Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A long-term espionage campaign linked to the Malaysian government has been operating under the radar for years. Researchers discovered that the attackers have maintained a complex command and control infrastructure, utilizing advanced techniques to evade detection. This operation raises concerns about the potential for sensitive information to be compromised, affecting not only government entities but possibly private sector organizations as well. The stealthy nature of this campaign suggests that it could continue to pose risks to national security and data privacy if not addressed. As this situation unfolds, it’s crucial for organizations to remain vigilant and enhance their cybersecurity measures.

Impact: Malaysian government agencies and potentially private sector organizations
Remediation: Organizations should enhance monitoring of their networks and employ advanced threat detection systems.
Read Original

A newly discovered zero-day vulnerability in Microsoft Exchange, tracked as CVE-2026-42897, poses a significant risk as it allows attackers to exploit cross-site scripting (XSS) to compromise Outlook Web Access (OWA) mailboxes. This vulnerability is reportedly under active attack, meaning that malicious actors are currently trying to exploit it in the wild. Organizations using Microsoft Exchange should be particularly vigilant, as the absence of an available patch leaves their systems exposed. Without immediate remediation, users could face unauthorized access to sensitive email communications. Companies are advised to implement security measures, such as input validation and monitoring for suspicious activity, until an official patch is released.

Impact: Microsoft Exchange, Outlook Web Access (OWA)
Remediation: Organizations should implement input validation to mitigate XSS attacks, monitor for unusual access patterns, and restrict OWA access where possible until a patch is released.
Read Original

A new variant of the SHub macOS infostealer has been discovered that tricks users into believing they need to install a security update. Using AppleScript, this malware presents a fake update message, which, when interacted with, leads to the installation of a backdoor on the user's system. This malicious software primarily targets macOS users, potentially compromising their personal information and system integrity. The ability to deceive users with a legitimate-looking update notice makes this variant particularly concerning. It underscores the need for users to be vigilant about unexpected prompts and verify updates directly from Apple's official channels.

Impact: macOS systems, users of Apple's software
Remediation: Users should avoid interacting with suspicious update prompts and ensure that updates are only installed through official Apple channels. Regularly check for updates directly on Apple's website or through the system settings.
Read Original
Actively Exploited

A serious vulnerability has been discovered in F5 NGINX, a widely used web server technology that powers about one-third of all websites globally. This vulnerability is currently being exploited by attackers, raising alarms among cybersecurity experts. The issue poses a significant risk to countless websites and web applications that rely on NGINX for handling web traffic. Organizations using NGINX should take immediate action to assess their systems and implement necessary security measures to protect against potential attacks. The urgency of this situation is underscored by the fact that the vulnerability is actively being targeted in the wild, making prompt remediation essential to prevent data breaches and other malicious activities.

Impact: F5 NGINX web server technology, affecting all versions used globally.
Remediation: Organizations should immediately update their NGINX installations to the latest version provided by F5. Regularly review security configurations and apply recommended security practices to mitigate risks. Monitor for unusual activity on web servers to detect potential exploitation attempts.
Read Original

Grafana has confirmed a breach involving a compromised GitHub token that allowed attackers to access its source code. The incident came to light when the extortion group Coinbase Cartel claimed responsibility and listed Grafana on a leak site on May 15. Fortunately, Grafana Labs stated that no customer data or systems were compromised during this breach. The exposure of source code can pose risks to the security of future updates and features, as it may enable malicious actors to find and exploit vulnerabilities. Companies need to ensure robust token management practices to prevent similar incidents in the future.

Impact: Grafana source code
Remediation: Implement robust token management practices and monitor access logs for suspicious activity.
Read Original

The recently leaked Shai-Hulud malware is being used in new attacks targeting the Node Package Manager (npm) index. Over the weekend, several infected packages appeared on npm, raising concerns among developers and users who rely on the platform for JavaScript libraries. This malware is designed to steal sensitive information, which poses a significant risk to developers and organizations that integrate third-party packages into their projects. As this situation unfolds, it is crucial for users to be vigilant and cautious about the packages they download and use. The emergence of this malware highlights the ongoing risks associated with software supply chains and the need for enhanced security measures.

Impact: Node Package Manager (npm) packages
Remediation: Users should audit their npm packages for any suspicious activity and avoid using unknown or unverified packages. Regularly updating dependencies and using tools to check for vulnerabilities is also recommended.
Read Original

A recent report from F-Secure indicates that online scams are becoming more prevalent, with 56% of consumers experiencing scam attempts at least once a month in 2025. The rise in these scams is attributed to advances in artificial intelligence, which scammers are using to create more sophisticated and convincing attacks. This trend poses significant risks for individuals, as it increases the likelihood of falling victim to fraud. Consumers need to be vigilant and informed about the evolving tactics used by scammers to protect their personal and financial information. The report serves as a warning to both users and businesses to enhance their security measures and awareness around online scams.

Impact: N/A
Remediation: Consumers should stay informed about common scams, use multi-factor authentication, and report suspicious activities to authorities.
Read Original

A recent report from NordVPN reveals that stolen payment card details from the UK are being sold on dark web marketplaces for as little as $12. More comprehensive digital identity packs, which typically include bank cards and personal identification information, are priced around $40. This raises significant concerns for individuals whose data may have been compromised, as it suggests that personal information is readily available to cybercriminals. The accessibility and low cost of these stolen data sets make it easier for malicious actors to commit fraud or identity theft. Users need to be vigilant about protecting their personal information and consider monitoring their financial accounts for any suspicious activity.

