Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A new banking malware known as VENON has been discovered, targeting 33 banks in Brazil. This malware is notable for being written in Rust, which differentiates it from other prevalent malware in the region that typically uses Delphi. It specifically aims to steal user credentials by infecting Windows systems. Researchers first identified VENON last month, raising concerns about its potential impact on Brazilian banking customers. This malware represents an evolving threat in the Latin American cybercrime landscape, and users should be vigilant about their online security.

Impact: 33 Brazilian banks, Windows systems
Remediation: Users should ensure their antivirus software is up to date and be cautious when entering personal information online.
Read Original
Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Scammers are exploiting security features from Cloudflare to mask fraudulent Microsoft 365 login pages, making it harder for users to identify phishing attempts. This tactic allows attackers to evade detection by antivirus software and security systems, putting sensitive information at risk. Users of Microsoft 365 should be particularly cautious, as these phishing pages can look very convincing and lead to credential theft. The situation emphasizes the need for individuals and organizations to remain vigilant about email security and to double-check URLs before entering personal information. Cybersecurity experts are urging users to enable multi-factor authentication to add an extra layer of protection against such scams.

Impact: Microsoft 365 users, Cloudflare security tools
Remediation: Enable multi-factor authentication, verify URLs before entering credentials, educate users about phishing tactics.
Read Original

Veeam Software has issued patches for serious vulnerabilities in its Backup & Replication solution, including four critical remote code execution (RCE) flaws. These vulnerabilities could allow attackers to execute malicious code on affected backup servers, potentially leading to data breaches or system takeovers. Organizations using Veeam's software should prioritize applying these patches to safeguard their systems. The risks are particularly concerning for companies that rely on Veeam for data protection, as failing to address these vulnerabilities could leave sensitive data exposed. This incident serves as a reminder for all users of backup solutions to stay vigilant and ensure their software is up to date.

Impact: Veeam Backup & Replication solution
Remediation: Users should apply the latest patches provided by Veeam to address the vulnerabilities.
Read Original

Authorities have dismantled a global proxy network known as SocksEscort, which had compromised routers and Internet of Things (IoT) devices across 163 countries. This botnet reportedly affected around 369,000 victims and generated approximately $5.8 million in revenue for its cybercriminal operators. The operation's scale demonstrates how widespread such threats can be, as compromised devices can facilitate various cybercrimes, including unauthorized access and data theft. The takedown is a significant step in combating the growing issue of botnets, which can put both individuals and organizations at risk. Users are advised to secure their devices and ensure they are not part of such networks.

Impact: Routers, IoT devices
Remediation: Users should secure their routers and IoT devices by changing default passwords, applying firmware updates, and disabling unnecessary services.
Read Original

Stryker, a medical technology company, recently faced a cyberattack attributed to Iranian hackers, exposing vulnerabilities in its disaster recovery and business continuity plans. The attack serves as a wake-up call for companies in the healthcare sector, which are often not prepared for such sophisticated threats. Affected systems may include Stryker's medical devices and software used in hospitals. This incident underlines the need for organizations to reassess their cybersecurity measures to better protect sensitive medical data and ensure operational resilience. As cyber threats evolve, maintaining robust security protocols is essential to avoid disruptions that can impact patient care.

Impact: Stryker's medical devices and software systems
Remediation: Companies should enhance their cybersecurity training and update their disaster recovery plans to address evolving threats.
Read Original

U.S. and European law enforcement, in collaboration with private partners, have successfully disrupted the SocksEscort proxy network, which was powered by malware called AVRecon targeting Linux devices. This network primarily compromised edge devices, turning them into proxies for cybercriminal activities. The operation is significant as it demonstrates international cooperation in combating cybercrime and highlights the ongoing threat posed by malware that targets Linux systems. The disruption of SocksEscort is expected to hinder the operations of those using the network for illegal purposes, ultimately making it harder for them to execute attacks or conduct illicit activities online. This incident serves as a reminder for organizations to bolster their defenses against malware that can exploit even lesser-known platforms like Linux.

Impact: Linux devices compromised by AVRecon malware
Remediation: Organizations should implement security measures to detect and remove AVRecon malware from their systems, regularly update software, and monitor network traffic for unusual activity.
Read Original

Cybersecurity officials expressed concern about growing public indifference towards the Salt Typhoon hacking group, which is known for targeting telecommunications. They believe that this apathy is undermining efforts to implement stricter security regulations in the telecom sector. The group has been linked to various cyber attacks that could compromise sensitive data and disrupt services. Officials are urging the public and industry stakeholders to recognize the seriousness of the threat posed by these hackers. Without heightened awareness and action, they fear that vital security measures may not be adopted, leaving the telecom infrastructure vulnerable to future attacks.

Impact: Telecommunications infrastructure, sensitive customer data
Remediation: Encouraging public awareness and support for tougher telecom security regulations
Read Original

In 2025, Google awarded over $17 million to 747 security researchers through its Vulnerability Reward Program (VRP) for reporting various security vulnerabilities. This initiative not only incentivizes researchers to identify and report bugs but also strengthens the overall security of Google's products and services. By paying for these reports, Google is actively encouraging contributions from the security community, which helps mitigate potential threats before they can be exploited. This program is essential for maintaining user trust and safeguarding sensitive information across the company's platforms. The financial commitment reflects the increasing importance of cybersecurity in the tech industry.

