SolarWinds has addressed four critical vulnerabilities found in their Web Help Desk software that could allow attackers to execute code remotely or bypass authentication. These flaws can be exploited without requiring any user credentials, posing a serious risk to organizations using the software. Companies that rely on Web Help Desk should prioritize applying the latest patches to protect their systems from potential attacks. The vulnerabilities were disclosed recently, making immediate action essential to prevent exploitation. Users and administrators are urged to check for updates and ensure their installations are secure.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Infosecurity Magazine
According to researchers from ReliaQuest, the number of ransomware victims increased significantly in the fourth quarter of 2025, even though there were fewer active extortion groups at that time. The report indicates that data leaks also saw a dramatic rise of 50%. This situation suggests that while the number of groups engaging in ransomware attacks has decreased, the effectiveness and impact of those that remain have intensified. Companies and organizations need to be vigilant and enhance their cybersecurity measures, as the rise in victims and data leaks indicates that attackers are still finding ways to exploit vulnerabilities. This trend raises concerns about the overall security posture of businesses and the potential exposure of sensitive information.
Infosecurity Magazine
According to the Identity Theft Resource Center (ITRC), the number of data breaches in the United States rose by 5% in 2025, reaching a record high. Despite this increase in the number of breaches, the number of individuals affected has actually declined. This trend suggests that while more organizations are experiencing breaches, the scale of these incidents may be smaller or that data protection measures are improving in some sectors. The findings underscore the ongoing challenges in cybersecurity, as organizations continue to face threats that put sensitive information at risk. Understanding these dynamics is crucial for businesses and individuals alike, as they navigate the evolving landscape of data security.
Google, in collaboration with other partners, has successfully disrupted IPIDEA, one of the largest residential proxy networks globally. This action involved legal measures to shut down multiple domains that facilitated the control of devices and the routing of proxy traffic. As a result, the IPIDEA website is currently inaccessible, signaling a significant blow to the operations of this network. The disruption of IPIDEA is important because residential proxy networks can be exploited for various malicious activities, including data scraping and evading detection in cyberattacks. This move highlights ongoing efforts to combat such networks that can compromise user privacy and security.
Help Net Security
ESET researchers have uncovered a spyware campaign targeting individuals in Pakistan that employs romance scam tactics. This operation uses a malicious app masquerading as a chat service, which facilitates conversations through WhatsApp but primarily serves to steal data from infected devices. The malware is identified as GhostChat, and it appears to be part of a larger surveillance effort by the same threat actor. This incident is particularly concerning as it exploits personal relationships and trust, potentially affecting many unsuspecting users who are seeking companionship online. The implications of such spyware are significant, as it not only compromises personal data but also raises issues of privacy and security in digital communications.
SCM feed for Latest
The U.S. Justice Department has charged 31 individuals connected to a widespread ATM jackpotting scheme that exploited Ploutus malware to steal cash from ATMs nationwide. This malware allows attackers to manipulate ATM systems, enabling them to dispense large amounts of cash illegally. The recent indictments are part of ongoing efforts to combat this type of cybercrime, which poses significant risks to financial institutions and the security of ATM networks. With these arrests, authorities aim to disrupt the operations of organized criminal groups involved in such schemes. This incident serves as a reminder for banks and ATM operators to enhance their security measures against sophisticated cyber threats.
SCM feed for Latest
A report from Trellix reveals that healthcare cyberattacks are becoming a significant safety issue, with over 54.7 million detections reported in 2025. Email is identified as the main attack vector, accounting for 85% of these incidents, and the United States is the most targeted nation, representing 75% of the detections. This alarming trend shows how vulnerable healthcare systems are to cyber threats, which can compromise patient safety and data integrity. With the increasing reliance on digital communication in healthcare, organizations need to bolster their security measures to protect sensitive information and ensure operational continuity. The findings call for urgent attention from healthcare providers to strengthen their defenses against these persistent cyber threats.
