Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

SolarWinds has addressed four critical vulnerabilities found in their Web Help Desk software that could allow attackers to execute code remotely or bypass authentication. These flaws can be exploited without requiring any user credentials, posing a serious risk to organizations using the software. Companies that rely on Web Help Desk should prioritize applying the latest patches to protect their systems from potential attacks. The vulnerabilities were disclosed recently, making immediate action essential to prevent exploitation. Users and administrators are urged to check for updates and ensure their installations are secure.

Impact: SolarWinds Web Help Desk software
Remediation: Users should apply the latest patches provided by SolarWinds for Web Help Desk.
Read Original

According to researchers from ReliaQuest, the number of ransomware victims increased significantly in the fourth quarter of 2025, even though there were fewer active extortion groups at that time. The report indicates that data leaks also saw a dramatic rise of 50%. This situation suggests that while the number of groups engaging in ransomware attacks has decreased, the effectiveness and impact of those that remain have intensified. Companies and organizations need to be vigilant and enhance their cybersecurity measures, as the rise in victims and data leaks indicates that attackers are still finding ways to exploit vulnerabilities. This trend raises concerns about the overall security posture of businesses and the potential exposure of sensitive information.

Impact: N/A
Remediation: Companies should enhance cybersecurity measures and consider implementing more robust data protection strategies.
Read Original

According to the Identity Theft Resource Center (ITRC), the number of data breaches in the United States rose by 5% in 2025, reaching a record high. Despite this increase in the number of breaches, the number of individuals affected has actually declined. This trend suggests that while more organizations are experiencing breaches, the scale of these incidents may be smaller or that data protection measures are improving in some sectors. The findings underscore the ongoing challenges in cybersecurity, as organizations continue to face threats that put sensitive information at risk. Understanding these dynamics is crucial for businesses and individuals alike, as they navigate the evolving landscape of data security.

Impact: N/A
Remediation: N/A
Read Original

Google, in collaboration with other partners, has successfully disrupted IPIDEA, one of the largest residential proxy networks globally. This action involved legal measures to shut down multiple domains that facilitated the control of devices and the routing of proxy traffic. As a result, the IPIDEA website is currently inaccessible, signaling a significant blow to the operations of this network. The disruption of IPIDEA is important because residential proxy networks can be exploited for various malicious activities, including data scraping and evading detection in cyberattacks. This move highlights ongoing efforts to combat such networks that can compromise user privacy and security.

Impact: Residential proxy networks, IPIDEA domains
Remediation: N/A
Read Original

ESET researchers have uncovered a spyware campaign targeting individuals in Pakistan that employs romance scam tactics. This operation uses a malicious app masquerading as a chat service, which facilitates conversations through WhatsApp but primarily serves to steal data from infected devices. The malware is identified as GhostChat, and it appears to be part of a larger surveillance effort by the same threat actor. This incident is particularly concerning as it exploits personal relationships and trust, potentially affecting many unsuspecting users who are seeking companionship online. The implications of such spyware are significant, as it not only compromises personal data but also raises issues of privacy and security in digital communications.

Impact: Android devices, GhostChat malware
Remediation: Users should avoid downloading apps from untrusted sources and be cautious of any application promising to facilitate communication with potential romantic partners. Regularly updating device software and using security solutions can also help mitigate risks.
Read Original
Actively Exploited

The U.S. Justice Department has charged 31 individuals connected to a widespread ATM jackpotting scheme that exploited Ploutus malware to steal cash from ATMs nationwide. This malware allows attackers to manipulate ATM systems, enabling them to dispense large amounts of cash illegally. The recent indictments are part of ongoing efforts to combat this type of cybercrime, which poses significant risks to financial institutions and the security of ATM networks. With these arrests, authorities aim to disrupt the operations of organized criminal groups involved in such schemes. This incident serves as a reminder for banks and ATM operators to enhance their security measures against sophisticated cyber threats.

Impact: ATMs, financial institutions
Remediation: Banks and ATM operators should enhance security protocols, including monitoring for unusual ATM activity and updating software to protect against malware.
Read Original
Actively Exploited

A report from Trellix reveals that healthcare cyberattacks are becoming a significant safety issue, with over 54.7 million detections reported in 2025. Email is identified as the main attack vector, accounting for 85% of these incidents, and the United States is the most targeted nation, representing 75% of the detections. This alarming trend shows how vulnerable healthcare systems are to cyber threats, which can compromise patient safety and data integrity. With the increasing reliance on digital communication in healthcare, organizations need to bolster their security measures to protect sensitive information and ensure operational continuity. The findings call for urgent attention from healthcare providers to strengthen their defenses against these persistent cyber threats.

