Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Lockdown Mode is a security feature for iPhones designed to protect users from cyber attacks and prevent forensic tools from accessing data after a device is seized by authorities. This mode is particularly useful for individuals who may be at risk of targeted attacks, such as journalists, activists, or those in sensitive positions. By activating Lockdown Mode, users enhance their privacy and security, making it significantly harder for anyone to extract information from their devices. The feature gained attention after reportedly thwarting attempts by law enforcement, including the FBI, to access iPhones during investigations. This highlights the ongoing battle between personal privacy and law enforcement access to digital data, raising important questions about the balance between security and individual rights.

Impact: iPhone devices with iOS updates that support Lockdown Mode
Remediation: To enable Lockdown Mode, go to Settings > Privacy & Security > Lockdown Mode and follow the prompts to activate it.
Read Original

The DKnife toolkit has been in use since 2019, allowing attackers to hijack traffic from edge devices to spy on users and deliver malware. This toolkit targets routers and other network devices, making it a significant threat to both individuals and organizations that rely on these systems for internet connectivity. By intercepting data, attackers can monitor communications and potentially steal sensitive information. The ongoing use of DKnife illustrates the persistent risks posed by advanced cyber espionage techniques. Users and companies need to be vigilant about securing their network devices to prevent such intrusions.

Impact: Routers and edge devices
Remediation: Users should ensure their devices are updated with the latest firmware and security patches, and consider changing default passwords and enabling additional security features.
Read Original

The Cybersecurity & Infrastructure Security Agency (CISA) has issued a warning regarding a serious vulnerability, identified as CVE-2026-24423, in SmarterMail. This flaw allows for unauthenticated remote code execution (RCE), which means attackers could potentially take control of affected systems without needing any prior authentication. This vulnerability has already been leveraged in ransomware attacks, posing significant risks to users and organizations running SmarterMail. Users are urged to take immediate action to secure their systems, as the flaw could lead to severe data breaches and operational disruptions. The urgency of this warning stems from the active exploitation of the flaw in the wild, highlighting the need for prompt remediation.

Impact: SmarterMail versions affected by CVE-2026-24423.
Remediation: Users should apply any available patches from SmarterMail, update their systems to the latest versions, and implement proper security configurations to mitigate the risk of exploitation. Regularly monitoring for unusual activity and ensuring robust security practices are also recommended.
Read Original
Actively Exploited

A new global campaign is taking advantage of older home routers that are no longer receiving security updates. Attackers are exploiting these outdated devices to hijack domain name system (DNS) settings, which can lead to users being redirected to malicious websites without their knowledge. This affects anyone still using these vulnerable routers, which are particularly common in homes and small businesses. The lack of security updates makes these devices easy targets for cybercriminals, raising significant concerns about the safety of personal data and online activities. Users are urged to check their router's firmware and consider upgrading to newer models that receive regular updates.

Impact: Older home routers from various vendors that no longer receive security updates
Remediation: Users should check for firmware updates for their routers, change default passwords, and consider upgrading to newer models that receive ongoing security support.
Read Original

In 2025, Proton's Data Breach Observatory reported a staggering 794 major data breaches that collectively exposed over 306 million records. These incidents primarily targeted small businesses, highlighting a significant vulnerability within this sector. The breaches varied in nature, but they all led to sensitive information being compromised, which can have dire consequences for both the businesses involved and their customers. The data exposed in these breaches could include personal information, financial details, and other confidential records, raising concerns about identity theft and fraud. This situation underscores the urgent need for small businesses to bolster their cybersecurity measures to protect against such attacks.

Impact: Small businesses, customer records, personal information, financial details
Remediation: Small businesses should implement stronger cybersecurity measures, including regular security audits, employee training, and updated software systems.
Read Original

Security researchers have identified several significant vulnerabilities within the OpenClaw AI assistant that complicate its safe use. Users reported that malicious 'skills' could be installed, potentially leading to unauthorized access or misuse of the assistant's capabilities. Additionally, the configuration settings for the application are described as finicky, making it difficult for users to ensure secure setups. These issues raise concerns for both individual users and organizations considering using OpenClaw, as they could expose sensitive data and create security risks. Proper attention to these vulnerabilities is crucial to protect users and maintain trust in AI technologies.

Impact: OpenClaw AI assistant
Remediation: Users should review and restrict the permissions granted to skills, and ensure proper configuration settings are applied. Regular updates should be monitored for any patches addressing these vulnerabilities.
Read Original

In November 2025, a massive DDoS attack reached a peak of 31.4 terabits per second, making it one of the largest ever recorded. The attack was executed by the AISURU/Kimwolf botnet and lasted for just 35 seconds. Fortunately, Cloudflare's security systems were able to automatically detect and block the attack before it could cause significant disruption. This incident is part of a worrying trend of increasingly powerful and brief DDoS attacks that can overwhelm even the most robust defenses. Organizations must remain vigilant as such attacks not only threaten individual services but also have the potential to disrupt broader internet infrastructure.

Impact: Cloudflare services, AISURU/Kimwolf botnet
Remediation: N/A
Read Original

German security officials are alerting the public about a series of phishing attempts targeting high-profile individuals, including military officials, diplomats, and investigative journalists, primarily using the messaging app Signal. Authorities believe these attacks are likely orchestrated by a state-backed hacking group, although they acknowledge that non-state actors could exploit similar tactics. The attackers are reaching out directly to their targets within the app, which raises concerns about the security of private communications among key figures. This situation is significant as it not only threatens the privacy of those affected but also poses risks to national security and the integrity of journalistic work. The potential for similar attacks by financially motivated cybercriminals adds another layer of urgency to the warnings.

