Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Ukrainian police have apprehended three hackers accused of accessing and stealing over 610,000 Roblox accounts. The attackers allegedly sold these accounts for a total of $225,000, taking advantage of the popular online gaming platform's user base. Roblox, which is especially popular among children and teenagers, has been a target for cybercriminals due to its vast number of users. This incident raises concerns about account security and the potential risks for young gamers who may not be aware of the dangers of account theft. The arrests serve as a reminder for users to strengthen their online security practices, such as using unique passwords and enabling two-factor authentication.

Impact: Roblox accounts
Remediation: Users should change their passwords and enable two-factor authentication on their accounts.
Read Original
Actively Exploited

According to threat intelligence from Quorum Cyber, the global education sector has seen a dramatic 63% increase in cyberattacks from November 2024 to October 2025. This surge includes a 73% rise in data breaches and a 75% increase in attacks driven by hacktivist groups. Educational institutions, already under pressure from the shift to online learning, are now facing heightened risks to their data and systems. This trend raises concerns about the security of sensitive student information and the potential for disruptions in educational services. As cybercriminals target these institutions, it's crucial for schools and universities to enhance their cybersecurity measures to protect against these escalating threats.

Impact: Educational institutions, student data systems, online learning platforms
Remediation: Educational institutions should implement stronger cybersecurity protocols, conduct regular security audits, and provide training for staff and students on recognizing phishing attempts and other cyber threats.
Read Original
New AI-Powered Bluekit Phishing Kit Targets Major Platforms with MFA Bypass Attacks

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

The newly discovered Bluekit Phishing Kit is a sophisticated tool that employs advanced techniques to target major online platforms. It utilizes an AI-driven approach called AiTM, which allows attackers to steal session data and bypass multi-factor authentication (MFA) protections. This poses a significant risk to users, as it could lead to unauthorized access to their accounts on popular services. The implications are serious, as many individuals rely on MFA to secure their online identities. Companies and users alike need to be vigilant and update their security measures to counteract these emerging threats.

Impact: Major online platforms using multi-factor authentication
Remediation: Users should enhance their security practices, such as using password managers, enabling additional security features, and being cautious about phishing attempts.
Read Original
Polymarket Rejects Data Breach Claims as Hacker Alleges 300K Records Stolen

Hackread – Cybersecurity News, Data Breaches, AI and More

A hacker known as 'Xorcat' claims to have exploited vulnerabilities in Polymarket, a prediction market platform, and alleges that he has stolen around 300,000 records. However, Polymarket denies these claims, suggesting that the incident may not be a true data breach but rather a case of data scraping. Data scraping involves collecting publicly available information in a way that may not align with the site's terms of service. This incident raises concerns about the security of user data on platforms that utilize APIs, as well as the potential for misinterpretation of data breaches. Users and stakeholders should remain vigilant about the security of their information, especially in environments where data scraping could be a risk.

Impact: Polymarket prediction market platform
Remediation: Users should monitor their accounts for unusual activity and consider changing passwords. Polymarket should review and strengthen its API security to prevent unauthorized data access.
Read Original

A serious vulnerability has been discovered in cPanel and WebHost Manager (WHM) that allows unauthorized users to access the control panel without proper authentication. This flaw affects all versions except the most recent ones, putting many web hosting services at risk. Attackers could exploit this weakness to gain control over web hosting environments, which could lead to data breaches or service disruptions. Users of cPanel and WHM are strongly advised to update their systems immediately to the latest versions to mitigate this risk. The urgency of this situation highlights the importance of keeping software up to date to protect against potential exploits.

Impact: cPanel, WebHost Manager (WHM), all versions except the latest
Remediation: Update to the latest versions of cPanel and WHM to patch the vulnerability.
Read Original

A new strain of ransomware known as Vect 2.0 is being deployed against organizations affected by the TeamPCP supply chain attacks. However, security experts warn that paying for a decryptor might not be wise, as a design flaw in the ransomware makes it function more like a wiper than traditional ransomware. This means that instead of simply encrypting files for ransom, it may permanently erase data. Companies that have been impacted need to be cautious, as the ramifications of this ransomware could lead to significant data loss. Organizations should prioritize data backups and consider their recovery options before engaging with the attackers.

Impact: Vect 2.0 ransomware, TeamPCP supply chain attack victims
Remediation: Organizations should focus on data backups and recovery strategies; no specific patches or updates mentioned.
Read Original

Researchers from LayerX have discovered a significant vulnerability in the Cursor extension that allows malicious extensions to steal API keys and session tokens without any user interaction. This flaw poses a serious risk to developers, as it can potentially expose sensitive information needed for accessing various services and APIs. Developers using the Cursor extension are particularly at risk, as attackers can exploit this vulnerability to gain unauthorized access to their accounts and services. The implications of this vulnerability are concerning, as it could lead to data breaches or unauthorized actions taken on behalf of developers. Users of the Cursor extension should take immediate steps to assess their security and consider removing or disabling the extension until a fix is provided.

Impact: Cursor extension, developer API keys, session tokens
Remediation: Users should assess their security and consider removing or disabling the Cursor extension until a fix is provided.
Read Original

Cybersecurity researchers have identified a new wave of attacks linked to North Korea, involving malicious code embedded in an npm package called '@validate-sdk/v2'. This package, which is falsely advertised as a utility for software development, actually serves as a vehicle for malware. The attackers have utilized artificial intelligence to insert this malicious code, making it harder to detect. As a result, developers who unknowingly incorporate this package into their projects could be exposing their systems to remote access trojans (RATs). This incident highlights the increasing sophistication of cyber threats, particularly from state-sponsored actors, and emphasizes the need for developers to scrutinize third-party packages before use.

