Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

UK Construction Firm Hit by Prometei Botnet Hiding in Windows Server

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A UK construction firm has fallen victim to an attack by the Russian Prometei botnet, as detailed by cybersecurity firm eSentire. The attack involved the use of TOR for anonymity, and attackers focused on stealing passwords and employing decoy tactics to mislead security measures. This incident raises concerns about the security of critical infrastructure in the construction sector, which may not be as fortified against cyber threats as other industries. The implications are significant, as compromised systems can lead to operational disruptions and financial losses for businesses. Companies in similar sectors should take note and assess their own cybersecurity defenses to prevent similar attacks.

Impact: UK construction firm's Windows Server systems
Remediation: Implement strong password policies, enhance network monitoring, and consider using intrusion detection systems.
Read Original

Researchers have introduced an open-source tool named Tirith, designed to combat homoglyph attacks in command-line environments. These attacks occur when malicious commands use visually similar characters to disguise themselves as legitimate commands, tricking users into executing harmful actions. Tirith works by analyzing URLs within typed commands and preventing their execution if they are deemed suspicious. This tool is particularly relevant for developers and system administrators who rely on command-line interfaces, as it provides an additional layer of security against deceptive tactics used by attackers. By implementing Tirith, users can better protect their systems from these types of impersonation attacks, which can lead to unauthorized access and potential data breaches.

Impact: Command-line environments, developers, system administrators
Remediation: Use the Tirith tool to analyze and block suspicious commands
Read Original

La Sapienza, a prominent university in Italy, is currently offline as a precautionary measure after suffering a cyber attack. The institution has taken this step to mitigate any further damage while they assess the situation and secure their systems. This incident has raised concerns about the security of educational institutions, which are often targets for cybercriminals. The attack underscores the need for universities to bolster their cybersecurity defenses to protect sensitive information and ensure the continuity of their operations. While details about the nature of the attack are still emerging, the university's proactive approach highlights the importance of readiness in the face of such threats.

Impact: La Sapienza university systems
Remediation: N/A
Read Original

Researchers at Cisco Talos have identified a toolkit called DKnife that has been in use since 2019 to hijack router traffic for cyber-espionage purposes. This Linux-based toolkit allows attackers to inspect and alter data as it travels through routers and edge devices. It can also install malware on various devices, including PCs and smartphones. The implications of this toolkit are significant, as it poses a threat to the confidentiality and integrity of sensitive data transmitted over networks. Users and organizations relying on affected routers should be particularly vigilant about their network security practices to mitigate potential risks.

Impact: Routers and edge devices, PCs, smartphones
Remediation: Users should ensure their routers and edge devices are updated with the latest firmware and security patches, and implement network monitoring practices to detect unusual traffic.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to take action on outdated edge network devices. Under the new Binding Operational Directive 26-02, agencies must improve the management of these devices and replace any that are no longer supported within the next 12 to 18 months. This directive aims to mitigate risks associated with using unsupported technology, which can be vulnerable to cyberattacks and security breaches. By addressing these outdated devices, CISA is pushing for better security practices to protect federal networks and sensitive information. The move emphasizes the need for agencies to stay current with technology and avoid potential exploitation by cybercriminals.

Impact: Edge network devices, specifically those that are end-of-support
Remediation: Replace unsupported edge network devices within 12-18 months.
Read Original

Recent reports indicate that nearly 7.1% of skills associated with the open-source AI agent OpenClaw on the ClawHub marketplace may be exposing sensitive information such as API keys, credentials, and credit card details. This vulnerability arises from issues in the SKILL.md instructions, which guide developers on how to create and use these skills. The exposure of such critical data can lead to unauthorized access and financial fraud, impacting both developers and users who rely on these AI capabilities. It's crucial for developers to review their implementations and ensure they are safeguarding sensitive information to prevent potential exploitation. This incident serves as a reminder of the importance of secure coding practices in open-source projects.

Impact: OpenClaw skills on the ClawHub marketplace
Remediation: Developers should review and update SKILL.md instructions to ensure sensitive information is not exposed. Best practices for securing API keys and credentials should be implemented.
Read Original
Actively Exploited

A recent investigation uncovered over 150 domains impersonating law firms as part of a scam that uses artificial intelligence. These fake websites are designed to deceive individuals and businesses by mimicking legitimate legal services. The scammers aim to exploit unsuspecting victims, potentially leading to financial losses and legal complications for those who engage with these fraudulent sites. This incident raises concerns about the effectiveness of current cybersecurity measures and the challenges of identifying AI-generated content. As cybercriminals increasingly utilize advanced technology, it becomes essential for both users and legal professionals to remain vigilant against such impersonation schemes.

Impact: Law firms and their clients, individuals seeking legal services.
Remediation: Users should verify the authenticity of websites before engaging with them, and law firms should monitor for unauthorized domain registrations that mimic their brand.
Read Original

Researchers from SafeBreach have reported that an Iranian hacking group known as Infy APT has adapted its tactics by using Telegram for command and control (C2) operations. This shift comes after a period of internet restrictions imposed by the Iranian government, which has since ended, allowing the group to re-establish its online presence. The use of Telegram for C2 indicates a strategic change, making it easier for attackers to communicate and coordinate their activities while potentially evading detection. This development is concerning for organizations that may be targeted by these tactics, as it suggests a more sophisticated approach to cyber espionage and attacks. Keeping an eye on these evolving methods is crucial for cybersecurity professionals in order to protect sensitive information.

