Pwn2Own Berlin 2026 concluded with DEVCORE emerging as the standout performer, successfully identifying 47 unique zero-day vulnerabilities during the event. Over three days, researchers earned a total of $1.29 million in rewards for their discoveries, showcasing the event's focus on security challenges across various platforms and applications. This year's competition not only highlighted the skills of participants but also underscored the ongoing need for robust cybersecurity measures in software development. With the number of zero-day vulnerabilities found, it emphasizes the vulnerabilities present in widely used systems and applications, prompting companies to reassess their security protocols. The event took place in conjunction with OffensiveCon, further connecting the research community with industry professionals.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
BleepingComputer
The Russian hacker group known as Secret Blizzard has transformed its Kazuar backdoor into a more sophisticated modular peer-to-peer (P2P) botnet. This new version is designed for long-term stealth and effective data collection, making it a significant threat to targeted organizations. The botnet's P2P structure allows it to operate without relying on a central command server, which complicates detection and mitigation efforts. This development raises concerns for businesses and individuals alike, as it could lead to unauthorized data access and prolonged security breaches. Cybersecurity experts are urging organizations to enhance their defenses against these evolving threats, as the Kazuar botnet is likely to be used for various malicious activities, including espionage and data theft.
OpenAI confirmed that a supply chain attack linked to malicious TanStack packages compromised two of its employee devices. This breach exposed sensitive credentials from the company's internal source code repositories. The attackers, part of a group known as TeamPCP, exploited vulnerabilities in the package publishing process to gain access. This incident raises concerns about the security of software supply chains, as it demonstrates how vulnerabilities can lead to significant data exposure. Organizations must be vigilant in monitoring their package management systems to prevent similar attacks.
SCM feed for Latest
TeamPCP has released the source code for a variant of the Shai-Hulud malware, which has been implicated in recent attacks against companies like TanStack. While researchers indicate that this particular version is not the original malware, its release poses a risk as it may enable other attackers to replicate or modify the malware for their own use. The significance of this release lies in the potential for increased attacks against vulnerable systems, as the source code can be used by less skilled cybercriminals. Organizations need to remain vigilant and strengthen their defenses in light of this development to protect against possible exploits stemming from the released code.
SCM feed for Latest
Hackers are using PyInstaller to disguise XWorm malware, which is being delivered through deceptive emails or fake software updates that contain seemingly harmless files. Once a victim opens the infected file, the malware can execute and potentially compromise the user’s system. This tactic not only makes it difficult for antivirus programs to detect the malware but also highlights the ongoing risks associated with social engineering attacks. Users and organizations need to be cautious about unsolicited emails and software updates, ensuring they verify the source before downloading or opening any files. This incident serves as a reminder of the importance of cybersecurity awareness and vigilance in protecting personal and sensitive information.
SCM feed for Latest
The Federal Trade Commission (FTC) is now enforcing the Take It Down Act, a law aimed at combating nonconsensual intimate imagery and AI-generated deepfakes. Under this law, online platforms are required to remove such content within 48 hours after a victim reports it. This is significant as it provides victims with a quicker pathway to protect their privacy and dignity against harmful digital forgeries. The act reflects growing concerns about the misuse of technology to create and share intimate images without consent, which can have devastating effects on individuals. By imposing strict removal timelines, the FTC is taking steps to hold platforms accountable and enhance user safety online.
SCM feed for Latest
During a recent meeting between U.S. officials and Chinese leaders, security concerns prompted American personnel to leave behind certain items, including burner phones and lapel pins that were presented as gifts. This decision reflects ongoing worries about surveillance and data security, particularly in high-stakes diplomatic interactions. By discarding these items, U.S. officials are taking precautionary measures to prevent potential breaches of sensitive information. The move highlights the increasing focus on cybersecurity in international relations and the lengths officials will go to protect their communications. This incident serves as a reminder of the vulnerabilities that can arise when dealing with foreign governments, especially in contexts where trust is limited.