Impact: Stolen UK payment card details, digital identity packs
Remediation: Users should monitor financial accounts for suspicious activity and consider using identity theft protection services.
Read Original
Actively Exploited

Cybercriminals are targeting fans and businesses during the FIFA World Cup with scams involving fake ticketing, accommodation, and transportation apps. These fraudulent platforms trick users into providing sensitive login information or result in financial losses. As excitement builds for the event, fans are particularly vulnerable, often rushing to secure tickets or accommodations without verifying the legitimacy of the sources. This trend underscores the necessity for increased vigilance among users, who need to ensure they are using official channels and services. Awareness of these scams is essential to protect personal information and financial resources.

Impact: Fake ticketing, accommodation, and transportation apps
Remediation: Fans should verify the authenticity of ticketing and accommodation services by using official websites and platforms. It's advised to check reviews and ratings of any app before making purchases.
Read Original

Recent reports indicate that Iran has expanded its cyber offensive by targeting automatic tank gauge (ATG) systems, which are often connected to the Internet. Security experts have long warned that these systems can be vulnerable to tampering, allowing malicious actors to manipulate fuel tank operations. This poses significant risks not only to the oil and gas sector but also to the safety and security of critical infrastructure. The attack raises concerns about the broader implications of cyber warfare, particularly as these systems are vital for monitoring and managing fuel supplies. As cyber threats evolve, industries must prioritize securing their Internet-connected devices to prevent such breaches.

Impact: Automatic Tank Gauge (ATG) systems
Remediation: Companies should secure their ATG systems by implementing strong access controls, regularly updating software, and monitoring network traffic for suspicious activities.
Read Original

Security experts at Cyera have discovered four vulnerabilities in the OpenClaw AI agent, collectively termed Claw Chain. These issues affect all versions of OpenClaw released before April 23, 2026, putting thousands of servers at risk. The vulnerabilities could potentially allow attackers to exploit systems running outdated versions of the software, which is significant given the widespread use of OpenClaw in various applications. Organizations using OpenClaw should prioritize updating their systems to the latest version to prevent any potential exploitation. This situation serves as a reminder of the importance of keeping software up to date to protect against emerging threats.

Impact: OpenClaw AI agent (all versions before April 23, 2026)
Remediation: Update to OpenClaw version released after April 23, 2026
Read Original

A security researcher named Andreas Makris has revealed that thousands of Yarbo robotic lawnmowers are vulnerable due to the use of identical default passwords. These lawnmowers, which are equipped with cameras, GPS, and AI mapping, are sold in over 30 countries. The identical default passwords create a significant security risk, as anyone with knowledge of these passwords could potentially access and control the devices remotely. This situation raises concerns about user privacy and safety, especially given the devices' capabilities to capture images and navigate outdoor spaces. Manufacturers need to address this issue urgently to protect users from potential unauthorized access and data breaches.

Impact: Yarbo robotic lawnmowers
Remediation: Users should change the default passwords immediately to unique, strong passwords.
Read Original

The REMUS infostealer has evolved into a sophisticated malware-as-a-service platform, according to Flare's analysis of multiple posts from early 2026. This development cycle, which resembles that of structured software companies, indicates that REMUS is becoming increasingly advanced and accessible for cybercriminals. The platform allows attackers to easily deploy the malware, making it a significant concern for users and organizations alike. With its growing capabilities, REMUS poses a real threat to personal and corporate data security. As this malware continues to evolve, companies need to be vigilant and take steps to protect themselves from potential breaches.

Impact: REMUS infostealer, user data, corporate data
Remediation: Companies should implement robust security measures, including regular software updates, employee training on phishing attacks, and monitoring for unusual activity.
Read Original

Interpol has conducted a significant crackdown on cybercrime in the Middle East and North Africa, resulting in over 200 arrests across 13 countries. This operation targeted various forms of cybercrime, including online fraud and identity theft, affecting numerous individuals and businesses in the region. By coordinating efforts among member countries, Interpol aims to disrupt criminal networks that exploit digital platforms for illegal activities. The operation reflects a growing recognition of the need for international cooperation in combating cyber threats, which can have far-reaching consequences for both the economy and public safety. The arrests are a clear message that cybercrime will not be tolerated, and authorities are committed to enhancing security in the digital space.

Impact: N/A
Remediation: N/A
Read Original
Government Backed Hackers Abuse Cloudflare in Malaysian Espionage Campaign

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Government-backed hackers have reportedly exploited Cloudflare's storage services as part of a Malaysian espionage campaign. This operation involved the use of concealed command and control (C2) systems to facilitate data exfiltration. The attackers' methods indicate a sophisticated approach, leveraging legitimate cloud infrastructure to avoid detection. This incident raises significant concerns about the security of cloud services and the potential for state-sponsored cyber activities to target sensitive data. Organizations using Cloudflare or similar services should remain vigilant and review their security measures to protect against such threats.

Impact: Cloudflare storage services
Remediation: Organizations should review their security protocols, monitor for unusual activity, and consider implementing additional layers of security for cloud services.
Read Original
Page 1 of 204Next