Impact: Google products and services
Remediation: N/A
Read Original

A criminal group operating an online fraud scheme in Germany has been dismantled, resulting in the arrest of three suspects. The operation, coordinated by Eurojust, took place on March 10, where authorities from Germany and France collaborated to apprehend the suspects. The main suspect, who was located in France, is currently in custody awaiting a court decision on whether he will be extradited to Germany. This fraud scheme is believed to have scammed victims out of approximately €1 million, raising concerns about the effectiveness of online security measures and the need for increased vigilance among internet users. The case underscores the ongoing threat of online scams and the importance of international cooperation in tackling cybercrime.

Impact: Online users in Germany and France, victims of the fraud scheme
Remediation: Increased awareness and vigilance among online users; cooperation between international law enforcement agencies
Read Original

Angelo Martino, a former negotiator for DigitalMint, is accused of running ransomware attacks while simultaneously negotiating on behalf of his employer. The U.S. government claims he extorted around $75 million through these actions, effectively playing both sides of the fence. This case raises serious concerns about insider threats within organizations that deal with cryptocurrency, as it highlights the potential for employees to exploit their positions for personal gain. The implications are significant, as it calls into question the security measures companies have in place to protect against such dual-role employees. The incident also emphasizes the ongoing challenges in combating ransomware, particularly when insiders are involved.

Impact: DigitalMint, cryptocurrency negotiation services
Remediation: Companies should enhance their internal security protocols, conduct thorough background checks on employees, and implement strict separation of duties to prevent insider threats.
Read Original

A serious SQL injection vulnerability (CVE-2026-2413) has been discovered in the Ally plugin for WordPress, which is currently used on over 400,000 websites. This flaw allows attackers to exploit the plugin without needing any authentication, potentially enabling them to access and steal sensitive data from affected sites. The vulnerability has a CVSS score of 7.5, indicating a high severity level. Security researchers at Acquia, including Drew Webber, identified this issue, raising concerns for site administrators who may not be aware of the risks. It's crucial for users of the Ally plugin to take immediate action to protect their sites from potential attacks.

Impact: Ally WordPress plugin (CVE-2026-2413), affecting over 400,000 WordPress sites.
Remediation: Website administrators should update the Ally plugin to the latest version as soon as a patch is released. In the meantime, users should consider disabling the plugin until a fix is applied to mitigate the risk of exploitation.
Read Original

Meta has taken significant action against scam operations by disabling over 150,000 accounts linked to scam centers in Asia. This initiative is part of a broader effort to combat online fraud, which has increasingly targeted users on social media platforms. By disrupting these centers, Meta aims to protect its users from scams that can lead to financial loss and identity theft. The company also launched new protection tools to enhance user safety and prevent future scams. This response reflects the growing challenge of online scams and the need for tech companies to actively safeguard their platforms.

Impact: Meta accounts, social media platforms
Remediation: New protection tools launched by Meta to enhance user safety
Read Original

This week's security bulletin covers several emerging threats that could impact users and organizations. A new OAuth vulnerability has been identified, which could allow attackers to hijack user sessions without their knowledge. Additionally, researchers have discovered a new phishing scheme targeting Signal users, which exploits the app's encryption features to trick individuals into revealing sensitive information. Another threat involves a technique dubbed 'Zombie ZIP,' where attackers use ZIP files to bypass security measures. Finally, an AI platform has been hacked, raising concerns about the security of machine learning systems. These incidents underline the need for vigilance and updated security practices to protect against evolving attack methods.

Impact: OAuth, Signal, ZIP file systems, AI platforms
Remediation: Users should update their applications and be cautious of suspicious links or requests for personal information. Organizations are advised to review their OAuth configurations and implement additional security measures for user authentication.
Read Original

A vulnerability in the Ally WordPress plugin has exposed over 200,000 websites to potential attacks. This flaw allows attackers to inject SQL queries, which can lead to unauthorized access and extraction of sensitive information from the website's database. The vulnerability is particularly concerning for site owners who rely on the plugin for various functionalities. Users are urged to take immediate action to secure their sites to prevent possible data breaches. Website administrators should monitor their systems closely and apply any available patches as soon as possible to mitigate the risk.

Impact: Ally WordPress Plugin, affecting over 200,000 websites.
Remediation: Users should update the Ally plugin to the latest version as soon as a patch is released to address this vulnerability.
Read Original

Splunk and Zoom recently addressed serious vulnerabilities in their software that could allow attackers to execute arbitrary shell commands or gain elevated privileges. These flaws are categorized as critical and high-severity, posing significant risks to users and organizations using these platforms. The vulnerabilities could potentially enable unauthorized access and control over systems, which is particularly concerning for businesses that rely on these tools for communication and data analysis. Users are urged to update their software immediately to mitigate these risks. Both companies have released patches to fix the issues, and it’s crucial for affected users to implement these updates as soon as possible.

Impact: Splunk software, Zoom application
Remediation: Patches released by Splunk and Zoom; users should update their software immediately.
Read Original
Page 1 of 109Next