Impact: Healthcare systems, email communication systems
Remediation: Organizations should enhance email security protocols, implement multi-factor authentication, and conduct regular security training for employees.
Read Original

Spain's High Court has ended its investigation into the alleged use of NSO Group's Pegasus spyware against high-ranking officials, including Prime Minister Pedro Sánchez and Defense Minister Margarita Robles. The court cited a persistent lack of cooperation from Israeli authorities as a significant barrier to the investigation. This probe was initiated after reports surfaced of the spyware being used to monitor the communications of key political figures. The closure of the investigation raises concerns about accountability and transparency regarding the use of such surveillance tools, especially given the potential implications for privacy and civil liberties. The situation highlights ongoing tensions between governments and private surveillance companies.

Impact: Pegasus spyware, NSO Group products
Remediation: N/A
Read Original

As ransomware attacks become more aggressive, Chief Information Security Officers (CISOs) are urged to shift their focus towards enhancing business resilience. This includes taking immediate action to patch vulnerabilities, increasing user education to prevent successful phishing attempts, and implementing multi-factor authentication to secure access points. The rise in violent tactics used by attackers signals a need for companies to rethink their cybersecurity strategies and prioritize defense measures that can minimize disruptions. By proactively addressing these areas, organizations can better protect their assets and ensure continuity in the face of potential ransomware threats.

Impact: N/A
Remediation: Promptly patch vulnerabilities, improve user education, deploy multi-factor authentication.
Read Original

A vulnerability in WinRAR, a popular file compression software, is being exploited by Russian and Chinese nation-state attackers, even though a patch was released last July to fix the issue. This flaw poses a significant risk, particularly to small and medium-sized businesses (SMBs), which may not have updated their software or may be unaware of the vulnerability. The fact that this exploitation is ongoing months after the patch was issued raises concerns about the security practices of many organizations. Companies using affected versions of WinRAR need to take immediate action to protect themselves from potential breaches. Staying updated with software patches is crucial, especially when attackers are targeting known vulnerabilities.

Impact: WinRAR versions prior to the patch released in July 2023
Remediation: Users should update to the latest version of WinRAR as per the July 2023 patch.
Read Original

In late December, Poland's energy grid experienced a coordinated cyberattack that affected around 30 facilities nationwide. The attackers targeted various distributed energy resources, including combined heat and power plants, as well as wind and solar energy systems. This incident raises concerns about the security of critical infrastructure, as energy systems are essential for everyday life and economic stability. The attack not only disrupted operations but also highlighted vulnerabilities in the energy sector that could be exploited in the future. Authorities are likely to investigate the incident further to bolster defenses against potential future threats.

Impact: Combined heat and power (CHP) facilities, wind and solar dispatch systems
Remediation: N/A
Read Original

A class action lawsuit has been filed against xAI, the company behind the Grok deepfake technology, by individuals whose images were used to create non-consensual sexual content. The lawsuit claims that xAI is exploiting a growing demand for humiliating deepfake images, which raises significant ethical and legal concerns. The plaintiffs argue that their rights and privacy have been violated, as their likenesses were used without consent in a harmful manner. This incident highlights ongoing issues surrounding deepfake technology and the urgent need for better regulations to protect individuals from such abuses. The outcome of this lawsuit could set important precedents for how deepfake content is handled legally in the future.

Impact: Grok deepfake technology from xAI
Remediation: N/A
Read Original

Fortinet has confirmed a new zero-day vulnerability that is allowing attackers to exploit single sign-on (SSO) authentication for malicious logins. In response to the ongoing attacks, the company has temporarily disabled FortiCloud SSO authentication across all devices to mitigate the risk. This means that users relying on this feature for secure access may face disruptions while Fortinet works on a solution. The situation is particularly concerning as it puts sensitive information at risk and could lead to unauthorized access to critical systems. Companies using Fortinet products should monitor the situation closely and be prepared to implement any updates once they are released.

Impact: FortiCloud SSO authentication
Remediation: Temporarily disabled FortiCloud SSO authentication for all devices
Read Original

MicroWorld Technologies, the company behind the eScan antivirus software, has confirmed that one of its update servers was compromised. This breach allowed attackers to distribute a malicious update to a small number of eScan users earlier this month. The unauthorized update was later analyzed and flagged as harmful, raising concerns about the security of users' systems. Although the number of affected customers is limited, the incident underscores the risks associated with software updates and the potential for malicious actors to exploit vulnerabilities in update mechanisms. Users of eScan should remain vigilant and ensure their software is updated from legitimate sources to avoid such threats.

Impact: eScan antivirus software
Remediation: Users are advised to ensure that software updates are obtained from trusted sources only.
Read Original

A new cyber threat known as the PeckBirdy framework has been linked to advanced persistent threats (APTs) associated with China. This framework is particularly targeting gambling and government entities, utilizing JScript and living-off-the-land binaries (LOLBins) to execute attacks across various environments. The implications of these attacks are significant, as they could compromise sensitive information and disrupt operations within the affected sectors. Organizations in the gambling and government sectors should be vigilant and strengthen their security measures to prevent potential breaches. Researchers are continuing to monitor the situation for further developments and potential mitigation strategies.

Impact: Gambling and government entities
Remediation: Organizations should enhance security protocols and monitor for unusual activity. Specific patches or updates were not mentioned.
Read Original
PreviousPage 10 of 87Next