impact: PayPal, Amazon, LiveChat users
Remediation: Users should verify the authenticity of communications from PayPal and Amazon, avoid sharing sensitive information through chat, and report suspicious interactions to the companies.
Read Original

Recent vulnerabilities in CrackArmor's AppArmor have been discovered, allowing local users of Linux systems to escalate their privileges to root access. This flaw not only compromises the host system but also allows attackers to break out of container environments and launch denial-of-service (DoS) attacks. The implications are significant for any organization relying on Linux, as it increases the risk of unauthorized access and system disruption. Users should be particularly vigilant if they are running systems with AppArmor enabled, as these vulnerabilities could lead to severe security incidents if exploited. Immediate action is advised to mitigate potential risks associated with these flaws.

Impact: Linux systems running AppArmor
Remediation: Users should apply patches and updates to their AppArmor configurations as they become available. Reviewing system permissions and implementing additional security measures may also help mitigate risks.
Read Original

A recent security flaw in the AWS Bedrock Code Interpreter has raised concerns among cloud users. This vulnerability involves a DNS-based attack that allows AI sandboxes to exfiltrate sensitive data from cloud environments. The issue affects AWS Bedrock's AgentCore, which is crucial for running AI applications in a secure environment. Companies using AWS Bedrock services need to be aware of this vulnerability as it could potentially expose their data to unauthorized access. This incident underscores the need for enhanced security measures in cloud-based AI applications.

Impact: AWS Bedrock, AWS Bedrock Code Interpreter, AWS Bedrock AgentCore
Remediation: Users should immediately review their AWS Bedrock configurations and apply any available security patches provided by AWS to mitigate the risk of data exfiltration.
Read Original

A group known as Storm-2561 is targeting VPN users by distributing fake VPN clients through search engine optimization (SEO) poisoning. This tactic leads users to download malicious software that can steal their login credentials. The campaign employs trojans to compromise users' systems and gain access to sensitive information. This threat is particularly concerning as it exploits the growing reliance on VPN services for online security, making it crucial for users to verify the authenticity of software before installation. Researchers warn that users should be cautious and ensure they are downloading VPN clients from trusted sources to avoid falling victim to this scheme.

Impact: VPN clients, user login credentials
Remediation: Users should only download VPN software from official websites and verified sources. Regularly updating software and using strong, unique passwords can also help mitigate risks.
Read Original

A recent security incident has compromised hundreds of GitHub accounts due to stolen credentials linked to the VS Code GlassWorm campaign. Attackers exploited these credentials to gain unauthorized access to various Python repositories. This breach raises significant concerns for developers and organizations using GitHub, as it could lead to unauthorized code modifications or data leaks. Users are urged to review their security practices, including enabling two-factor authentication and regularly updating passwords. The incident emphasizes the ongoing risks associated with credential theft in software development environments.

Impact: GitHub accounts, Python repositories
Remediation: Users should enable two-factor authentication, update passwords, and monitor their accounts for suspicious activity.
Read Original

A recent glitch on the Companies House website in the UK has exposed sensitive personal and corporate information of millions of users, raising serious concerns about data security. The issue allowed unauthorized access to details that should have been protected, potentially enabling fraudsters to exploit this information. Companies House, which is responsible for maintaining the official register of companies in the UK, has acknowledged the problem and is working to rectify it. This incident is particularly alarming as it affects the privacy of business owners and the integrity of the corporate registration process. Users and businesses are advised to monitor their information and report any suspicious activity immediately.

Impact: Companies House website, personal and corporate information of users
Remediation: Companies House is investigating the issue and working to fix the glitch.
Read Original

The U.S. government has officially classified cyber-enabled fraud as transnational organized crime through a new executive order. This change emphasizes the need for a more aggressive approach to combat cybercrime, moving beyond just defensive measures. The article argues that the private sector must also take a proactive stance to dismantle the criminal infrastructure that supports these activities. By recognizing cybercrime as organized crime, U.S. authorities are urged to target the business models that enable these operations, rather than simply responding to individual attacks. This shift is crucial for reducing the overall impact of cybercrime on businesses and individuals alike.

