Ukrainian police have apprehended three hackers accused of accessing and stealing over 610,000 Roblox accounts. The attackers allegedly sold these accounts for a total of $225,000, taking advantage of the popular online gaming platform's user base. Roblox, which is especially popular among children and teenagers, has been a target for cybercriminals due to its vast number of users. This incident raises concerns about account security and the potential risks for young gamers who may not be aware of the dangers of account theft. The arrests serve as a reminder for users to strengthen their online security practices, such as using unique passwords and enabling two-factor authentication.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
SCM feed for Latest
According to threat intelligence from Quorum Cyber, the global education sector has seen a dramatic 63% increase in cyberattacks from November 2024 to October 2025. This surge includes a 73% rise in data breaches and a 75% increase in attacks driven by hacktivist groups. Educational institutions, already under pressure from the shift to online learning, are now facing heightened risks to their data and systems. This trend raises concerns about the security of sensitive student information and the potential for disruptions in educational services. As cybercriminals target these institutions, it's crucial for schools and universities to enhance their cybersecurity measures to protect against these escalating threats.
Hackread – Cybersecurity News, Data Breaches, AI and More
The newly discovered Bluekit Phishing Kit is a sophisticated tool that employs advanced techniques to target major online platforms. It utilizes an AI-driven approach called AiTM, which allows attackers to steal session data and bypass multi-factor authentication (MFA) protections. This poses a significant risk to users, as it could lead to unauthorized access to their accounts on popular services. The implications are serious, as many individuals rely on MFA to secure their online identities. Companies and users alike need to be vigilant and update their security measures to counteract these emerging threats.
Hackread – Cybersecurity News, Data Breaches, AI and More
A hacker known as 'Xorcat' claims to have exploited vulnerabilities in Polymarket, a prediction market platform, and alleges that he has stolen around 300,000 records. However, Polymarket denies these claims, suggesting that the incident may not be a true data breach but rather a case of data scraping. Data scraping involves collecting publicly available information in a way that may not align with the site's terms of service. This incident raises concerns about the security of user data on platforms that utilize APIs, as well as the potential for misinterpretation of data breaches. Users and stakeholders should remain vigilant about the security of their information, especially in environments where data scraping could be a risk.
BleepingComputer
A serious vulnerability has been discovered in cPanel and WebHost Manager (WHM) that allows unauthorized users to access the control panel without proper authentication. This flaw affects all versions except the most recent ones, putting many web hosting services at risk. Attackers could exploit this weakness to gain control over web hosting environments, which could lead to data breaches or service disruptions. Users of cPanel and WHM are strongly advised to update their systems immediately to the latest versions to mitigate this risk. The urgency of this situation highlights the importance of keeping software up to date to protect against potential exploits.
A new strain of ransomware known as Vect 2.0 is being deployed against organizations affected by the TeamPCP supply chain attacks. However, security experts warn that paying for a decryptor might not be wise, as a design flaw in the ransomware makes it function more like a wiper than traditional ransomware. This means that instead of simply encrypting files for ransom, it may permanently erase data. Companies that have been impacted need to be cautious, as the ramifications of this ransomware could lead to significant data loss. Organizations should prioritize data backups and consider their recovery options before engaging with the attackers.
Infosecurity Magazine
Researchers from LayerX have discovered a significant vulnerability in the Cursor extension that allows malicious extensions to steal API keys and session tokens without any user interaction. This flaw poses a serious risk to developers, as it can potentially expose sensitive information needed for accessing various services and APIs. Developers using the Cursor extension are particularly at risk, as attackers can exploit this vulnerability to gain unauthorized access to their accounts and services. The implications of this vulnerability are concerning, as it could lead to data breaches or unauthorized actions taken on behalf of developers. Users of the Cursor extension should take immediate steps to assess their security and consider removing or disabling the extension until a fix is provided.