Impact: Signal messaging app users, specifically military officials, diplomats, and journalists in Germany and Europe.
Remediation: Users should be cautious of unsolicited messages and verify the identity of contacts before engaging. Regularly updating app security settings and educating users about phishing tactics is recommended.
Read Original

On December 29, 2025, Poland's critical infrastructure faced a series of cyberattacks aimed at energy and industrial sectors, including wind and solar farms, a manufacturing company, and a combined heat and power plant. The attacks were executed by a single threat actor, as confirmed by Poland's national computer emergency response team, CERT Polska. Fortunately, these incidents were purely destructive and did not disrupt energy generation or distribution. The attackers gained access through exposed VPN connections, raising concerns about the security practices in place across the nation’s energy sector. This incident serves as a reminder of the vulnerabilities that can exist in critical infrastructure systems, emphasizing the need for improved cybersecurity measures.

Impact: Energy control systems, wind farms, solar farms, manufacturing companies, combined heat and power plants
Remediation: Organizations should secure VPN access, conduct regular security audits, and implement stronger authentication measures.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has mandated that federal agencies eliminate unsupported edge network devices over the next 12 to 18 months. This directive affects devices that no longer receive security updates from their manufacturers, which can leave networks vulnerable to attacks. CISA's goal is to improve asset management and reduce technical debt, ensuring that federal networks are less susceptible to potential cyber threats. By removing outdated equipment, agencies can better protect sensitive data and infrastructure. This move is particularly relevant as cyber attackers increasingly target weaknesses in outdated technology.

Impact: Unsupported edge network devices from various manufacturers
Remediation: Remove unsupported edge devices that do not receive security updates from OEMs within the next 12 to 18 months.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has mandated that federal agencies must identify and remove outdated network edge devices that no longer receive security updates from their manufacturers. This directive is critical because such devices can pose significant security risks if they are not regularly updated to protect against vulnerabilities. Edge devices, which connect internal networks to external ones, can be entry points for attackers if they are not properly maintained. The CISA's move aims to bolster the security posture of federal networks by ensuring that all devices are up-to-date and protected against known threats. Agencies are now required to take action to ensure compliance with this directive to safeguard sensitive data and maintain national security.

Impact: Network edge devices that are end-of-life and no longer supported by manufacturers
Remediation: Agencies should identify all end-of-life devices and replace them with supported models that receive regular security updates.
Read Original

Researchers have identified a supply chain attack affecting legitimate npm and PyPI packages, specifically targeting versions of @dydxprotocol/v4-client-js. The compromised versions include 3.4.1, 1.22.1, 1.15.2, and 1.0.31. Attackers have modified these packages to distribute malware designed to steal cryptocurrency wallet credentials and enable remote access through RAT (Remote Access Trojan) software. This incident poses a significant risk to developers and users relying on these packages, as it can lead to unauthorized access to sensitive financial information. Companies and individual developers should review their dependencies and ensure they are using safe versions to mitigate potential risks.

Impact: @dydxprotocol/v4-client-js (npm) versions 3.4.1, 1.22.1, 1.15.2, 1.0.31
Remediation: Developers should update to safe versions of @dydxprotocol/v4-client-js and review their package dependencies for any signs of compromise.
Read Original

The House panel has approved five bills aimed at strengthening cybersecurity defenses in the energy sector. This decision follows the Department of Energy's recent Liberty Eclipse cybersecurity exercise, which evaluated the sector's readiness against cyber threats. These legislative measures are designed to enhance the security infrastructure of energy companies, which are increasingly targeted by cyberattacks. The move underscores the government's recognition of the energy sector's vulnerability and the need for improved protective measures to safeguard critical infrastructure. This legislative push is significant as it reflects ongoing concerns about the potential impact of cyber incidents on energy supplies and national security.

Impact: Energy sector companies and critical infrastructure systems
Remediation: N/A
Read Original

A significant vulnerability has been found in SmarterMail, a popular email server software, which allows attackers to execute arbitrary code remotely without needing authentication. This flaw has already been exploited in ransomware attacks, raising concerns for organizations that rely on this software. Attackers can send specially crafted HTTP requests to take control of affected systems, potentially leading to data breaches and operational disruptions. Users and administrators of SmarterMail are urged to take immediate action to protect their systems. The situation is critical as the vulnerability is currently being exploited in the wild, making prompt remediation essential.

Impact: SmarterMail email server software
Remediation: Users should apply the latest security patches released by SmarterMail or implement firewalls to block malicious requests.
Read Original

Mobile apps are increasingly collecting personal data in ways that are hard for users and regulators to track or verify. While permissions and privacy policies provide some insight into what data apps can access and how they should handle it, they often don’t accurately reflect the actual data practices during use. Researchers have developed a new analysis framework called mopri, which aims to bridge this gap by integrating both static and dynamic analysis techniques. This could help identify exactly what data is being collected and where it's sent, making it easier for users and developers to understand privacy risks. The need for such tools is urgent as concerns about mobile privacy continue to grow.

Impact: Mobile applications, particularly those that collect personal data
Remediation: Implement the mopri analysis framework for better data tracking and privacy compliance
Read Original
Page 1 of 90Next