Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The cybersecurity community is closely observing whether Iranian hackers will adhere to a ceasefire that does not specifically mention them. Historically, ceasefires in geopolitical conflicts have not significantly impacted the frequency of cyberattacks. Experts suggest that despite a temporary halt in physical hostilities, cyber operations often continue unabated. This raises concerns for organizations and governments that might be targeted by Iranian cyber actors, as they may not feel bound by such agreements. The situation underscores the ongoing risk that cyber threats pose, irrespective of diplomatic efforts.

Impact: N/A
Remediation: N/A
Read Original

Hackers have compromised the update system for the Smart Slider 3 Pro plugin, which is used in WordPress and Joomla websites. These attackers managed to distribute a malicious version of the plugin that contains multiple backdoors, allowing them to access and control affected sites. This incident puts users of both platforms at risk, as the malicious code can lead to data breaches and unauthorized actions on their websites. Website administrators should be particularly vigilant, as the compromised update could have far-reaching consequences if not addressed promptly. Users are strongly advised to check their installations and update to the latest secure versions to mitigate any potential damage.

Impact: Smart Slider 3 Pro plugin for WordPress and Joomla
Remediation: Users should immediately check for updates to Smart Slider 3 Pro and ensure they are running the latest secure version. Additionally, they should scan their websites for any signs of compromise.
Read Original

The FBI has taken significant action against the Russian hacking group APT28, which is linked to the GRU, the Russian military intelligence agency. This operation targeted routers that APT28 had compromised, allowing them to access a range of networks. According to Brett Leatherman, the FBI's cyber chief, this group's ability to propagate attacks from routers made their threat particularly concerning. By disrupting this access, the FBI aims to protect various organizations from potential espionage and data breaches. This incident underscores the persistent risk posed by state-sponsored cyber actors and highlights the importance of securing network infrastructure to prevent similar intrusions in the future.

Impact: Routers, network devices
Remediation: Organizations should ensure their routers are updated to the latest firmware, implement strong security configurations, and regularly monitor network traffic for unusual activity.
Read Original

Sensitive documents from the Los Angeles Police Department have reportedly been leaked online by a group known as World Leaks. The breach has exposed around 7.7 terabytes of data, which includes over 337,000 files. This incident raises serious concerns about the security of law enforcement data and the potential implications for public safety and privacy. With such a large volume of sensitive information now accessible, there is a heightened risk of misuse or further exploitation. The LAPD and other authorities will need to take immediate action to assess the extent of the breach and protect against future incidents.

Impact: Los Angeles Police Department (LAPD) documents and data
Remediation: N/A
Read Original

On April 7, 2026, ChipSoft, a healthcare software vendor based in the Netherlands, suffered a ransomware attack that has been confirmed by Z-CERT, the country's computer emergency response team for the healthcare sector. This incident raises serious concerns about the security of healthcare data, as ransomware attacks can disrupt medical services and compromise sensitive patient information. The attack's timing is particularly alarming given the essential role that healthcare software plays in patient care and operations. Authorities are likely working to assess the full impact of the breach and to assist affected healthcare providers in managing the fallout. This incident underscores the ongoing vulnerabilities in the healthcare sector regarding cybersecurity threats.

Impact: ChipSoft healthcare software systems
Remediation: N/A
Read Original

Researchers at RSAC discovered a way to bypass Apple Intelligence's AI guardrails using techniques called Neural Exect and Unicode manipulation. This vulnerability could allow attackers to exploit the AI's systems, potentially leading to unauthorized access or misuse of the technology. The implications of this breach are significant, as it raises concerns about the security and reliability of AI systems used by Apple and possibly other tech companies. Users and developers relying on Apple Intelligence need to be aware of this vulnerability to ensure their systems are secure. The researchers' findings emphasize the importance of ongoing scrutiny and improvement of AI security measures.

Impact: Apple Intelligence
Remediation: N/A
Read Original
Actively Exploited

Edge devices, which connect various networks and serve as points of entry, are increasingly becoming targets for cyber attackers. These devices can be exploited to gain unauthorized access to systems, allowing attackers to persist within networks and pivot to steal sensitive identity information. This trend raises concerns for organizations relying on edge computing, as vulnerabilities in these devices can lead to significant data breaches. Ensuring the security of edge devices is crucial, as they play a pivotal role in the overall security posture of an organization. Companies need to prioritize safeguarding these devices to protect against modern cyber threats.

Impact: Edge devices, perimeter security systems
Remediation: Implement stronger security measures for edge devices, conduct regular security audits, and update firmware to the latest versions.
Read Original

A hack-for-hire campaign has been uncovered, believed to be linked to an actor with possible connections to the Indian government. This campaign has primarily targeted journalists, activists, and officials across the Middle East and North Africa (MENA) region. Notably, two Egyptian journalists known for their criticisms of the government were among the individuals affected. The findings, reported by Access Now, Lookout, and SMEX, raise significant concerns about the safety and privacy of those who report on sensitive issues in these regions. The implications of such targeted attacks extend beyond individual safety, potentially stifling freedom of expression and press in the affected areas.

