Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The WorldLeaks ransomware group has launched attacks against the City of Los Angeles, specifically targeting its Metro system, which resulted in a significant system shutdown. This breach forced the Metro to halt operations temporarily, disrupting public transit services. In addition to Los Angeles, two cities in the Bay Area have declared emergencies due to similar ransomware incidents. These attacks are part of a growing trend in which local governments and essential services are increasingly becoming targets for cybercriminals, raising concerns about the security of public infrastructure and the potential for widespread disruption. The implications of such breaches are serious, as they can hinder public safety and essential services.

Impact: Los Angeles Metro system
Remediation: N/A
Read Original

The Trivy vulnerability scanner was recently compromised in a supply-chain attack orchestrated by a group known as TeamPCP. This attack involved the distribution of credential-stealing malware through official releases and GitHub Actions, which are automated workflows for software development. As a result, users who downloaded the compromised versions of Trivy may have inadvertently installed malware that could steal sensitive information. This incident raises significant concerns about the security of software supply chains and the potential for attackers to exploit trusted platforms to distribute malicious code. Organizations that rely on Trivy for vulnerability scanning need to be aware of this breach and take appropriate measures to safeguard their systems.

Impact: Trivy vulnerability scanner, GitHub Actions
Remediation: Users are advised to check for the latest versions of Trivy, review their systems for any unauthorized access, and consider implementing additional security measures to protect sensitive data.
Read Original

A recent vulnerability identified as CVE-2025-32975 may have been exploited in attacks targeting the education sector. This flaw affects Critical Quest's KACE systems, which are commonly used for IT management and endpoint security. The potential exploitation raises concerns about the security of sensitive data within educational institutions. As attackers increasingly focus on this sector, it is crucial for organizations to assess their systems and ensure they are protected against such vulnerabilities. Institutions that use KACE products should be particularly vigilant and consider implementing protective measures immediately.

Impact: Critical Quest KACE systems
Remediation: Organizations using KACE systems should immediately apply any available security patches from Critical Quest, review their security configurations, and monitor for unusual activity. Regular updates and vulnerability assessments are recommended to mitigate risks.
Read Original

A newly discovered vulnerability, identified as CVE-2026-33017, poses a serious risk by allowing unauthenticated attackers to run arbitrary Python code on vulnerable servers. This flaw was reportedly exploited within 20 hours of its disclosure, raising concerns among cybersecurity experts. Organizations that use systems affected by this vulnerability need to act swiftly to secure their environments. The ability for attackers to execute arbitrary code can lead to severe data breaches and system compromises, making it crucial for affected users to understand their risk and take appropriate measures. As of now, details on specific systems or versions impacted have not been disclosed, leaving many organizations potentially vulnerable.

Impact: N/A
Remediation: Organizations should apply security patches as soon as they become available, monitor for unusual activity, and review their systems for any signs of exploitation. Regular updates and code audits may also help mitigate risks associated with this vulnerability.
Read Original

A recent report from SpyCloud reveals a significant rise in the exposure of non-human identities, specifically API keys and tokens, which reached 18.1 million in 2025. This surge increases the risk for organizations as these exposed credentials can be exploited by attackers to gain unauthorized access to systems. The findings emphasize the need for companies to enhance their security measures around API usage and management, as these keys are often overlooked in traditional security protocols. The report serves as a crucial reminder for businesses to audit their API security practices and monitor for any potential breaches or misuse. Failure to address these vulnerabilities could lead to severe data breaches and operational disruptions.

Impact: API keys, tokens
Remediation: Companies should implement stricter API key management practices, including regular audits and rotation of keys, to mitigate the risk of exposure.
Read Original

Google has decided to reverse its plan to require Android developers to link their apps to verified developer accounts, a move that had sparked significant backlash from users. The original requirement, which was set to take effect in September 2026, involved a $25 fee and the submission of personal identification for verification. Many users expressed concerns over privacy and accessibility, arguing that the new rule could limit the diversity of apps available on the platform. By stepping back from this policy, Google aims to maintain a more open app ecosystem while addressing user concerns about potential barriers to entry for developers. This decision reflects the ongoing tension between security measures and user freedom in the app development landscape.

Impact: Android apps on certified devices
Remediation: N/A
Read Original

Ubiquiti has released patches to address a critical vulnerability in its UniFi Network application, specifically affecting versions 10.1.85 and earlier. The vulnerability, tracked as CVE-2026-22557, poses significant risks to users who have not yet updated their software. This flaw could potentially allow attackers to exploit the system, compromising network security. Users of the affected versions are strongly advised to update to the latest version to safeguard their networks. The urgency of this patch highlights the ongoing need for regular software updates to protect against evolving threats.

Impact: UniFi Network application versions 10.1.85 and earlier.
Remediation: Users should update their UniFi Network application to the latest version to mitigate the vulnerability. Specific patch details are not provided, but upgrading to the most recent version is crucial.
Read Original

A French naval officer, known only as Arthur, inadvertently revealed the location of the Charles de Gaulle aircraft carrier by using a smartwatch to track his running activity on the ship's deck. The data, which was uploaded to the fitness app Strava, included precise geolocation details. This incident raises concerns about operational security, especially as the carrier was in a sensitive area. The exposure of such information could potentially aid adversaries in tracking naval movements or planning attacks. The incident serves as a reminder for military personnel to be cautious about sharing location data online, even in seemingly harmless contexts.

