Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A new espionage campaign has been detected, targeting Ukrainian entities and believed to be linked to Russian threat actors. This operation utilizes a backdoor known as DRILLAPP and exploits Microsoft Edge's debugging feature to remain stealthy. The campaign was first observed in February 2026 and shows similarities to a previous attack by a group known as Laundry Bear, which also focused on Ukrainian defense forces. This ongoing threat raises concerns about the security of sensitive information within Ukraine, especially as tensions in the region continue to escalate. Cybersecurity experts urge vigilance and prompt action to mitigate the risks posed by such sophisticated attacks.

Impact: Ukrainian defense forces, Microsoft Edge
Remediation: Users are advised to utilize security best practices, such as keeping software updated and monitoring for unusual activity, although specific patches or updates were not mentioned.
Read Original

Researchers from Qualys have discovered nine vulnerabilities in the Linux AppArmor module, collectively known as CrackArmor. These flaws, which have been present since 2017, allow unprivileged users to bypass security protections and potentially gain root access. This poses a significant risk, particularly for systems using containerization, as it could weaken the isolation between containers. Organizations using Linux systems with AppArmor should be aware of these vulnerabilities and take appropriate action to secure their environments. The discovery emphasizes the need for regular security assessments and timely patch management to mitigate such risks.

Impact: Linux systems utilizing AppArmor, particularly those using containerization technologies.
Remediation: Organizations should apply security patches as they become available and conduct security assessments to identify potential exposures related to these vulnerabilities.
Read Original

A recent data breach at Starbucks has compromised the personal information of 889 employees. The incident raises concerns about the security measures in place to protect sensitive employee data. Breaches like this can lead to identity theft and other privacy violations, making it crucial for organizations to strengthen their cybersecurity protocols. Additionally, attackers are increasingly targeting corporate environments, indicating a need for heightened vigilance among companies. As the investigation continues, affected employees should remain alert for any suspicious activity related to their personal information.

Impact: Starbucks employee data
Remediation: Companies should review their data protection measures and notify affected employees.
Read Original

China's National Computer Network Emergency Response Technical Team (CNCERT) has raised alarms about vulnerabilities in OpenClaw, an open-source AI agent. The platform, previously known as Clawdbot and Moltbot, has been found to have weak default security settings that could allow attackers to perform prompt injection attacks and exfiltrate sensitive data. This poses a significant risk for users who deploy the AI agent without proper security configurations. As OpenClaw is self-hosted, organizations need to be particularly vigilant about their security practices to prevent potential exploitation. The warning serves as a reminder of the importance of securing AI tools and ensuring that default settings do not leave systems vulnerable.

Impact: OpenClaw (formerly Clawdbot and Moltbot)
Remediation: Users should review and strengthen the default security configurations of OpenClaw to prevent vulnerabilities.
Read Original
ShinyHunters Claims 1 Petabyte Data Theft from Telecom Giant Telus

Hackread – Cybersecurity News, Data Breaches, AI and More

ShinyHunters, a known hacking group, has claimed responsibility for stealing up to 1 petabyte of data from Telus Digital, a major telecom provider. The stolen data reportedly includes sensitive materials such as customer support recordings, proprietary code, and employee records. This incident raises significant concerns about data security and privacy, as the breach could expose personal information of millions of customers and potentially lead to identity theft or other malicious activities. Telus, which serves millions in Canada, must now assess the extent of the damage and take steps to secure its systems against future attacks. The scale of this breach serves as a stark reminder of the vulnerabilities that exist within large organizations and the potential ramifications of such data theft.

Impact: Telus Digital's customer support recordings, proprietary code, employee records
Remediation: N/A
Read Original

A recent report from HoxHunt reveals a significant rise in AI-generated phishing attacks, which jumped from 4% to 56% of all phishing attempts in December. This surge coincided with the holiday season, a time when many people are more susceptible to scams due to increased online shopping and communication. These AI-driven phishing emails often appear more legitimate, making it harder for users to distinguish between real and fraudulent messages. As a result, both individuals and businesses are at higher risk of falling victim to these scams. Organizations are encouraged to enhance their security training and email filtering systems to better protect against these evolving threats.

Impact: N/A
Remediation: Organizations should enhance security training and implement advanced email filtering systems.
Read Original
INTERPOL Operation Synergia III Shuts Down 45,000 Malicious IPs, 94 Arrested

Hackread – Cybersecurity News, Data Breaches, AI and More

INTERPOL's Operation Synergia III has resulted in a significant crackdown on cybercrime, leading to the arrest of 94 individuals and the shutdown of 45,000 malicious IP addresses across 72 countries. This operation targeted various cyber threats, including phishing schemes, malware distribution, and online fraud networks. The scale of the operation highlights the ongoing battle against cybercriminals who exploit digital vulnerabilities to defraud individuals and organizations. By dismantling these malicious infrastructures, law enforcement agencies aim to disrupt the operations of cybercriminals and protect potential victims from future attacks. The success of this operation underscores the importance of international cooperation in addressing cyber threats that affect users globally.

Impact: Malicious IP addresses used for phishing, malware, and fraud networks
Remediation: N/A
Read Original

Cisco's recent SD-WAN vulnerabilities have sparked confusion and some fraudulent activity among users. Some individuals are taking advantage of the situation by creating fake proof-of-concept (PoC) exploits, which has added to the chaos surrounding the bugs. This has led to misunderstandings about the actual risks posed by the vulnerabilities. As a result, companies using Cisco's SD-WAN products may be unsure about how to respond and protect their networks effectively. It’s crucial for organizations to be aware of these issues and seek accurate information to mitigate potential risks.

