A Chinese hacker group known as Storm-1175 is exploiting a mix of zero-day and N-day vulnerabilities to launch rapid attacks, specifically using Medusa ransomware. These attacks target internet-facing systems that are vulnerable, allowing the group to infiltrate networks quickly. Their ability to identify exposed assets has led to successful breaches, raising concerns for organizations that may not have adequate defenses in place. As these vulnerabilities are actively exploited, it becomes crucial for companies to strengthen their cybersecurity measures. The situation underscores the need for vigilance and timely patching of known vulnerabilities to prevent ransomware infections.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Wynn Resorts has reported that around 21,000 employees have been impacted by a cyberattack linked to the ShinyHunters hacking group. The breach reportedly involved sensitive employee data, and there are indications that the company may have paid a ransom to prevent the information from being leaked. This incident raises significant concerns about data security in the hospitality industry, especially as personal information becomes more vulnerable to cybercriminals. The fact that such a large number of employees are affected highlights the scale of the attack and the potential risks associated with inadequate cybersecurity measures. As companies like Wynn Resorts face increasing threats from hackers, it becomes critical for them to enhance their security protocols to protect sensitive information.
The Hacker News
Researchers from VulnCheck have discovered that attackers are actively exploiting a severe vulnerability in Flowise, an open-source AI platform. The flaw, identified as CVE-2025-59528, has a maximum CVSS score of 10.0 and allows for remote code execution through a code injection vulnerability in the CustomMCP node. This means that unauthorized users could potentially execute commands on affected systems. Over 12,000 instances of Flowise are exposed, raising significant concerns for users and organizations relying on this platform. It's crucial for those affected to take immediate action to secure their systems against this vulnerability.
SCM feed for Latest
The Patriot Regional Emergency Communications Center in Massachusetts reported a cyberattack that affected its emergency notification system, CodeRED. This incident disrupted phone lines and systems in several towns across the northern part of the state, leading to concerns about public safety during the attack. Although specific details about the nature of the cyberattack have not been disclosed, the impact on emergency communications raises serious alarms about how such incidents can hinder timely responses in critical situations. The threat to emergency services underscores the vulnerabilities in infrastructure that communities rely on during crises and the need for robust cybersecurity measures to protect these essential systems.
The attack on the Axios NPM package highlights a growing trend where attackers are using social engineering tactics to compromise software maintainers. This incident is part of a broader pattern of targeted attacks aimed at popular open-source projects, which can have wide-ranging effects on developers and users who rely on these tools. By manipulating maintainers, attackers can introduce malicious code into legitimate packages, potentially affecting thousands of applications that use them. The Axios incident serves as a reminder for developers to be vigilant about the security of their dependencies and for users to verify the integrity of the packages they utilize. As these tactics become more sophisticated, both maintainers and users need to adopt better security practices to mitigate risks.
Recent research has identified serious vulnerabilities in Nvidia GPU-based devices, which are common in cloud computing environments. Three new Rowhammer attacks have been discovered that could allow attackers to completely take control of these systems. This is particularly concerning for organizations that rely on high-performance GPUs for various applications, as it raises the risk of unauthorized access and potential data breaches. The ability to exploit these vulnerabilities could have significant implications for cloud security, making it essential for companies to assess their defenses against such attacks. As these GPUs are widely used, the impact of this discovery could be extensive across many sectors relying on cloud services.
SCM feed for Latest
Over the past year, Russian cyberattacks targeting Ukraine have shown significant evolution, according to findings from Ukraine's Computer Emergency Response Team. These attacks have likely intensified as the conflict between the two nations continues. Ukrainian authorities have observed a range of tactics employed by Russian threat actors, indicating an adaptive approach to circumvent defenses. This ongoing campaign not only threatens Ukraine's critical infrastructure but also raises concerns for cybersecurity in other regions as similar tactics may be replicated elsewhere. The situation underscores the urgent need for vigilance and enhanced security measures among organizations in affected areas.