SCM feed for Latest
Spain's High Court has ended its investigation into the alleged use of NSO Group's Pegasus spyware against high-ranking officials, including Prime Minister Pedro Sánchez and Defense Minister Margarita Robles. The court cited a persistent lack of cooperation from Israeli authorities as a significant barrier to the investigation. This probe was initiated after reports surfaced of the spyware being used to monitor the communications of key political figures. The closure of the investigation raises concerns about accountability and transparency regarding the use of such surveillance tools, especially given the potential implications for privacy and civil liberties. The situation highlights ongoing tensions between governments and private surveillance companies.
As ransomware attacks become more aggressive, Chief Information Security Officers (CISOs) are urged to shift their focus towards enhancing business resilience. This includes taking immediate action to patch vulnerabilities, increasing user education to prevent successful phishing attempts, and implementing multi-factor authentication to secure access points. The rise in violent tactics used by attackers signals a need for companies to rethink their cybersecurity strategies and prioritize defense measures that can minimize disruptions. By proactively addressing these areas, organizations can better protect their assets and ensure continuity in the face of potential ransomware threats.
A vulnerability in WinRAR, a popular file compression software, is being exploited by Russian and Chinese nation-state attackers, even though a patch was released last July to fix the issue. This flaw poses a significant risk, particularly to small and medium-sized businesses (SMBs), which may not have updated their software or may be unaware of the vulnerability. The fact that this exploitation is ongoing months after the patch was issued raises concerns about the security practices of many organizations. Companies using affected versions of WinRAR need to take immediate action to protect themselves from potential breaches. Staying updated with software patches is crucial, especially when attackers are targeting known vulnerabilities.
BleepingComputer
In late December, Poland's energy grid experienced a coordinated cyberattack that affected around 30 facilities nationwide. The attackers targeted various distributed energy resources, including combined heat and power plants, as well as wind and solar energy systems. This incident raises concerns about the security of critical infrastructure, as energy systems are essential for everyday life and economic stability. The attack not only disrupted operations but also highlighted vulnerabilities in the energy sector that could be exploited in the future. Authorities are likely to investigate the incident further to bolster defenses against potential future threats.
A class action lawsuit has been filed against xAI, the company behind the Grok deepfake technology, by individuals whose images were used to create non-consensual sexual content. The lawsuit claims that xAI is exploiting a growing demand for humiliating deepfake images, which raises significant ethical and legal concerns. The plaintiffs argue that their rights and privacy have been violated, as their likenesses were used without consent in a harmful manner. This incident highlights ongoing issues surrounding deepfake technology and the urgent need for better regulations to protect individuals from such abuses. The outcome of this lawsuit could set important precedents for how deepfake content is handled legally in the future.
Fortinet has confirmed a new zero-day vulnerability that is allowing attackers to exploit single sign-on (SSO) authentication for malicious logins. In response to the ongoing attacks, the company has temporarily disabled FortiCloud SSO authentication across all devices to mitigate the risk. This means that users relying on this feature for secure access may face disruptions while Fortinet works on a solution. The situation is particularly concerning as it puts sensitive information at risk and could lead to unauthorized access to critical systems. Companies using Fortinet products should monitor the situation closely and be prepared to implement any updates once they are released.
BleepingComputer
MicroWorld Technologies, the company behind the eScan antivirus software, has confirmed that one of its update servers was compromised. This breach allowed attackers to distribute a malicious update to a small number of eScan users earlier this month. The unauthorized update was later analyzed and flagged as harmful, raising concerns about the security of users' systems. Although the number of affected customers is limited, the incident underscores the risks associated with software updates and the potential for malicious actors to exploit vulnerabilities in update mechanisms. Users of eScan should remain vigilant and ensure their software is updated from legitimate sources to avoid such threats.
SCM feed for Latest
A new cyber threat known as the PeckBirdy framework has been linked to advanced persistent threats (APTs) associated with China. This framework is particularly targeting gambling and government entities, utilizing JScript and living-off-the-land binaries (LOLBins) to execute attacks across various environments. The implications of these attacks are significant, as they could compromise sensitive information and disrupt operations within the affected sectors. Organizations in the gambling and government sectors should be vigilant and strengthen their security measures to prevent potential breaches. Researchers are continuing to monitor the situation for further developments and potential mitigation strategies.