Impact: @validate-sdk/v2 npm package
Remediation: Developers should avoid using the '@validate-sdk/v2' package until it is verified safe, and regularly audit their project dependencies for malicious code.
Read Original

Vimeo has confirmed that customer data was accessed during a recent breach linked to the ShinyHunters extortion group. This group has threatened to release the stolen data by April 30 unless a ransom is paid. The breach raises concerns about the safety of user information and the potential for it to be misused if the ransom demand is not met. Vimeo users should be vigilant, as their personal details may be at risk. This incident underscores the ongoing challenges companies face in protecting sensitive data from cybercriminals.

Impact: Vimeo customer data
Remediation: Users should change their passwords and enable two-factor authentication. Companies should consider enhancing their security measures to prevent future breaches.
Read Original

Austrian and Albanian law enforcement agencies have successfully dismantled a criminal organization linked to a significant cryptocurrency investment fraud scheme. This operation defrauded victims around the world, with estimated losses exceeding €50 million (approximately $58.5 million). The fraudsters lured individuals into investing in non-existent cryptocurrency projects, exploiting the growing interest in digital currencies. This incident not only highlights the vulnerabilities in the crypto investment space but also serves as a reminder for potential investors to exercise caution and conduct thorough research. The crackdown is part of a broader effort to combat financial crimes related to cryptocurrency.

Impact: Cryptocurrency investment schemes
Remediation: Investors should conduct thorough research and verify the legitimacy of cryptocurrency investment opportunities.
Read Original

Researchers have identified a malicious npm dependency that is associated with an AI-assisted code commit. This dependency is designed to steal sensitive information and compromise cryptocurrency wallets. Developers who incorporate this malicious package into their projects risk exposing their private keys and other critical data. This situation is particularly concerning for those involved in crypto transactions, as the attackers could gain unauthorized access to funds. Users and developers should be vigilant and review their dependencies carefully to avoid falling victim to this scheme.

Impact: npm packages, cryptocurrency wallets
Remediation: Developers should audit their npm dependencies and remove any suspicious packages. It's advisable to use trusted sources and verify code integrity before integrating third-party libraries.
Read Original

Tennessee has become the second state in the U.S. to ban cryptocurrency ATMs, following Indiana's lead, due to rising concerns over scams linked to these kiosks. Governor Bill Lee signed the legislation aimed at curbing the exploitation of these machines, which have increasingly been used in fraudulent activities. This move reflects a broader trend among lawmakers to regulate cryptocurrency operations amid fears of financial fraud. As scammers often use ATMs to facilitate quick and anonymous transactions, this ban may help protect consumers from losing money to these schemes. The legislation is an effort to enhance consumer safety in the evolving landscape of digital currencies.

Impact: Cryptocurrency ATMs
Remediation: N/A
Read Original

A report from Cybernews reveals that over 80 browser extensions have been selling user data, impacting more than 6.5 million users. These extensions, which are meant to enhance web browsing experiences, have been found to collect and monetize information without clear consent from users. This situation raises significant privacy concerns, as individuals may not be aware that their personal information is being sold for profit. Users of these extensions need to be vigilant about the tools they install and the permissions they grant, as this incident illustrates the potential risks associated with seemingly harmless browser add-ons. The broader implications for digital privacy and security are significant, prompting a need for stricter regulations on data collection practices.

Impact: Browser extensions with over 6.5 million users
Remediation: Users should review and uninstall suspicious browser extensions, check privacy settings, and consider using extensions from reputable sources only.
Read Original

A new multi-stage malware campaign is targeting employees of Pakistan's Punjab Safe Cities Authority and the Punjab Police Integrated Command, Control & Communication Centre. Researchers have noted that the attackers are using sophisticated obfuscation tactics to evade detection. This level of complexity suggests that the attackers are well-resourced and may have specific goals in mind, which could include espionage or disruption of services. The campaign's focus on law enforcement and public safety agencies raises concerns about the potential for serious consequences, including compromised security operations and sensitive data breaches. As these entities play crucial roles in maintaining public safety, any successful infiltration could have far-reaching implications for security in the region.

Impact: Punjab Safe Cities Authority, Punjab Police Integrated Command, Control & Communication Centre
Remediation: Organizations should enhance their security protocols, conduct thorough security training for employees, and implement advanced threat detection systems.
Read Original
Actively Exploited

Researchers at KELA have identified a staggering 2.9 billion compromised credentials that are being circulated in the cybercriminal underground. Infostealers, which are malicious programs designed to extract sensitive information like usernames and passwords, are the primary method attackers are using to gain unauthorized access to accounts. This situation poses significant risks for individuals and organizations alike, as compromised credentials can lead to identity theft, financial loss, and data breaches. The sheer volume of stolen credentials emphasizes the need for stronger security measures, such as enabling two-factor authentication and regularly updating passwords. Companies and users must remain vigilant to protect their sensitive information from ongoing cyber threats.

Impact: 2.9 billion compromised credentials, infostealers
Remediation: Implement two-factor authentication, regularly update passwords, monitor accounts for suspicious activity.
Read Original
PreviousPage 11 of 187Next