Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The report investigates the employment and recruitment practices on the dark web, highlighting a significant and concerning trend in illicit job postings. With over 2,000 job-related posts analyzed, the findings suggest a growing underground economy that poses serious implications for cybersecurity and law enforcement.

Impact: N/A
Remediation: N/A
Read Original

CTM360 has uncovered a global campaign, HackOnChat, that is hijacking WhatsApp accounts through deceptive authentication portals and social engineering tactics. This rapidly expanding threat poses a significant risk to users worldwide, as it exploits familiar web interfaces to compromise accounts.

Impact: WhatsApp
Remediation: Users should be cautious of suspicious links and authenticate directly through official WhatsApp channels. Regularly updating security settings and enabling two-factor authentication is recommended.
Read Original

The Sturnus Android banking trojan poses a significant threat by enabling credential theft and complete device takeover for financial fraud. Its unique capability to bypass encrypted messaging by capturing decrypted content directly from the device screen raises serious concerns about user privacy and security.

Impact: Android devices
Remediation: Users should ensure their devices are updated with the latest security patches, avoid downloading unverified apps, and consider using additional security measures such as two-factor authentication.
Read Original

Kaspersky GReAT experts have identified the Tsundere botnet, which utilizes Node.js-based bots to exploit web3 smart contracts. The campaign poses a significant cybersecurity threat as it spreads through MSI installers and PowerShell scripts, indicating a sophisticated method of propagation.

Impact: Node.js, web3 smart contracts, MSI installers, PowerShell scripts
Remediation: Implement security measures to monitor and restrict the use of MSI installers and PowerShell scripts. Regularly update and patch Node.js environments and web3 applications.
Read Original

Iran-linked hackers have been involved in cyber warfare to support real-world missile strikes, highlighting the dangerous convergence of cyber attacks and kinetic warfare. This trend indicates a growing need for new frameworks to address the evolving nature of warfare, as traditional boundaries between cyber and physical attacks become increasingly blurred.

Impact: N/A
Remediation: N/A
Read Original

The TamperedChef malware campaign exploits fake software installers to distribute JavaScript malware, enabling remote access and control of infected systems. This ongoing global threat poses significant risks to users who may unknowingly install these malicious applications.

Impact: N/A
Remediation: Users should avoid downloading software from unverified sources and ensure that their security software is up to date to detect and block malicious installations.
Read Original

Fortinet is facing significant challenges as a second zero-day vulnerability in its web application firewall (WAF) has been discovered and is under attack. This situation raises concerns about the vendor's disclosure practices and the overall security of their products.

Impact: Fortinet web application firewall (WAF) line
Remediation: N/A
Read Original

The article discusses the challenges faced by international corporations in navigating conflicting cyber laws from various countries, which can lead to fragmented systems that are more susceptible to cyber risks. This fragmentation poses significant security vulnerabilities for large organizations, highlighting the need for cohesive regulatory frameworks.

Impact: N/A
Remediation: N/A
Read Original

The NHS England Digital has issued a warning regarding a security vulnerability in 7-Zip, identified as CVE-2025-11001, which allows for remote code execution through symbolic links. Although no active exploitation has been observed, a public proof-of-concept exploit exists, raising concerns about potential future threats.

Impact: 7-Zip software, specifically versions affected by CVE-2025-11001.
Remediation: Users are advised to update to the latest version of 7-Zip to mitigate the risk associated with this vulnerability. Additionally, monitoring for any updates from the vendor regarding patches or security advisories is recommended.
Read Original

Cloudflare experienced a significant outage that was initially suspected to be a DDoS attack. However, it was later determined to be caused by an internal configuration error related to a routine change in permissions, leading to widespread software failure.

Impact: N/A
Remediation: Review and correct internal configuration changes and permissions settings to prevent similar issues.
Read Original

A new cyber campaign has emerged in Brazil, utilizing social engineering and WhatsApp hijacking to spread a banking trojan called Eternidade Stealer. This threat is significant due to its ability to dynamically retrieve command-and-control addresses, indicating a sophisticated level of exploitation targeting Brazilian users.

Impact: WhatsApp, Brazilian devices
Remediation: Users should be cautious of unsolicited messages and avoid clicking on suspicious links. Regularly update software and use security solutions that can detect and block such threats.
Read Original

The article highlights a serious vulnerability in railway braking systems that can be exploited using inexpensive materials and gadgets, posing a significant risk to safety. This tampering could lead to dangerous situations for train conductors and passengers alike.

Impact: Railway braking systems
Remediation: N/A
Read Original

Operation WrtHug has compromised tens of thousands of outdated ASUS routers globally, primarily affecting users in Taiwan, the U.S., and Russia. The severity of this campaign highlights the risks associated with using end-of-life devices, as they can be easily hijacked to form a large botnet.

Impact: ASUS routers, specifically those that are outdated or end-of-life (EoL)
Remediation: Users are advised to upgrade their routers to supported models and ensure that firmware is up to date to mitigate vulnerabilities.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has released a guide to help Internet Service Providers (ISPs) mitigate risks associated with Bulletproof Hosting (BPH) providers that facilitate cybercriminal activities like ransomware and phishing. The guide emphasizes the importance of collaboration and proactive measures to reduce the effectiveness of BPH infrastructure, which poses significant threats to critical systems and services.

Impact: Bulletproof Hosting providers, cybercriminal activities including ransomware, phishing, malware delivery, denial-of-service attacks.
Remediation: Curate malicious resource lists, implement filters to block malicious traffic, analyze network traffic for anomalies, use logging systems to track ASNs and IP addresses, share intelligence with public and private entities, notify customers about malicious resources, provide premade filters, set accountability standards, and vet customers to prevent BPH abuse.
Read Original
PreviousPage 100 of 101Next