Cybersecurity researchers have identified a new wave of attacks linked to North Korea, involving malicious code embedded in an npm package called '@validate-sdk/v2'. This package, which is falsely advertised as a utility for software development, actually serves as a vehicle for malware. The attackers have utilized artificial intelligence to insert this malicious code, making it harder to detect. As a result, developers who unknowingly incorporate this package into their projects could be exposing their systems to remote access trojans (RATs). This incident highlights the increasing sophistication of cyber threats, particularly from state-sponsored actors, and emphasizes the need for developers to scrutinize third-party packages before use.
SCM feed for Latest
Vimeo has confirmed that customer data was accessed during a recent breach linked to the ShinyHunters extortion group. This group has threatened to release the stolen data by April 30 unless a ransom is paid. The breach raises concerns about the safety of user information and the potential for it to be misused if the ransom demand is not met. Vimeo users should be vigilant, as their personal details may be at risk. This incident underscores the ongoing challenges companies face in protecting sensitive data from cybercriminals.
Austrian and Albanian law enforcement agencies have successfully dismantled a criminal organization linked to a significant cryptocurrency investment fraud scheme. This operation defrauded victims around the world, with estimated losses exceeding €50 million (approximately $58.5 million). The fraudsters lured individuals into investing in non-existent cryptocurrency projects, exploiting the growing interest in digital currencies. This incident not only highlights the vulnerabilities in the crypto investment space but also serves as a reminder for potential investors to exercise caution and conduct thorough research. The crackdown is part of a broader effort to combat financial crimes related to cryptocurrency.
Infosecurity Magazine
Researchers have identified a malicious npm dependency that is associated with an AI-assisted code commit. This dependency is designed to steal sensitive information and compromise cryptocurrency wallets. Developers who incorporate this malicious package into their projects risk exposing their private keys and other critical data. This situation is particularly concerning for those involved in crypto transactions, as the attackers could gain unauthorized access to funds. Users and developers should be vigilant and review their dependencies carefully to avoid falling victim to this scheme.
SCM feed for Latest
Tennessee has become the second state in the U.S. to ban cryptocurrency ATMs, following Indiana's lead, due to rising concerns over scams linked to these kiosks. Governor Bill Lee signed the legislation aimed at curbing the exploitation of these machines, which have increasingly been used in fraudulent activities. This move reflects a broader trend among lawmakers to regulate cryptocurrency operations amid fears of financial fraud. As scammers often use ATMs to facilitate quick and anonymous transactions, this ban may help protect consumers from losing money to these schemes. The legislation is an effort to enhance consumer safety in the evolving landscape of digital currencies.
SCM feed for Latest
A report from Cybernews reveals that over 80 browser extensions have been selling user data, impacting more than 6.5 million users. These extensions, which are meant to enhance web browsing experiences, have been found to collect and monetize information without clear consent from users. This situation raises significant privacy concerns, as individuals may not be aware that their personal information is being sold for profit. Users of these extensions need to be vigilant about the tools they install and the permissions they grant, as this incident illustrates the potential risks associated with seemingly harmless browser add-ons. The broader implications for digital privacy and security are significant, prompting a need for stricter regulations on data collection practices.
SCM feed for Latest
A new multi-stage malware campaign is targeting employees of Pakistan's Punjab Safe Cities Authority and the Punjab Police Integrated Command, Control & Communication Centre. Researchers have noted that the attackers are using sophisticated obfuscation tactics to evade detection. This level of complexity suggests that the attackers are well-resourced and may have specific goals in mind, which could include espionage or disruption of services. The campaign's focus on law enforcement and public safety agencies raises concerns about the potential for serious consequences, including compromised security operations and sensitive data breaches. As these entities play crucial roles in maintaining public safety, any successful infiltration could have far-reaching implications for security in the region.
Infosecurity Magazine
Researchers at KELA have identified a staggering 2.9 billion compromised credentials that are being circulated in the cybercriminal underground. Infostealers, which are malicious programs designed to extract sensitive information like usernames and passwords, are the primary method attackers are using to gain unauthorized access to accounts. This situation poses significant risks for individuals and organizations alike, as compromised credentials can lead to identity theft, financial loss, and data breaches. The sheer volume of stolen credentials emphasizes the need for stronger security measures, such as enabling two-factor authentication and regularly updating passwords. Companies and users must remain vigilant to protect their sensitive information from ongoing cyber threats.