Fortinet has released an emergency patch for a serious authentication bypass vulnerability, identified as CVE-2026-35616. This flaw allows attackers to bypass authentication mechanisms, potentially granting unauthorized access to systems using FortiClient. The vulnerability is part of a troubling trend, as it has been exploited in the wild, meaning that it poses an immediate risk to users. Organizations that rely on Fortinet's products should prioritize applying this patch to protect their networks from potential breaches. This incident underscores the importance of timely updates and vigilance in cybersecurity practices.
Security Affairs
Hackers linked to North Korea are targeting South Korean organizations through a new cyberattack method that uses GitHub as a command and control (C2) server. The attacks begin with phishing emails that contain obfuscated LNK files. When opened, these files drop a decoy PDF and a PowerShell script onto the victim's system. This tactic allows the attackers to bypass traditional security measures by using a widely trusted platform like GitHub. The implications are significant as this method not only demonstrates the evolving strategies of DPRK hackers but also poses serious risks to organizations in South Korea, which must now be wary of both phishing attempts and the potential for data breaches.
Bryan Fleming, the creator of the stalkerware application pcTattleTale, has been sentenced without prison time after pleading guilty to charges related to his software. Instead, he will face a fine and a period of supervised release. This case is notable as it represents one of the few successful prosecutions related to stalkerware in the United States, which is software designed to secretly monitor individuals without their consent. The implications of this case extend beyond Fleming, as it raises awareness about the legal ramifications for those who develop and distribute such invasive technologies. Users should be aware of the potential risks associated with stalkerware and the importance of privacy in the digital age.
Hackread – Cybersecurity News, Data Breaches, AI and More
A new phishing scam is exploiting the ongoing conflict between Iran, the US, and Israel by sending out fake missile alerts to trick users into revealing their Microsoft login credentials. Attackers are using QR codes and counterfeit government emails to lure victims. This tactic is particularly concerning as it preys on the heightened anxiety surrounding geopolitical tensions, making users more susceptible to clicking on malicious links. The scam underscores the importance of vigilance regarding unsolicited communications, especially during times of crisis. Users are advised to verify the authenticity of any alerts before taking action, particularly those requesting sensitive information.
BleepingComputer
The Drift Protocol recently suffered a massive hack, losing over $280 million in cryptocurrency. Investigations revealed that the attackers had been planning this operation for six months, establishing a presence within the Drift ecosystem to facilitate the theft. This sophisticated approach allowed them to bypass security measures and execute their plan effectively. The incident raises significant concerns about the security of decentralized finance platforms, as it shows that even well-established protocols can be vulnerable to prolonged and coordinated attacks. Users and investors should be aware of these risks as they engage with cryptocurrency platforms.
Researchers at Google DeepMind have identified six types of web-based attacks that can target autonomous AI agents. These attacks exploit malicious web content to manipulate AI behavior, potentially leading to harmful consequences. The study emphasizes how AI agents, which increasingly navigate the internet autonomously, can be misled by deceptive information, resulting in unexpected actions. This research highlights the need for stronger security measures to protect AI systems from manipulation. As AI continues to be integrated into various applications, understanding these vulnerabilities is crucial for developers and organizations relying on AI technology.
A new threat group known as UAT-10608 is targeting Next.js applications that are exposed on the web. They are using an automated tool to steal sensitive information such as user credentials and system secrets. This attack can affect any organization using vulnerable Next.js apps, potentially leading to significant data breaches and unauthorized access to systems. It's crucial for companies to assess their web applications for vulnerabilities, especially those related to the React2Shell flaw, to prevent such automated credential harvesting campaigns. The ongoing exploitation of this vulnerability emphasizes the need for timely security updates and monitoring of web applications.
SCM feed for Latest
The article discusses the risks associated with MCP (Multi-Channel Protocol), emphasizing that the main issue isn't technical flaws but rather a lack of identity verification in AI systems. This absence of identifiable actions makes it difficult to trace back AI decisions, raising concerns about accountability and transparency. As AI systems become more integrated into various applications, the implications of untraceable actions could lead to significant security and ethical challenges. Users, developers, and organizations relying on AI need to address these identity issues to ensure responsible use and mitigate potential risks. Without proper identification mechanisms, the trustworthiness of AI systems could be severely compromised, affecting a wide range of industries.