Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Instructure, the company behind the educational platform Canvas, has come to an agreement with the cybercrime group ShinyHunters after they breached Instructure's network. The attackers threatened to leak 3.65TB of sensitive information, which includes data from thousands of schools and universities. Instructure announced the agreement in an update, although specifics of the deal were not disclosed. This incident raises concerns about the security of educational institutions and the potential exposure of student and faculty information. The breach highlights the vulnerabilities that many organizations face in safeguarding their networks against cyber threats.

Impact: Canvas, Instructure, educational institutions
Remediation: N/A
Read Original

Kaspersky researchers have identified key trends in ransomware for 2026, indicating a shift in tactics among cybercriminals. One notable trend is the emergence of EDR killers, tools designed to bypass endpoint detection and response systems, making it easier for attackers to operate undetected. Additionally, there is a growing focus on data leaks rather than just data encryption, meaning that attackers might threaten to expose sensitive information instead of simply locking it away. This change could lead to increased pressure on organizations to comply with ransom demands, as the risk of public exposure rises. These trends are significant as they suggest that companies will need to adapt their security strategies to combat evolving ransomware tactics effectively.

Impact: N/A
Remediation: Companies should enhance their endpoint security measures and consider data leak prevention strategies.
Read Original

A security researcher has introduced a tool called GhostLock that exploits a legitimate Windows file API to prevent access to files on local systems and SMB network shares. This proof-of-concept tool demonstrates how attackers could potentially block users from accessing important files, which could lead to significant disruptions in both personal and organizational environments. The ability to manipulate file access raises concerns for businesses relying on shared network drives and highlights the need for improved security measures to protect against such attacks. As this tool becomes known, companies and users alike may need to reassess their file access protocols and security practices to mitigate risks. The implications of this vulnerability could affect a wide range of Windows systems and applications that utilize the Windows file API.

Impact: Windows operating systems, SMB network shares
Remediation: Users should review and enhance their file access security measures, especially for SMB shares. Regular updates and monitoring for unusual file access patterns are recommended.
Read Original

The article discusses the limitations of technical security measures in preventing cyber attacks, emphasizing that employees often serve as the first line of defense. It outlines four specific types of attacks that target human vulnerabilities, such as phishing and social engineering. These attacks exploit the trust and behavior of employees rather than technical flaws in systems. This highlights the need for companies to invest in training and awareness programs for their staff to recognize and respond to potential threats effectively. As cyber threats continue to evolve, a well-informed workforce is crucial for enhancing overall security.

Impact: Phishing attacks, social engineering
Remediation: Implement regular security training and awareness programs for employees
Read Original

Checkmarx has confirmed that attackers known as TeamPCP compromised the Jenkins AST plugin, altering its version before it was published to the Jenkins Marketplace. Users of the Checkmarx Jenkins AST plugin are advised to ensure they are using version 2.0.13-829.vc72453fa_1c16 or an earlier version released on December 17, 2025. This incident follows a previous supply chain attack involving KICS, raising concerns about the security of plugins within the Jenkins ecosystem. Organizations using this plugin should take immediate action to verify their version to prevent potential exploitation. The situation underscores the ongoing risks associated with third-party software components in development environments.

Impact: Checkmarx Jenkins AST plugin, Jenkins Marketplace
Remediation: Ensure use of Checkmarx Jenkins AST plugin version 2.0.13-829.vc72453fa_1c16 or earlier.
Read Original

A serious security vulnerability in cPanel, identified as CVE-2026-41940, is currently being exploited by a threat actor known as Mr_Rot13. This flaw allows attackers to bypass authentication and gain elevated control over cPanel and WebHost Manager (WHM) environments. The exploitation of this vulnerability has led to the deployment of a backdoor named Filemanager on compromised systems. This incident is particularly concerning because it puts web hosting environments at risk, potentially allowing unauthorized access to sensitive data and control over web applications. Users and administrators of affected cPanel and WHM versions need to be vigilant and take immediate action to secure their systems.

Impact: cPanel, WebHost Manager (WHM), CVE-2026-41940
Remediation: Users should immediately apply any available patches for cPanel and WHM that address CVE-2026-41940. Regularly update systems and review security settings to ensure unauthorized access is prevented. Implement monitoring for unusual activity to detect any potential exploitation.
Read Original

In the article, Dustin Sachs discusses the risks associated with Managed Security Service Providers (MSSPs) and the concept of blind trust in cybersecurity practices. The piece emphasizes that companies often rely heavily on MSSPs for security without fully understanding their practices or the potential vulnerabilities involved. This can lead to significant security gaps and increase the risk of breaches. Organizations are urged to conduct thorough due diligence on MSSPs, examining their security protocols and incident response capabilities. The article serves as a reminder that trusting third-party providers without scrutiny can expose businesses to serious threats.

Impact: N/A
Remediation: Organizations should perform due diligence on MSSPs, including audits of their security practices and incident response plans.
Read Original

Instructure, the company behind the Canvas learning management system, has acknowledged that a security flaw was exploited by hackers to alter Canvas login portals. This breach allowed the attackers to leave an extortion message, raising serious concerns about the security of educational platforms used by schools and students. The incident underscores the vulnerability of widely used technologies in the education sector, as they can be targeted for malicious purposes. Users of Canvas, including students and educators, may face disruptions or potential data risks due to this security lapse. It's crucial for institutions to evaluate their security measures and ensure that similar vulnerabilities are patched to prevent future incidents.