Impact: N/A
Remediation: Organizations should monitor for unusual Telegram activity and implement security measures to detect and respond to potential C2 communications.
Read Original

The Department of Homeland Security (DHS) is facing a privacy investigation that will focus on the use of biometric tracking by its Immigration and Customs Enforcement (ICE) and the Office of Biometric Identity Management (OBIM). Auditors have indicated that the probe might expand to other DHS components, examining how the agency utilizes biometric markers in immigration enforcement activities. This scrutiny comes as concerns grow over privacy rights and the implications of increased surveillance. The outcome of this investigation could impact DHS's practices and policies regarding biometric data collection and usage, raising questions about transparency and accountability in immigration enforcement.

Impact: ICE, OBIM, DHS biometric tracking systems
Remediation: N/A
Read Original

Researchers have identified a significant security risk involving artificial intelligence, specifically large language models (LLMs). Attackers can embed backdoors within these models, making them hard to detect. These backdoors lie dormant until triggered by a specific phrase, at which point the model executes harmful actions. This poses a serious threat to users and organizations relying on AI for various applications, as it could lead to data breaches or misinformation. The findings highlight the need for improved security measures in AI development to prevent such vulnerabilities from being exploited.

Impact: Large language models (LLMs)
Remediation: Implement thorough security audits and model evaluation practices to detect potential backdoors.
Read Original

Anthropic, an AI company, has reported that its latest Claude model has identified over 500 vulnerabilities in various software systems. These vulnerabilities were carefully validated by human researchers to ensure that no false positives slipped through. This kind of thorough analysis is crucial because it helps organizations pinpoint and address security weaknesses before they can be exploited. The findings emphasize the ongoing need for vigilance in software security, as even established systems can harbor significant vulnerabilities. Companies using affected software should take immediate steps to assess their systems and apply necessary updates or patches to mitigate potential risks.

Impact: N/A
Remediation: Organizations should assess their systems for vulnerabilities and apply necessary updates or patches.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has mandated that all federal agencies upgrade their outdated edge devices within the next year. This initiative is in response to concerns over the security weaknesses posed by aging network infrastructure, which could leave federal systems vulnerable to cyberattacks. Experts have long warned that outdated technology can create entry points for attackers, potentially compromising sensitive government data. By enforcing this requirement, CISA aims to bolster the overall security posture of federal networks and reduce risks associated with legacy systems. The move reflects a growing recognition of the need for modern, secure technology in government operations.

Impact: N/A
Remediation: Agencies must replace outdated edge devices within one year.
Read Original

Lockdown Mode is a security feature for iPhones designed to protect users from cyber attacks and prevent forensic tools from accessing data after a device is seized by authorities. This mode is particularly useful for individuals who may be at risk of targeted attacks, such as journalists, activists, or those in sensitive positions. By activating Lockdown Mode, users enhance their privacy and security, making it significantly harder for anyone to extract information from their devices. The feature gained attention after reportedly thwarting attempts by law enforcement, including the FBI, to access iPhones during investigations. This highlights the ongoing battle between personal privacy and law enforcement access to digital data, raising important questions about the balance between security and individual rights.

Impact: iPhone devices with iOS updates that support Lockdown Mode
Remediation: To enable Lockdown Mode, go to Settings > Privacy & Security > Lockdown Mode and follow the prompts to activate it.
Read Original

The DKnife toolkit has been in use since 2019, allowing attackers to hijack traffic from edge devices to spy on users and deliver malware. This toolkit targets routers and other network devices, making it a significant threat to both individuals and organizations that rely on these systems for internet connectivity. By intercepting data, attackers can monitor communications and potentially steal sensitive information. The ongoing use of DKnife illustrates the persistent risks posed by advanced cyber espionage techniques. Users and companies need to be vigilant about securing their network devices to prevent such intrusions.

Impact: Routers and edge devices
Remediation: Users should ensure their devices are updated with the latest firmware and security patches, and consider changing default passwords and enabling additional security features.
Read Original

The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning regarding a serious vulnerability, identified as CVE-2026-24423, in SmarterMail. This flaw allows for unauthenticated remote code execution (RCE), which means attackers could potentially take control of affected systems without needing any prior authentication. This vulnerability has already been leveraged in ransomware attacks, posing significant risks to users and organizations running SmarterMail. Users are urged to take immediate action to secure their systems, as the flaw could lead to severe data breaches and operational disruptions. The urgency of this warning stems from the active exploitation of the flaw in the wild, highlighting the need for prompt remediation.

Impact: SmarterMail versions affected by CVE-2026-24423.
Remediation: Users should apply any available patches from SmarterMail, update their systems to the latest versions, and implement proper security configurations to mitigate the risk of exploitation. Regularly monitoring for unusual activity and ensuring robust security practices are also recommended.
Read Original
Page 1 of 91Next