Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A hacking campaign has been targeting GlobalProtect logins and scanning SonicWall APIs since December 2, 2025. The attack is significant due to its scale, involving over 7,000 IP addresses linked to a German hosting provider, indicating a coordinated effort that poses a serious threat to the security of affected systems.

Impact: Palo Alto GlobalProtect portals, SonicWall SonicOS API endpoints
Remediation: Organizations should implement strong authentication measures, monitor access logs for unusual login attempts, and ensure that their SonicWall APIs are properly secured and updated.
Read Original

Over 30 security vulnerabilities have been identified in AI-powered Integrated Development Environments (IDEs), collectively termed IDEsaster. These vulnerabilities combine prompt injection techniques with legitimate features, allowing for potential data exfiltration and remote code execution, posing significant risks to developers and organizations using these tools.

Impact: Various AI-powered Integrated Development Environments (IDEs), specific products not detailed.
Remediation: N/A
Read Original

This article discusses the cybersecurity risks associated with smart home devices and emphasizes the importance of minimizing entry points to enhance security. It highlights the growing concern over vulnerabilities in smart home technology and the potential for unauthorized access and attacks.

Impact: Smart home devices, IoT devices
Remediation: Implement strong passwords, regularly update device firmware, disable unused features, and use a separate network for smart devices.
Read Original

The article discusses a React vulnerability that has been reportedly exploited by attackers, leading to a debate among researchers about the existence of concrete evidence for these attacks. While some researchers claim to have seen proof of concepts demonstrating the exploit, others argue that there is insufficient evidence of actual attacks occurring, complicating the response efforts.

Impact: React framework, potentially affecting applications built with React.
Remediation: Update to the latest version of React as patches are likely to be released to address the vulnerability. Monitor for official guidance from React maintainers.
Read Original

Barts Health NHS Trust has reported a data breach involving the Clop ransomware group, which exploited a vulnerability in the Oracle E-business Suite software to steal files from their database. This incident highlights the ongoing risks associated with unpatched software vulnerabilities and the potential for significant data loss in healthcare organizations.

Impact: Oracle E-business Suite software
Remediation: Organizations should apply the latest security patches for Oracle E-business Suite and review their security protocols to prevent future breaches.
Read Original

A new zero-click attack has been identified that targets the Perplexity Comet browser, allowing malicious emails to delete all contents of a user's Google Drive. This technique exploits the automation capabilities of the browser when connected to Gmail and Google Drive, posing a significant risk to users' data security.

Impact: Perplexity Comet browser, Google Drive, Gmail
Remediation: Users should be cautious about granting permissions to their browser for accessing email and cloud services. Regularly review connected apps and services, and consider disabling automation features until further guidance is provided.
Read Original

The FBI has issued a warning regarding virtual kidnapping scams where criminals manipulate social media images to create fake proof of life photos. This alarming tactic is used to extort money from victims' families, highlighting the need for increased awareness and caution regarding online content.

Impact: Social media platforms and users whose images are altered.
Remediation: Increase awareness of social media privacy settings, educate users on the risks of sharing personal images, and verify the authenticity of any unusual requests for money.
Read Original

A critical security vulnerability, CVE-2025-66516, has been identified in Apache Tika, posing a risk of XML external entity (XXE) injection attacks. With a CVSS score of 10.0, this flaw affects multiple modules and requires urgent attention from users to prevent exploitation.

Impact: Affected products include Apache Tika tika-core (versions 1.13-3.2.1), tika-pdf-module (versions 2.0.0-3.2.1), and tika-parsers (versions 1.13-1.28.5) across all platforms.
Remediation: Users are advised to apply the latest patches for the affected modules: tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1), and tika-parsers (1.13-1.28.5) to mitigate the vulnerability.
Read Original

The article highlights that manufacturers are increasingly becoming prime targets for cyberattacks in 2025 due to significant cybersecurity gaps and a shortage of expertise in the sector. This growing threat landscape poses serious risks to operational integrity and data security within manufacturing environments.

Impact: Manufacturers
Remediation: Implementing robust cybersecurity measures, enhancing staff training and expertise, and conducting regular security assessments.
Read Original

A critical vulnerability in the React JavaScript library is currently being targeted by threat actors linked to China, highlighting the urgency for developers to implement patches. The situation underscores the importance of immediate action to secure applications using this library from potential exploitation.

Impact: React JavaScript library
Remediation: Patch the React library to the latest version as soon as possible.
Read Original

The article discusses a critical vulnerability in React that has been exploited by various threat actors, leading to a significant outage at Cloudflare as they implemented mitigations against the React2Shell exploit. This incident highlights the ongoing risks associated with vulnerabilities in widely used frameworks and the need for timely responses to emerging threats.

Impact: React framework, Cloudflare services
Remediation: Organizations using React should immediately update to the latest version of the framework and implement security best practices to mitigate the risk of exploitation. Regularly review and apply security patches as they become available.
Read Original

The European Commission has imposed a €120 million ($140 million) fine on X for failing to meet transparency obligations under the Digital Services Act (DSA). This penalty highlights the regulatory scrutiny on tech companies regarding their compliance with digital transparency standards, emphasizing the importance of accountability in online platforms.

Impact: X
Remediation: N/A
Read Original

CrowdStrike has issued a warning about Warp Panda, a cyber-espionage group linked to China, which is actively targeting North American organizations to steal sensitive data. This campaign aims to advance Beijing's strategic interests, highlighting the ongoing threat posed by state-sponsored cyber activities.

Impact: North American firms, particularly in sectors with sensitive data.
Remediation: Organizations should enhance their cybersecurity measures, including implementing advanced threat detection systems, employee training on phishing attacks, and regular security audits.
Read Original

US organizations are being warned about the presence of Chinese malware, specifically BrickStorm, Junction, and GuestConduit, which are being used by the group Warp Panda for long-term persistence in attacks. This poses a significant cybersecurity threat as these malware types can enable attackers to maintain access to compromised systems over extended periods.

Impact: US organizations, systems targeted by Warp Panda's malware.
Remediation: Organizations are advised to implement robust cybersecurity measures, including regular software updates, network monitoring, and incident response strategies to detect and mitigate the effects of these malware types. Specific patches or updates were not mentioned.
Read Original

Cloudflare has reported an outage due to the emergency patching of a critical React remote code execution vulnerability that is currently being exploited in attacks. This incident highlights the urgency and severity of addressing such vulnerabilities to maintain security and service continuity.

Impact: React framework versions vulnerable to remote code execution, impacting applications built using React.
Remediation: Apply the emergency patch provided by the React development team to mitigate the vulnerability. Ensure all applications using React are updated to the latest secure version as soon as possible.
Read Original
Page 1 of 21Next