Impact: Journalists, activists, government officials in MENA region, particularly Egyptian journalists.
Remediation: N/A
Read Original

Eurail B.V., which operates digital passes for 33 national railways in Europe, reported a data breach that occurred in December 2025, affecting over 300,000 individuals. The breach involved the theft of personal information, although specific details about what data was compromised have not been disclosed. This incident raises serious concerns about the security of personal information in the travel industry, especially as digital services become more prevalent. Affected individuals may face risks such as identity theft or fraud. Eurail has not provided specific steps taken to address the breach or protect users going forward, making it crucial for those impacted to monitor their accounts closely.

Impact: Personal information of over 300,000 individuals, including potentially sensitive data.
Remediation: N/A
Read Original

A recent report from the SANS Institute reveals a significant rise in non-human identities (NHIs), with AI agents contributing to a 76% increase. This surge is concerning because NHIs can be used by malicious actors to impersonate legitimate users, leading to potential security breaches and fraud. Organizations are now facing challenges in governance and identity management as these AI-driven identities proliferate. The report emphasizes the need for companies to reassess their identity verification processes to mitigate risks associated with these non-human entities. As AI continues to evolve, understanding its impact on cybersecurity becomes increasingly vital for businesses and security professionals.

Impact: Non-human identities (NHIs), AI-driven systems
Remediation: Organizations should reassess and strengthen their identity verification processes to address risks posed by NHIs.
Read Original

Google's threat intelligence team has identified a new extortion group known as UNC6783, which appears to be linked to the Raccoon persona. This group is specifically targeting Business Process Outsourcing (BPO) companies and helpdesk services, indicating a shift in focus towards sectors that handle sensitive customer data. The group's tactics may involve ransomware or other extortion methods, which poses significant risks to affected organizations. Companies in the BPO sector should be vigilant and enhance their security measures to protect against potential breaches and data leaks. As this threat evolves, understanding the methods and motivations behind it will be crucial for businesses in these industries.

Impact: BPO companies, helpdesk services, enterprises handling sensitive customer data
Remediation: Companies should enhance security protocols, conduct regular security audits, and train staff on recognizing phishing attempts and other social engineering tactics.
Read Original

In December 2025, a data breach at Eurail compromised the personal information of approximately 300,000 individuals. Hackers managed to access sensitive data, including names and passport numbers, from the European travel company's network. This incident raises concerns about the security of personal information and highlights the risks associated with storing such data online. Affected individuals could face identity theft or fraud due to the exposure of their passport details. Companies in the travel sector must enhance their cybersecurity measures to protect customer data and prevent similar breaches in the future.

Impact: Names, passport numbers
Remediation: N/A
Read Original
Actively Exploited

A recent hack targeted Bitcoin Depot, a Bitcoin ATM operator, resulting in the theft of over 50 bitcoins, valued at approximately $3.6 million. The attacker gained access to the company’s wallets by stealing login credentials, allowing them to transfer the funds without detection. This incident raises concerns about the security of cryptocurrency operations and the potential risks associated with user credential management. As cryptocurrency continues to gain popularity, incidents like this highlight the need for stronger security measures to protect digital assets. Companies operating in the crypto space must ensure they have robust security practices in place to prevent similar attacks in the future.

Impact: Bitcoin Depot wallets
Remediation: Companies should implement two-factor authentication and monitor for suspicious account activity to enhance security.
Read Original

Research from Token Security reveals that 65% of agentic chatbots are unused yet still possess live access credentials, posing a significant security risk. Itamar Apelblat, CEO of Token Security, points out that organizations often treat these AI agents as mere experiments rather than as securely managed identities. This oversight can lead to vulnerabilities similar to those seen with orphaned service accounts, which are difficult to monitor and secure. Additionally, the study found that 51% of actions taken by external agents depend on these credentials, raising concerns about unauthorized access and data breaches. Companies need to reassess how they manage AI agents to mitigate these risks and enhance their overall security posture.

Impact: Agentic chatbots, AI agents, access credentials
Remediation: Organizations should implement strict identity governance for AI agents, regularly audit access credentials, and ensure that unused agents are deactivated or securely managed.
Read Original

Researchers from Cisco Talos have found that attackers are exploiting the email notification systems of popular SaaS platforms like GitHub and Jira to distribute phishing and spam emails. By sending these malicious emails from the platforms' own servers, the attackers bypass standard email security measures such as SPF, DKIM, and DMARC. This tactic allows them to deliver phishing messages that appear legitimate, effectively tricking users into engaging with the content. This incident raises serious concerns for organizations using these platforms, as it highlights a potential vulnerability in their email communication processes. Users of GitHub and Jira should be particularly vigilant about unexpected emails, even if they seem to come from trusted sources.

Impact: GitHub, Jira
Remediation: Users should verify the authenticity of emails from GitHub and Jira, especially if they contain links or requests for sensitive information. Implementing additional email filtering and user education on recognizing phishing attempts are also recommended.
Read Original
Page 1 of 147Next