Impact: Cisco SD-WAN products
Remediation: Users should verify the authenticity of PoCs and stay updated with Cisco's official communications for guidance on addressing the vulnerabilities.
Read Original
‘CrackArmor’ Vulnerability in AppArmor Impacts 12.6M Linux Systems

Hackread – Cybersecurity News, Data Breaches, AI and More

Security researchers at Qualys have identified a vulnerability known as 'CrackArmor' in AppArmor, a security tool used to restrict the capabilities of applications on Linux systems. This flaw affects approximately 12.6 million Linux systems, potentially allowing attackers to gain root access and escape from containers. Such a breach can lead to unauthorized control over affected systems, posing significant risks to data integrity and system security. Users of Linux systems, especially those employing AppArmor for security, should take this issue seriously and stay informed about potential exploits. The discovery underscores the need for regular system updates and vigilance against emerging vulnerabilities.

Impact: AppArmor on Linux systems, affecting approximately 12.6 million installations
Remediation: Users should ensure their systems are updated with the latest security patches from their Linux distribution providers and review AppArmor configurations for potential vulnerabilities.
Read Original

Nonprofits are increasingly becoming targets for cybercriminals due to their often inadequate security measures and the valuable data they hold. However, many incidents involving these organizations go unreported, leading to a lack of comprehensive data on the extent of the problem. The absence of sufficient reporting makes it challenging to fully understand the risks nonprofits face and the tactics used by attackers. This situation not only jeopardizes sensitive information but also threatens the operational integrity of nonprofits, which often rely on public trust and donations. As these organizations typically operate with limited resources, they may struggle to implement the necessary security protocols to protect themselves from cyber threats.

Impact: Nonprofits, sensitive data, operational integrity
Remediation: Implement stronger cybersecurity measures, conduct regular security audits, educate staff on security best practices
Read Original

Poland's National Centre for Nuclear Research (NCBJ) recently experienced a cyberattack aimed at its IT infrastructure. Fortunately, the attack was detected and neutralized before it could have any effect on operations or data. This incident raises concerns about the security of critical national research facilities, especially those involved in sensitive areas like nuclear technology. Cyberattacks on such institutions can pose risks not just to the organizations themselves, but also to national security and public safety. The swift detection and response by NCBJ’s cybersecurity measures demonstrate the importance of having robust defenses in place to protect against potential threats.

Impact: IT infrastructure of Poland's National Centre for Nuclear Research
Remediation: N/A
Read Original
Actively Exploited

Starbucks recently reported a data breach that resulted from phishing attacks targeting its employee portal. This incident has affected hundreds of employees, compromising their personal information. The phishing attempts were designed to trick employees into revealing sensitive data, which could lead to identity theft or other malicious activities. Starbucks is likely to face scrutiny over its security measures, as effective protection against such attacks is crucial for safeguarding employee data. This breach serves as a reminder for organizations to enhance their cybersecurity training and protocols to prevent similar incidents in the future.

Impact: Starbucks employee portal, employee personal information
Remediation: Strengthening phishing awareness training for employees, enhancing security protocols for employee portals
Read Original

A new banking Trojan is targeting users of Brazil's Pix payment system. This malware operates with a unique twist: it employs a real-time human operator who monitors transactions and waits for the right moment to intervene. Once the operator identifies a vulnerable transaction, they can manipulate it to steal funds. The attack poses a significant risk to Pix users, as it combines traditional malware tactics with human oversight, making detection and prevention more challenging. As Brazil's Pix system continues to gain popularity, the potential for financial loss increases, highlighting the urgent need for users to be vigilant about their online banking security.

Impact: Brazil's Pix payment system users
Remediation: Users should enable two-factor authentication and monitor their accounts regularly. Keeping security software updated is also advisable.
Read Original
SQL Injection Vulnerability in Ally WordPress Plugin Exposes 200K+ Sites

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A serious SQL injection vulnerability has been discovered in the Ally WordPress plugin, putting over 200,000 websites at risk of data theft. This flaw allows attackers to manipulate database queries, potentially exposing sensitive user information. Although a patch has been released to fix the issue, many installations remain unpatched and therefore vulnerable. Website owners are urged to apply the update as soon as possible to protect their sites and users. The ongoing risk highlights the importance of timely software updates in safeguarding against cyber threats.

Impact: Ally WordPress plugin
Remediation: Patch released; users should update to the latest version of the Ally plugin.
Read Original

International law enforcement agencies have successfully dismantled a significant proxy service known as SocksEscort, which was used by cybercriminals around the world. This operation, dubbed 'Operation Lightning,' targeted the malicious proxy network that facilitated a range of illegal activities, including fraud and identity theft. By shutting down SocksEscort, authorities aim to disrupt the operations of various cybercriminals who relied on this service to mask their identities and conduct illicit activities online. This action represents a collaborative effort among global law enforcement to combat cybercrime and protect internet users. The impact of this operation could lead to a decrease in online criminal activities that utilize proxy services for anonymity.

Impact: SocksEscort proxy network
Remediation: N/A
Read Original
PreviousPage 11 of 121Next