Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Bryan Fleming, the creator of the stalkerware application pcTattleTale, has been sentenced without prison time after pleading guilty to charges related to his software. Instead, he will face a fine and a period of supervised release. This case is notable as it represents one of the few successful prosecutions related to stalkerware in the United States, which is software designed to secretly monitor individuals without their consent. The implications of this case extend beyond Fleming, as it raises awareness about the legal ramifications for those who develop and distribute such invasive technologies. Users should be aware of the potential risks associated with stalkerware and the importance of privacy in the digital age.

Impact: pcTattleTale stalkerware application
Remediation: Users should uninstall the pcTattleTale application and consider using security tools that can detect and remove stalkerware.
Read Original
Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A new phishing scam is exploiting the ongoing conflict between Iran, the US, and Israel by sending out fake missile alerts to trick users into revealing their Microsoft login credentials. Attackers are using QR codes and counterfeit government emails to lure victims. This tactic is particularly concerning as it preys on the heightened anxiety surrounding geopolitical tensions, making users more susceptible to clicking on malicious links. The scam underscores the importance of vigilance regarding unsolicited communications, especially during times of crisis. Users are advised to verify the authenticity of any alerts before taking action, particularly those requesting sensitive information.

Impact: Microsoft accounts
Remediation: Users should be cautious with unsolicited emails and alerts, verify sources before clicking on links or scanning QR codes, and enable two-factor authentication on their accounts.
Read Original

Researchers at Google DeepMind have identified six types of web-based attacks that can target autonomous AI agents. These attacks exploit malicious web content to manipulate AI behavior, potentially leading to harmful consequences. The study emphasizes how AI agents, which increasingly navigate the internet autonomously, can be misled by deceptive information, resulting in unexpected actions. This research highlights the need for stronger security measures to protect AI systems from manipulation. As AI continues to be integrated into various applications, understanding these vulnerabilities is crucial for developers and organizations relying on AI technology.

Impact: Autonomous AI agents
Remediation: Implement security measures to validate and filter web content accessed by AI agents.
Read Original

A new threat group known as UAT-10608 is targeting Next.js applications that are exposed on the web. They are using an automated tool to steal sensitive information such as user credentials and system secrets. This attack can affect any organization using vulnerable Next.js apps, potentially leading to significant data breaches and unauthorized access to systems. It's crucial for companies to assess their web applications for vulnerabilities, especially those related to the React2Shell flaw, to prevent such automated credential harvesting campaigns. The ongoing exploitation of this vulnerability emphasizes the need for timely security updates and monitoring of web applications.

Impact: Next.js applications, React2Shell vulnerability
Remediation: Organizations should patch their Next.js applications against the React2Shell vulnerability and implement security best practices to protect against automated credential harvesting.
Read Original

The article discusses the risks associated with MCP (Multi-Channel Protocol), emphasizing that the main issue isn't technical flaws but rather a lack of identity verification in AI systems. This absence of identifiable actions makes it difficult to trace back AI decisions, raising concerns about accountability and transparency. As AI systems become more integrated into various applications, the implications of untraceable actions could lead to significant security and ethical challenges. Users, developers, and organizations relying on AI need to address these identity issues to ensure responsible use and mitigate potential risks. Without proper identification mechanisms, the trustworthiness of AI systems could be severely compromised, affecting a wide range of industries.

Impact: MCP systems, AI applications
Remediation: Implement identity verification measures in AI systems
Read Original

Recent research has identified several email-based threats that are evolving with the rise of AI and sophisticated attack methods. Key threats include OAuth consent attacks, where attackers exploit legitimate app permissions to gain unauthorized access to accounts. Lateral phishing is also on the rise, where compromised accounts are used to target other users within the same organization. Additionally, AI is being misused in payroll fraud schemes, tricking companies into making mistaken payments. These threats impact a wide range of organizations, as they rely heavily on email for communication and transactions. As these tactics become more common, businesses must remain vigilant and enhance their email security measures to protect against these evolving risks.

Impact: OAuth consent attacks, lateral phishing, AI payroll fraud
Remediation: Companies should implement multi-factor authentication, conduct regular security training for employees, and monitor for unusual email activity.
Read Original

German authorities have identified two members of the REvil ransomware group, linking them to over 130 cyberattacks in the country. The suspects are Daniil Maksimovich Shchukin, a 31-year-old Russian national, and another unnamed individual. These attacks have targeted various sectors across Germany, causing significant disruptions and financial losses. The identification of these operators is a crucial step in combating ransomware, as it could lead to further investigations and arrests. This situation underscores the ongoing threat posed by ransomware groups and the importance of international cooperation in addressing cybercrime.

Impact: REvil ransomware attacks affecting various sectors in Germany
Remediation: N/A
Read Original

Kaspersky has reported that SparkCat malware has resurfaced on app stores, specifically targeting cryptocurrency users in Asia. This malware has been found in applications available for both iOS and Android devices. Users downloading these apps may unknowingly expose their sensitive information, such as cryptocurrency wallet details, to attackers. This resurgence is particularly concerning given the increasing popularity of cryptocurrency among users, making them prime targets for cybercriminals. As the malware spreads, it underlines the need for users to be vigilant about the apps they download and the permissions they grant.

