At the BSides SF 2026 hacker conference, a researcher warned that Software as a Service (SaaS) and cloud assets are increasingly vulnerable to identity-based ransomware attacks. This type of attack exploits weaknesses in identity management systems, allowing attackers to gain unauthorized access and encrypt critical data. Organizations that rely on cloud services for their operations, especially those with inadequate security measures in place, are at significant risk. The researcher emphasized that as more businesses transition to these platforms, the need for robust identity protection becomes essential. Companies should prioritize enhancing their identity security protocols to mitigate these risks and protect sensitive customer information.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
SCM feed for Latest
At the RSAC 2026 conference, researchers discussed the emergence of Shai-Hulud worms, which have taken advantage of automatic updates in open-source software repositories. They warned that these types of supply-chain attacks may become more common, posing significant risks to software integrity and security. This could affect a wide range of organizations that rely on open-source software for their operations. The implications are serious, as attackers could potentially infiltrate systems through seemingly legitimate software updates, compromising sensitive data and systems. Companies using open-source solutions need to be vigilant and implement stricter security measures to protect against these evolving threats.
Hackread – Cybersecurity News, Data Breaches, AI and More
Lloyds Banking Group has announced plans to compensate around 450,000 customers due to a glitch in their mobile banking app that unintentionally exposed sensitive customer data. The issue arose when certain users were able to see details of other customers' accounts, including names and transaction histories. This incident raises significant concerns about data privacy and security, as affected individuals may worry about the potential misuse of their information. Lloyds is working to address the problem and ensure that such vulnerabilities are not repeated in the future. The compensation is part of their effort to regain customer trust after this security mishap.
An Iranian hacking group named Handala claims to have breached the personal email account of FBI Director Kash Patel, leaking various files and photos. The FBI has acknowledged the incident but stated that no sensitive government data was compromised in the breach. This incident raises concerns about the security of personal accounts held by high-ranking officials, as attackers may seek to exploit such information for various motives. While the FBI is aware of the situation, the lack of exposed government data may provide some reassurance, though it still points to the ongoing risks posed by state-sponsored hacking groups targeting individuals in influential positions.
Hackread – Cybersecurity News, Data Breaches, AI and More
ShinyHunters, a notorious hacking group, has departed from BreachForums and leaked a database containing information on 300,000 users. This data breach raises alarms as ShinyHunters warns that all active domains associated with the leak are fake, suggesting that users should be cautious of phishing attempts. The group has also threatened to release more data from forum backups, indicating that the situation could worsen. Users affected by this breach may have their personal information exposed, which could lead to identity theft or other malicious activities. This incident underscores the ongoing risks associated with online forums and the potential for significant data leaks.
SCM feed for Latest
Researchers from OX Security have found that AI coding assistants often make the same types of mistakes as human developers. This suggests that while these tools can increase productivity, they are not infallible and can introduce coding errors into software. The study emphasizes the need for developers to treat AI tools like junior developers, meaning they should verify and review the code generated by these assistants thoroughly. This approach is crucial for companies relying on AI for software development, as it highlights the importance of maintaining coding standards and ensuring quality control. The findings serve as a reminder that while AI can assist in coding, human oversight is still essential to catch errors that could lead to vulnerabilities in applications.
The European Commission reported a cyberattack that targeted its cloud infrastructure, specifically affecting the systems that host its Europa.eu websites. The attack was detected on March 24 and was swiftly contained, with measures put in place to prevent any disruption to website availability. Fortunately, there was no impact on the Commission's internal networks. Initial investigations indicate that while the attack was serious enough to warrant immediate action, it did not compromise the integrity or accessibility of the websites involved. This incident raises concerns about the security of cloud systems used by public institutions and emphasizes the need for robust cybersecurity measures.
The article discusses the rise of scam baiting, where individuals actively engage with scammers to waste their time and expose their tactics. This practice has gained traction as a means to combat online fraud while providing entertainment. With advancements in AI, some scammers are using automated systems to enhance their operations, making it harder for victims to spot deceit. The article emphasizes the ethical implications of scam baiting and the potential risks involved, highlighting that while it can be a form of resistance against scammers, it may also lead to unintended consequences for those who engage in it. As scammers evolve, so must the strategies to combat them, raising questions about the effectiveness and safety of such countermeasures.