SCM feed for Latest
ESET has reported a new campaign by the hacking group known as Ghostwriter, which is targeting the Ukrainian government. The campaign starts with a spear-phishing email that contains a PDF attachment disguised as an official document from Ukrtelecom, a key telecommunications provider in Ukraine. This type of attack aims to trick recipients into opening the attachment, potentially leading to further malicious activity. The focus on Ukrainian government entities indicates a continued effort by cybercriminals to exploit vulnerabilities in the region, particularly amid ongoing geopolitical tensions. Such attacks can undermine trust in government communications and disrupt essential services.
SCM feed for Latest
A vulnerability in the Funnel Builder plugin for WordPress, which is used by over 40,000 websites, has been exploited by attackers to steal payment data. This flaw allows unauthenticated users to change global settings through an unprotected checkout endpoint. As a result, any website using this plugin could be at risk of having sensitive payment information compromised. Website owners should take immediate action to secure their sites, as the potential for financial loss and damage to customer trust is significant. This incident serves as a reminder for users to regularly update their plugins and monitor for security patches.
The Federal Trade Commission (FTC) is stepping up its enforcement of the Take It Down Act, which aims to combat the online sharing of explicit images without consent. The agency plans to impose significant fines on those who violate the law and has promised to initiate investigations against offenders. While this move is a strong statement against non-consensual sharing, experts have raised concerns about the FTC's resources and priorities in handling such cases. The effectiveness of these measures will depend on how the agency allocates its resources in the face of ongoing challenges in online safety. This law is particularly important as it seeks to protect individuals from harmful digital practices that can have lasting emotional and social consequences.
BleepingComputer
Hackers have compromised the popular node-ipc npm package, adding malware designed to steal user credentials in recent versions. This supply chain attack specifically targets developers who rely on node-ipc for inter-process communication in their applications. Users of the affected package are at risk of having their sensitive information, such as passwords and tokens, captured by the malicious code. This incident serves as a reminder of the vulnerabilities that can arise in the software supply chain, affecting not just individual developers but also the larger ecosystem that relies on these packages. Developers are urged to review their dependencies and ensure they are using safe versions of node-ipc to protect their credentials.
Security Affairs
CVE-2026-42897Microsoft has confirmed that a new zero-day vulnerability in Exchange Server, identified as CVE-2026-42897, is being actively exploited by attackers. This vulnerability has a CVSS score of 8.1, indicating a high level of severity. It stems from improper handling of user input during web page generation, which can lead to cross-site scripting (XSS) attacks. Organizations using affected versions of Exchange Server are at risk, as attackers could exploit this flaw to execute malicious scripts in the context of users' browsers. Microsoft urges users to take immediate action to protect their systems and data from potential breaches.
The REMUS infostealer is a malware that focuses on stealing browser sessions and authentication tokens, which are now considered more valuable than traditional passwords. Researchers from Flare have observed its rapid evolution, emphasizing its capability for session theft and operational scalability. This malware allows attackers to hijack users' online accounts without needing to crack passwords, posing a significant risk to individuals and organizations alike. As cybercriminals increasingly adopt this method, users must be vigilant about their online security practices. The shift towards session theft indicates a growing trend in cyberattacks that could affect a wide range of online services and platforms.
Researchers have identified four vulnerabilities in OpenClaw, a software framework that could be exploited by attackers to steal data, gain higher privileges, and maintain persistent access to systems. These vulnerabilities, referred to as Claw Chain, allow cybercriminals to infiltrate systems, extract sensitive information, and install backdoors for ongoing access. The flaws pose a significant risk to organizations using OpenClaw, as they can lead to serious data breaches and unauthorized control over affected systems. Companies that rely on this software should take immediate action to address these vulnerabilities to protect their data and systems from potential exploitation.
IT subcontractors are facing a new challenge that goes beyond traditional cybersecurity threats like data breaches and ransomware. Starting in 2026, the costs associated with cyber insurance are becoming a significant factor in contract negotiations. Many firms are finding that their insurance premiums or coverage limits are impacting their ability to secure contracts, as clients increasingly prioritize the financial stability provided by insurance over the actual cybersecurity measures in place. This shift may force subcontractors to rethink their approaches to both security and insurance, as the balance between risk management and contract acquisition becomes more complex. As the industry evolves, understanding the implications of insurance on contract viability will be crucial for IT firms moving forward.