Impact: iOS and Android applications targeting cryptocurrency users
Remediation: Users should verify the legitimacy of apps before downloading, avoid apps from untrusted sources, and regularly update their devices with the latest security patches.
Read Original

The OWASP GenAI Security Project has recently updated its guidelines in response to 21 identified risks associated with generative AI technologies. The organization recommends that companies adopt distinct but interconnected strategies to protect both generative AI and agentic AI systems. This update is significant as it provides a structured approach for organizations looking to enhance their security posture in the rapidly evolving landscape of AI technology. By recognizing these risks, OWASP aims to help businesses understand the vulnerabilities they may face and the steps they need to take to safeguard their systems. This is particularly relevant as more companies integrate AI into their operations, making it crucial to address these security challenges proactively.

Impact: Generative AI systems, Agentic AI systems
Remediation: Companies should develop separate but linked security strategies for generative and agentic AI systems.
Read Original

In March 2026, a threat actor known as TeamPCP executed a supply chain attack that targeted developer workstations, turning them into credential vaults for attackers. These machines are crucial for developers, as they handle the creation and management of various credentials across services and tools. By infiltrating these systems, attackers gained access to sensitive information that could be reused across multiple platforms, increasing the risk of data breaches. This incident raises significant concerns for companies that rely on developer machines, highlighting the need for improved security measures to protect sensitive credentials. As attackers continue to exploit these valuable resources, organizations must reassess their security protocols to safeguard against similar threats in the future.

Impact: Developer workstations, credentials management systems
Remediation: Enhance security measures on developer workstations, implement stricter access controls, and educate developers on credential management best practices.
Read Original

Hackers have targeted users of Guardarian by publishing 36 malicious NPM packages that masquerade as Strapi plugins. These deceptive packages are designed to execute shell commands, escape container environments, and steal user credentials. This attack poses a serious risk to developers and organizations using Strapi, as the malicious code could lead to significant data breaches or unauthorized access. Users of Strapi should exercise caution and verify the authenticity of any plugins they intend to use, as these packages can compromise their systems. This incident serves as a reminder of the ongoing risks associated with third-party software dependencies.

Impact: Strapi, NPM packages
Remediation: Users should verify the authenticity of NPM packages and avoid using unverified plugins. Regularly audit dependencies and monitor for any suspicious activity.
Read Original

North Korean hackers, previously linked to the Axios supply chain attack, are now targeting prominent maintainers of Node.js in a social engineering campaign. These attackers are using deceptive tactics to compromise the accounts of these developers, potentially putting the security of the Node.js ecosystem at risk. This is concerning because Node.js is widely used in web development, and any breach could lead to widespread vulnerabilities in applications that rely on its libraries. Developers and organizations that utilize Node.js should be on high alert and take precautions to protect their accounts and code repositories. The ongoing targeting of developers reflects a broader trend of cybercriminals seeking to exploit trusted software maintainers to gain access to critical systems.

Impact: Node.js maintainers, potentially affecting the Node.js ecosystem and applications relying on it.
Remediation: Developers should enable two-factor authentication, regularly update their passwords, and be cautious of unsolicited communications.
Read Original

Wireless networks in enterprises are becoming more complex, supporting a variety of devices and applications. However, this has led to a rise in security incidents, as highlighted by the 2026 Cisco State of Wireless report. Organizations are facing increased incident rates and higher costs, yet many are still investing heavily in wireless technology. Despite the growing risks, there seems to be a disconnect as IT professionals are not addressing these security challenges effectively. This situation raises concerns about the potential vulnerabilities within enterprise networks, making it crucial for organizations to reassess their security strategies.

Impact: Enterprise wireless networks, various devices and applications
Remediation: Organizations should reassess and enhance their wireless security strategies, invest in training for IT staff, and implement stronger security measures.
Read Original

Fortinet has issued an emergency security update for a serious vulnerability found in its FortiClient Enterprise Management Server (EMS). This flaw is currently being exploited in the wild, posing a significant risk to organizations using the software. Users of FortiClient EMS should prioritize applying the patch released over the weekend to protect their systems from potential attacks. The vulnerability affects the management of client devices, which could allow unauthorized access or control if not addressed promptly. The urgency of this update highlights the ongoing challenges companies face in securing their environments against evolving threats.

Impact: FortiClient Enterprise Management Server (EMS)
Remediation: Fortinet has released an emergency patch to address this vulnerability. Users should apply the latest security update as soon as possible.
Read Original

In a significant security breach, the decentralized exchange Drift reported that it lost $285 million due to an attack linked to North Korea's government. The breach occurred on April 1, 2026, following a six-month social engineering campaign that began in the fall of 2025. Attackers employed sophisticated tactics to manipulate individuals within the organization, ultimately leading to the theft of a large sum of money. This incident raises concerns about the vulnerabilities within decentralized finance platforms and highlights the potential for state-sponsored cybercriminal activities. Companies operating in the crypto space need to enhance their security measures and employee training to prevent such attacks in the future.

Impact: Drift decentralized exchange
Remediation: Companies should enhance security protocols and employee training against social engineering attacks.
Read Original
Page 1 of 141Next