Impact: Canvas learning management system
Remediation: Institutions should apply any available patches for the Canvas system and review security protocols to prevent similar attacks.
Read Original

South Staffordshire Water's parent company has been fined nearly £1 million by the UK's Information Commissioner’s Office (ICO) due to a severe security breach that lasted for almost two years. The incident began in September 2020 when an employee fell for a phishing email and opened an infected attachment, allowing hackers to install malicious software on the company’s network. This intrusion went unnoticed for 20 months, during which the personal data of 633,887 individuals was compromised. This case underscores the importance of robust cybersecurity measures, especially for organizations handling sensitive customer information. The long duration of the breach raises concerns about the effectiveness of the company's security protocols and employee training regarding potential cyber threats.

Impact: South Staffordshire Water personal data of 633,887 individuals
Remediation: Implement comprehensive employee training programs on phishing and cybersecurity awareness; enhance security measures to detect and respond to malware intrusions more effectively.
Read Original
Actively Exploited

Researchers at ThreatFabric have identified a new variant of the TrickMo Android banking trojan, which is now routing its command and control (C2) traffic through The Open Network (TON). This change in infrastructure allows the malware to operate more stealthily, making it harder for security measures to detect and block its activities. The TrickMo trojan primarily targets Android devices, aiming to steal sensitive banking information from users. This development is concerning because it indicates that attackers are adapting their strategies to evade detection, which could lead to increased financial fraud. Users of Android devices, particularly those who engage in online banking, need to be vigilant and take precautions to protect their information.

Impact: Android devices
Remediation: Users should ensure their devices are running the latest security updates, avoid downloading apps from untrusted sources, and consider using reputable security software to detect and block malware.
Read Original

A new vulnerability known as Dirty Frag has been discovered in the Linux kernel, raising alarms among security professionals. This bug could allow attackers to exploit systems running affected versions of the kernel, potentially leading to unauthorized access or control. Users and organizations that rely on Linux-based systems, particularly those using versions released in recent years, need to take immediate action to mitigate risks. As of now, there is no straightforward fix available, which adds to the urgency of the situation. It's crucial for system administrators to monitor updates from their Linux distributions and apply any available security patches as soon as they are released to protect their systems from potential exploitation.

Impact: Linux kernel versions affected include those released in the last few years; specific versions not detailed.
Remediation: Users should monitor for updates from their Linux distributions and apply security patches as soon as they are available.
Read Original

Recent vulnerabilities in Linux, including Copy Fail and Dirty Frag, are raising alarms within the open-source community. These issues highlight the growing complexity and scale of Linux systems, which are increasingly targeted due to their widespread use in servers and cloud environments. The Linux development community is actively addressing these vulnerabilities, implementing patches and updates to strengthen security. While some experts express concern, others believe the community's proactive approach will mitigate risks. This situation serves as a reminder for organizations relying on Linux to stay vigilant and apply updates promptly to protect their systems.

Impact: Linux operating systems, particularly those used in servers and cloud infrastructure
Remediation: Apply patches and updates as issued by the Linux development community
Read Original

A recent survey conducted by Cybernews found that just 18% of American smartphone users invest in third-party antivirus software. The majority rely on the built-in security features offered by their device manufacturers, such as Microsoft and Apple. This trend raises concerns about the level of protection users are receiving, especially as cyber threats continue to evolve. Many users may believe that the default security measures are sufficient, but this can leave them vulnerable to malware and other attacks. As cybercriminals become more sophisticated, it's crucial for users to understand the risks and consider additional security measures beyond the basics.

Impact: Smartphones, iOS, Android, Microsoft Defender, Apple Security
Remediation: Users should consider evaluating their security needs and exploring reputable third-party antivirus solutions for enhanced protection.
Read Original

Researchers have identified two serious vulnerabilities in the Linux kernel, collectively referred to as 'Dirty Frag'. These vulnerabilities can impact a wide range of Linux distributions, making it a significant concern for users and organizations relying on Linux systems. The flaws could allow attackers to exploit the kernel, potentially leading to unauthorized access or system control. As a result, developers are rushing to release patches to mitigate these risks. Users should ensure they update their systems promptly to protect against potential exploitation.

Impact: Most Linux distributions, including popular ones like Ubuntu, CentOS, and Fedora.
Remediation: Users should apply the latest patches for their Linux distributions as soon as they become available.
Read Original

Sohaib Akhter, a Virginia man, was found guilty of intentionally destroying databases belonging to his former employer after he was fired. The company, which provided services to over 45 federal agencies, was significantly impacted by the loss of data on February 18, 2025. Akhter's actions resulted in the deletion of crucial information, raising concerns about the security of sensitive government data. His twin brother, Muneeb Akhter, was also implicated in the incident. This case underscores the potential risks posed by disgruntled employees who may resort to sabotage, highlighting the importance of implementing robust data security measures and employee monitoring in organizations that handle sensitive information.

Impact: Federal government databases, data services for federal agencies
Remediation: Implement stronger access controls and monitoring for sensitive data; conduct security audits after employee terminations.
Read Original
Page 1 of 194Next