Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A recent report from Verizon revealed a significant rise in the number of security breaches caused by exploited vulnerabilities last year. Many organizations are failing to address these critical defects, leaving their systems open to attacks. The report emphasizes that these vulnerabilities have become the primary entry point for cybercriminals, meaning that companies need to prioritize patching and updates to protect their systems. This trend points to a concerning oversight in cybersecurity practices across various industries, where outdated software and unaddressed vulnerabilities can lead to severe data breaches and financial loss. As attackers continue to exploit these weaknesses, the urgency for organizations to strengthen their security measures has never been greater.

Impact: N/A
Remediation: Organizations should prioritize vulnerability assessments, apply security patches regularly, and ensure timely updates to their software and systems.
Read Original

Discord has implemented end-to-end encryption (E2EE) for all voice and video calls on its platform, ensuring that communications are secure by default. This means that only the participants in a call can access the audio and video data, protecting users from potential eavesdropping. This move is particularly significant as the platform has grown in popularity for gaming and community interaction, making privacy a key concern for its users. By adopting E2EE, Discord aims to enhance user trust and protect sensitive conversations from unauthorized access. This change is now live for all users, emphasizing the importance of secure communication in online interactions.

Impact: Discord voice and video calls
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has come under scrutiny after its GitHub repository, humorously titled 'Private-CISA', was made publicly accessible in November 2025. This repository contained sensitive information, including secrets and credentials that should have remained confidential. The irony of the repository's name has drawn attention, as it raises questions about the agency's security practices. This incident is concerning as it could potentially expose various systems to unauthorized access, increasing the risk of cyberattacks. The exposure of such sensitive data not only affects CISA's credibility but also impacts the security posture of the organizations relying on its guidance.

Impact: CISA systems and potentially any organizations that use its resources
Remediation: CISA should implement stricter access controls and review its repository management practices to prevent future exposures.
Read Original

In 2025, the FBI reported that Americans lost over $388 million to scams involving cryptocurrency ATMs, also known as crypto kiosks or Bitcoin ATMs. These scams typically involve fraudsters tricking victims into sending money to them through these machines, often under the guise of legitimate transactions. The rise in these scams highlights a growing concern as more people turn to cryptocurrency for transactions. The FBI's warning emphasizes the need for users to be cautious and verify any transaction before proceeding, especially given the irreversible nature of cryptocurrency transactions. This situation not only affects individual victims but also raises questions about the security measures in place at these ATMs and the responsibility of operators to protect users.

Impact: Cryptocurrency ATMs, Bitcoin ATMs
Remediation: Users should verify transactions and be cautious when using crypto ATMs; operators should implement stronger security measures.
Read Original

Universal Robots has addressed a serious security vulnerability in its collaborative robots, or 'cobots,' which could allow attackers to take control of production systems from a distance. The flaw has been rated 9.8 on the CVSS scale, indicating its severity and potential impact on operations. Companies using these cobots need to ensure they apply the latest patches to protect their systems. If left unaddressed, this vulnerability could disrupt manufacturing processes and lead to significant financial losses. Users should stay informed about updates to minimize risks associated with this flaw.

Impact: Universal Robots cobots operating systems
Remediation: Patches have been released; users should update to the latest version of the cobot operating system.
Read Original

Drupal has announced a highly critical vulnerability that poses a significant risk of exploitation in the near future. The organization warns that attackers could develop an exploit for this vulnerability within hours or days, putting numerous sites at risk. This issue affects users of Drupal, a popular content management system used by many websites globally. The urgency of the situation stems from the potential for rapid attacks, which could compromise site security and user data. As a result, Drupal is working on a patch to address the vulnerability, emphasizing the need for users to stay vigilant and apply updates as soon as they become available.

Impact: Drupal content management system
Remediation: A patch is being developed; users should apply the update as soon as it is released.
Read Original
Pwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts

Hackread – Cybersecurity News, Data Breaches, AI and More

At Pwn2Own Berlin 2026, cybersecurity researchers showcased 47 different zero-day exploits, targeting well-known enterprise software and artificial intelligence platforms. This event, which is part of an ongoing competition to identify security vulnerabilities, underscores the persistent risks facing organizations that rely on these technologies. Major software vendors are particularly affected, as these exploits could potentially allow attackers to gain unauthorized access or control over systems. The findings stress the need for companies to prioritize security updates and vulnerability management to protect sensitive data and maintain system integrity. The significant payout of $1.3 million for these discoveries further emphasizes the financial incentive for researchers to identify and report such vulnerabilities.

Impact: Major enterprise software and AI platforms (specific products not detailed)
Remediation: Organizations should implement regular security updates and patch management practices to address identified vulnerabilities. Continuous monitoring for new exploits and adopting a proactive security posture is recommended.
Read Original

A new wave of malware, dubbed Mini Shai-Hulud, is compromising hundreds of npm packages, targeting the open-source software community. This malicious software is stealing publishing tokens, which can allow attackers to take control over the affected packages. Additionally, it installs OS-level backdoors and embeds itself in developer tools and continuous integration (CI) pipelines. This incident puts many developers and organizations at risk, as it can lead to compromised software being distributed widely. Developers using npm packages need to be vigilant and ensure they are not using compromised versions to protect their projects and systems.