Iranian hackers known as Handala have claimed to have compromised the personal data of FBI Director Kash Patel. The FBI has confirmed that Patel's personal email was targeted, but they stated that no government information was accessed during this breach. This incident raises concerns about the security of personal information for high-ranking officials, especially given the ongoing threat posed by state-sponsored hackers. The fact that a figure like Patel is targeted highlights the potential risks to national security and the importance of robust personal cybersecurity measures for public officials. While the FBI is investigating the incident, the situation serves as a reminder of the vulnerabilities that exist even at the highest levels of government.
TeamPCP, a group known for supply chain attacks, has targeted the Telnyx Python package by releasing two malicious versions (4.87.1 and 4.87.2) on March 27, 2026. These versions, available on the Python Package Index (PyPI), are designed to steal sensitive user data by hiding their credential-stealing features within .WAV files. This incident poses a significant risk to developers and organizations that rely on the Telnyx package for their applications, as it can lead to unauthorized access to sensitive data. Users who downloaded these versions may unknowingly expose their credentials, making it crucial for the community to act swiftly to mitigate potential damage.
Researchers at Endor Labs have reported that the TeamPCP group has compromised the Telnyx package on the Python Package Index (PyPI). Versions 4.87.1 and 4.87.2 of the Telnyx SDK, which is used for the Telnyx AI Voice Agent service, were modified to include malicious code. The first version contained non-functional malicious code, while the second version may pose a greater risk. This incident highlights the ongoing risks associated with supply chain attacks, where attackers modify legitimate software to distribute malware. Developers and organizations using this SDK should be vigilant and consider removing or updating their versions immediately to mitigate any potential threats.
Recent reports indicate a significant decline in infrastructure attacks that could lead to physical consequences, specifically a 25% drop in incidents targeting operational technology (OT) at industrial and critical infrastructure sites. This decrease appears to be linked to a temporary lull in ransomware attacks and hackers' limited understanding of OT systems. While this might seem like positive news, the underlying issue remains that many attackers still lack expertise in these environments, which could change. This situation raises concerns about the long-term security posture of critical infrastructure, as attackers could eventually adapt and exploit these vulnerabilities. Companies operating in these sectors should remain vigilant and enhance their security measures to protect against potential threats in the future.
BleepingComputer
The European Commission is looking into a security breach involving its Amazon cloud infrastructure. Unauthorized access was gained by a threat actor, raising concerns about the potential exposure of sensitive data. This incident is particularly significant because it affects a major governmental body within the European Union, which handles important regulatory and policy decisions. The investigation aims to assess the scope of the breach and determine any necessary actions to safeguard data moving forward. This incident serves as a reminder of the vulnerabilities that can exist even within high-profile organizations and the importance of robust security measures in cloud environments.
Infosecurity Magazine
The UK government has sanctioned Xinbi, an online cryptocurrency marketplace linked to funding scams in Southeast Asia. Classified as the second-largest illicit marketplace globally, Xinbi has been implicated in various fraudulent activities affecting users and investors. The crackdown aims to disrupt the financial networks that support these scams, which often target vulnerable individuals. By taking this action, the UK government seeks to prevent further criminal exploitation through cryptocurrency and safeguard its citizens from financial fraud. The move reflects growing concerns about the role of digital currencies in facilitating crime across international borders.
TP-Link has addressed several serious vulnerabilities in its routers that could allow attackers to bypass authentication, execute arbitrary commands, and decrypt sensitive configuration files. These security flaws potentially expose users to unauthorized access and manipulation of their network settings. Affected devices include various TP-Link router models, although specific models were not detailed in the announcement. Users of TP-Link routers should promptly apply the patches provided by the company to safeguard their devices. This incident serves as a reminder of the importance of keeping router firmware up to date to protect against security risks.