Impact: N/A
Remediation: N/A
Read Original

A new espionage campaign has been detected, targeting Ukrainian entities and believed to be linked to Russian threat actors. This operation utilizes a backdoor known as DRILLAPP and exploits Microsoft Edge's debugging feature to remain stealthy. The campaign was first observed in February 2026 and shows similarities to a previous attack by a group known as Laundry Bear, which also focused on Ukrainian defense forces. This ongoing threat raises concerns about the security of sensitive information within Ukraine, especially as tensions in the region continue to escalate. Cybersecurity experts urge vigilance and prompt action to mitigate the risks posed by such sophisticated attacks.

Impact: Ukrainian defense forces, Microsoft Edge
Remediation: Users are advised to utilize security best practices, such as keeping software updated and monitoring for unusual activity, although specific patches or updates were not mentioned.
Read Original

China's National Computer Network Emergency Response Technical Team (CNCERT) has raised alarms about vulnerabilities in OpenClaw, an open-source AI agent. The platform, previously known as Clawdbot and Moltbot, has been found to have weak default security settings that could allow attackers to perform prompt injection attacks and exfiltrate sensitive data. This poses a significant risk for users who deploy the AI agent without proper security configurations. As OpenClaw is self-hosted, organizations need to be particularly vigilant about their security practices to prevent potential exploitation. The warning serves as a reminder of the importance of securing AI tools and ensuring that default settings do not leave systems vulnerable.

Impact: OpenClaw (formerly Clawdbot and Moltbot)
Remediation: Users should review and strengthen the default security configurations of OpenClaw to prevent vulnerabilities.
Read Original

Cisco's recent SD-WAN vulnerabilities have sparked confusion and some fraudulent activity among users. Some individuals are taking advantage of the situation by creating fake proof-of-concept (PoC) exploits, which has added to the chaos surrounding the bugs. This has led to misunderstandings about the actual risks posed by the vulnerabilities. As a result, companies using Cisco's SD-WAN products may be unsure about how to respond and protect their networks effectively. It’s crucial for organizations to be aware of these issues and seek accurate information to mitigate potential risks.

Impact: Cisco SD-WAN products
Remediation: Users should verify the authenticity of PoCs and stay updated with Cisco's official communications for guidance on addressing the vulnerabilities.
Read Original

Nonprofits are increasingly becoming targets for cybercriminals due to their often inadequate security measures and the valuable data they hold. However, many incidents involving these organizations go unreported, leading to a lack of comprehensive data on the extent of the problem. The absence of sufficient reporting makes it challenging to fully understand the risks nonprofits face and the tactics used by attackers. This situation not only jeopardizes sensitive information but also threatens the operational integrity of nonprofits, which often rely on public trust and donations. As these organizations typically operate with limited resources, they may struggle to implement the necessary security protocols to protect themselves from cyber threats.

Impact: Nonprofits, sensitive data, operational integrity
Remediation: Implement stronger cybersecurity measures, conduct regular security audits, educate staff on security best practices
Read Original

Poland's National Centre for Nuclear Research (NCBJ) recently experienced a cyberattack aimed at its IT infrastructure. Fortunately, the attack was detected and neutralized before it could have any effect on operations or data. This incident raises concerns about the security of critical national research facilities, especially those involved in sensitive areas like nuclear technology. Cyberattacks on such institutions can pose risks not just to the organizations themselves, but also to national security and public safety. The swift detection and response by NCBJ’s cybersecurity measures demonstrate the importance of having robust defenses in place to protect against potential threats.

Impact: IT infrastructure of Poland's National Centre for Nuclear Research
Remediation: N/A
Read Original
Actively Exploited

Starbucks recently reported a data breach that resulted from phishing attacks targeting its employee portal. This incident has affected hundreds of employees, compromising their personal information. The phishing attempts were designed to trick employees into revealing sensitive data, which could lead to identity theft or other malicious activities. Starbucks is likely to face scrutiny over its security measures, as effective protection against such attacks is crucial for safeguarding employee data. This breach serves as a reminder for organizations to enhance their cybersecurity training and protocols to prevent similar incidents in the future.

Impact: Starbucks employee portal, employee personal information
Remediation: Strengthening phishing awareness training for employees, enhancing security protocols for employee portals
Read Original
Page 1 of 111Next