Impact: Hundreds of npm packages, developer tools, CI pipelines
Remediation: Developers should audit their npm packages, revoke any compromised tokens, and ensure they are using secure versions of packages. Regularly updating dependencies and monitoring for unusual activity in CI pipelines is also recommended.
Read Original

Today, attackers uploaded over 600 malicious packages to the Node Package Manager (npm) as part of a campaign known as Shai-Hulud. These packages are designed to compromise systems that use npm for software development, potentially allowing attackers to execute harmful code or steal sensitive information. Developers and companies that rely on npm for their projects are at risk, as these malicious packages could be unintentionally downloaded and integrated into legitimate applications. This incident serves as a reminder for users to be vigilant when selecting packages and to verify their sources before installation. Security researchers are urging developers to audit their dependencies and monitor for any suspicious activity in their projects.

Impact: npm packages, Node.js applications
Remediation: Developers should audit their npm package dependencies and ensure they are downloading from trusted sources. It's advisable to use tools that can scan for known vulnerabilities in packages.
Read Original

7-Eleven has confirmed that it suffered a data breach last month, which was claimed by the ShinyHunters hacking group. This breach raises concerns about the security of customer data, as the attackers are known for targeting organizations to steal and sell sensitive information. While 7-Eleven has not disclosed specific details regarding the extent of the breach or the types of data compromised, the incident highlights ongoing vulnerabilities in retail cybersecurity. Customers and employees alike may be at risk, and the incident underscores the need for stronger security measures in the retail sector. As investigations continue, affected individuals should remain vigilant about potential phishing attempts or other follow-up attacks.

Impact: Customer data, employee information
Remediation: N/A
Read Original

A recent cybersecurity incident has revealed that attackers compromised GitHub Actions workflows to steal Continuous Integration/Continuous Deployment (CI/CD) credentials. The attackers used a tactic known as 'imposter commit,' which involved changing all existing tags in the repository to redirect them to a malicious commit. This manipulation allowed the attackers to gain unauthorized access to sensitive credentials that could be used to deploy malicious code or access private systems. Developers and organizations using GitHub Actions should be particularly vigilant, as this incident could expose them to further attacks if their credentials are misused. It emphasizes the need for stricter security measures around CI/CD pipelines to prevent similar compromises in the future.

Impact: GitHub Actions, CI/CD credentials
Remediation: Implement stricter access controls, review and rotate CI/CD credentials, and monitor for unauthorized changes in repositories.
Read Original

The article offers a structured six-step approach for organizations to effectively respond to ransomware attacks, particularly in relation to supply chain vulnerabilities like the recent incident involving Foxconn. It emphasizes the importance of identifying legitimate threats, establishing communication protocols, and implementing recovery plans. The guidance is intended for companies that rely on complex supply chains, highlighting the increasing risk these systems face from cybercriminals. By following these steps, businesses can better safeguard their operations and mitigate potential disruptions caused by cyber incidents. This response strategy is crucial as supply chain attacks continue to rise, affecting a wide range of industries and services.

Impact: Foxconn supply chain, affected vendors, manufacturing systems
Remediation: Establish communication protocols, implement recovery plans, identify legitimate threats
Read Original

Discord has implemented end-to-end encryption (E2EE) for its voice and video calls across various platforms, including direct messages, group chats, and live streams. This change, which began in 2023, means that only participants in a call can access the content, and Discord itself does not hold the encryption keys. The company developed a new protocol called DAVE, which is open and has undergone audits to ensure its security. This move is significant as it enhances user privacy and security, particularly for those using Discord for sensitive communications. The shift to E2EE marks a major upgrade in protecting user data against potential eavesdropping or unauthorized access.

Impact: Discord voice and video calls, including DMs, group DMs, and Go Live streams.
Remediation: N/A
Read Original

A recent report from Digital.ai indicates that a staggering 87% of mobile applications faced attacks over the past year. This trend highlights the growing risks associated with mobile app security, as attackers increasingly target vulnerabilities in software builds. The findings suggest that a wide range of apps are at risk, impacting both developers and users. Companies need to prioritize securing their applications to protect sensitive data and maintain user trust. Given the frequency of these attacks, it's crucial for organizations to regularly assess and enhance their security measures.

Impact: Mobile applications, software builds
Remediation: Companies should implement regular security assessments, update their software, and adopt best practices for app development to mitigate risks.
Read Original

Recent reports suggest that Iranian hackers may have accessed automatic tank gauge systems at gas stations across the United States. These systems were reportedly exposed online without proper password protection, making them vulnerable to unauthorized access. This breach raises concerns about the safety and security of fuel supplies, as attackers could potentially manipulate fuel levels or disrupt operations. The incident highlights the risks associated with inadequate cybersecurity measures in critical infrastructure. As gas stations rely on these systems for inventory management, any compromise could lead to significant operational challenges and public safety issues.

Impact: Automatic tank gauge systems at US gas stations
Remediation: Companies should ensure that all systems are secured with strong password protections and conduct regular security audits to identify vulnerabilities.
Read Original
Page 1 of 206Next