Impact: Charles de Gaulle aircraft carrier
Remediation: Military personnel should refrain from using fitness tracking devices that share location data in sensitive areas.
Read Original

Researchers have discovered a malicious extension posing as a legitimate tool for the R programming language, named 'reditorsupporter.r-vscode-2.8.8-universal'. This extension mimics a popular add-on for Visual Studio Code and serves as a conduit for attackers to control infected systems via the Solana blockchain. Developers who unknowingly install this fake extension could have their systems compromised, leading to potential data theft or unauthorized access. The incident raises concerns about the security of development tools and the need for vigilance among developers when installing third-party extensions. Users should be cautious and verify the authenticity of any extensions they choose to install.

Impact: Visual Studio Code, R programming language extensions
Remediation: Users should avoid installing unverified extensions and verify the source of any tools before downloading.
Read Original

The FBI and CISA have issued a public service announcement regarding a Russian intelligence campaign aimed at users of messaging apps, particularly Signal. This warning aligns with previous alerts from authorities in the Netherlands and Germany, highlighting a growing concern about the targeting of secure communication platforms. The campaign suggests that attackers are attempting to compromise the privacy and security of individuals who rely on these apps for confidential conversations. This situation is particularly alarming as it raises questions about the safety of messaging services that users often consider secure. People using these apps should remain vigilant and consider enhancing their security measures to protect their communications.

Impact: Signal and potentially other messaging apps
Remediation: Users should enhance their security measures and stay informed about potential vulnerabilities in messaging apps.
Read Original

Oracle has announced a critical vulnerability in its Fusion Middleware that allows attackers to execute arbitrary code without needing authentication. This flaw affects Oracle's Identity and Web Services Managers, particularly if they are exposed to the internet. The lack of authentication means that anyone can potentially exploit this vulnerability, making it especially dangerous for organizations that have these services publicly accessible. Companies using these products should take immediate action to secure their systems to prevent unauthorized access and potential data breaches. It's crucial for users to apply the necessary patches as soon as possible to mitigate the risks associated with this flaw.

Impact: Oracle Fusion Middleware, Oracle Identity Manager, Oracle Web Services Manager
Remediation: Users should apply the latest patches provided by Oracle to secure their systems against this vulnerability.
Read Original

Artificial intelligence is increasingly becoming a key player in cyber warfare, making attacks faster and more sophisticated. Cybercriminals are utilizing AI to automate their strategies, leading to a rise in the frequency and effectiveness of cyber attacks. This evolution poses a significant risk not only to businesses but also to national security, as the technology can be used for espionage and disruptive activities. As AI tools become more accessible, organizations will need to enhance their defenses to counter these advanced threats. The implications of this shift are far-reaching, affecting everything from individual privacy to international relations.

Impact: N/A
Remediation: Organizations should improve security protocols and invest in AI-driven defense mechanisms.
Read Original

Navia Benefit Solutions has reported a significant data breach that has affected approximately 2.7 million individuals. The breach occurred over a period from December 2025 to January 2026, with suspicious activity first detected on January 23, 2026. In response, Navia quickly initiated an investigation to understand the full scope of the incident. The company, which provides benefits solutions in the U.S., has not yet disclosed specific details about the types of data that were compromised. This breach raises serious concerns about the security of personal information in the benefits sector, especially given the large number of individuals impacted. Those affected may face risks such as identity theft or phishing attacks as a result of their information being exposed.

Impact: Navia Benefit Solutions customer data, personal information of individuals
Remediation: N/A
Read Original

Oracle has issued an emergency security update to address a serious vulnerability in its Identity Manager and Web Services Manager products, identified as CVE-2026-21992. This flaw allows attackers to execute remote code without needing any authentication, which poses a significant risk to organizations using these systems. The vulnerability could potentially be exploited to gain unauthorized access and control over sensitive information. Users of Oracle's Identity Manager and Web Services Manager should prioritize applying the update to protect their systems from potential attacks. This incident underscores the ongoing need for vigilance in software security, particularly with products that manage identity and access controls.

Impact: Oracle Identity Manager, Oracle Web Services Manager
Remediation: Oracle has released an out-of-band security update to address CVE-2026-21992. Users are advised to apply the latest patches immediately to mitigate this vulnerability.
Read Original

Three men have been sentenced for their roles in a scheme that funneled approximately $1.28 million in salaries from U.S. companies to North Korean IT workers. The trio operated from their homes, setting up laptop farms and assisting remote workers in creating fake identities to secure jobs. This operation not only defrauded companies but also contributed to North Korea's illicit activities by providing the regime with foreign currency. The case highlights ongoing concerns about cybercrime linked to North Korea and the challenges companies face in verifying the identities of remote workers. As cyber threats evolve, organizations must remain vigilant in their hiring practices to avoid falling victim to similar scams.

Impact: U.S. companies hiring remote IT workers
Remediation: Companies should implement stricter identity verification processes and conduct thorough background checks for remote employees.
Read Original
Page 1 of 121Next