Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Latin America is facing a surge in cyberattacks that has made it one of the riskiest regions for cybersecurity threats. Recent tactics include data-leak extortion, where attackers threaten to release sensitive information unless a ransom is paid, and credential-stealing campaigns aimed at gaining unauthorized access to user accounts. Additionally, there’s a rise in the exploitation of edge devices, which are often less secure and can serve as entry points for attackers. Researchers have noted that some attackers are even using artificial intelligence to enhance their methods. This increase in cyber threats not only puts businesses at risk but also endangers personal data for millions of users across the region, highlighting the urgent need for stronger cybersecurity measures.

Impact: Data-leak extortion, credential-stealing campaigns, edge devices
Remediation: Companies should enhance security protocols, conduct regular security training for employees, and implement multi-factor authentication where possible.
Read Original

A new cyber campaign called Bizarre Bazaar is targeting exposed Large Language Model (LLM) service endpoints. Hackers are exploiting these vulnerabilities to gain unauthorized access to AI infrastructure, which they then monetize. This operation raises significant concerns as it can lead to the misuse of AI technologies and potentially harmful applications. Companies utilizing LLMs need to be vigilant and ensure their endpoints are properly secured to prevent unauthorized access. This incident serves as a reminder of the ongoing risks associated with AI and the importance of safeguarding these powerful tools.

Impact: Exposed Large Language Model service endpoints
Remediation: Companies should secure their LLM service endpoints to prevent unauthorized access.
Read Original

Researchers from JFrog Security Research have identified two significant vulnerabilities in the n8n workflow automation platform. The most critical issue, tracked as CVE-2026-1470, has a CVSS score of 9.9 and involves an eval injection vulnerability that allows authenticated users to execute arbitrary code remotely. This flaw poses a severe risk, as it could potentially enable attackers to manipulate the system and access sensitive data. Users of n8n should take immediate action to secure their installations, especially those who rely on this platform for workflow automation. Prompt updates and monitoring are essential to mitigate risks associated with these vulnerabilities.

Impact: n8n workflow automation platform, versions not specified
Remediation: Users should update to the latest version of n8n to patch the vulnerabilities. Regularly review user permissions and limit access to the system to reduce risk.
Read Original

Researchers have identified a new variant of PureRAT, a remote access trojan (RAT), which now includes emojis in its code. The presence of these emojis suggests that the malware may have been generated using AI, pulling comments and content from social media. This finding raises concerns about the evolving tactics of cybercriminals, as they increasingly use advanced technology to craft their malware. Users and organizations should be vigilant, as this type of malware can compromise sensitive information and control systems remotely. The shift to AI-generated malware indicates a potential increase in the sophistication and adaptability of cyber threats.

Impact: PureRAT malware, remote access tools, social media platforms
Remediation: Users should ensure their antivirus software is up to date and consider employing additional network security measures to detect and block unauthorized access.
Read Original

Meta has introduced a new security feature for WhatsApp aimed at protecting high-risk users, such as journalists and public figures, from sophisticated cyber threats like spyware. This 'lockdown mode' provides enhanced security measures, making it harder for attackers to gain unauthorized access to sensitive information. The feature is particularly important as these individuals often face targeted attacks due to their work and public visibility. With the rise of cyber espionage and invasive spyware, this initiative from Meta is a proactive step to safeguard vulnerable users. The rollout of this feature reflects a growing recognition of the need for stronger protections in the digital communication space.

Impact: WhatsApp, Meta
Remediation: N/A
Read Original
Actively Exploited

Recent analysis by Zscaler has revealed alarming security vulnerabilities in enterprise AI systems, with every system examined showing at least one critical flaw. The findings indicate that 90% of these systems can be compromised in less than 90 minutes. This is particularly concerning as businesses increasingly rely on AI tools for various operations. The implications are serious, as these vulnerabilities could lead to data breaches and unauthorized access to sensitive information. Companies utilizing AI technology must prioritize security measures to protect their systems and data from potential attacks.

Impact: Enterprise AI systems
Remediation: Companies should implement immediate security assessments and updates, strengthen access controls, and consider deploying additional threat detection systems.
Read Original

Cybersecurity researchers have identified that a group known as Mustang Panda, believed to be linked to the Chinese government, is using an updated backdoor called COOLCLIENT in cyber espionage campaigns. These attacks, which have been ongoing in 2025, primarily target government entities, allowing the attackers to steal sensitive data from compromised systems. This new version of COOLCLIENT enhances the group's capabilities, raising concerns about the potential for significant data breaches in critical government sectors. The implications of these attacks could lead to compromised national security and the exposure of sensitive governmental information. Organizations, especially those in the public sector, need to bolster their security measures to protect against such sophisticated threats.

Impact: Government entities
Remediation: Organizations should enhance their endpoint security, implement regular software updates, and conduct thorough security audits to detect and mitigate potential intrusions.
Read Original

In a concerning development, researchers at Sonatype have discovered over 454,000 malicious open source packages that have infiltrated the software development ecosystem. This surge in harmful packages marks a troubling trend in which attackers are increasingly targeting open source repositories to distribute malware and other malicious code. Developers and organizations that rely on open source software are at heightened risk, as they may inadvertently incorporate these dangerous packages into their projects. The implications are significant, as this can lead to compromised applications and data breaches. Companies need to implement stricter security measures and regularly audit their dependencies to safeguard against these threats.

Impact: Open source packages across various development environments
Remediation: Implement stricter security measures, regularly audit dependencies for malicious packages
Read Original

A recent investigation by Forbes has revealed that Microsoft is potentially turning over Bitlocker encryption recovery keys to law enforcement when presented with legal warrants. The company reportedly receives around 20 such requests each year. While this may seem like standard legal compliance, it raises significant concerns about user data privacy and control. Essentially, if users do not have full control over their encryption keys, they may not fully control their own data. This situation prompts users to reconsider how they manage their encryption keys and the implications of relying on third-party services for data protection.

Impact: Microsoft Bitlocker encryption
Remediation: Users should consider managing their encryption keys independently to maintain control over their data.
Read Original

According to a report from Chainalysis, Chinese money launderers are now responsible for 20% of the global money laundering activity, which is estimated to be worth around $82 billion. This shift in the laundering landscape indicates a significant increase in illicit financial operations originating from China, potentially impacting global economies and financial systems. The findings suggest that money laundering is becoming more sophisticated, using various methods and channels to obscure the origins of illegal funds. This situation raises concerns for law enforcement and regulatory bodies worldwide, as they grapple with the challenge of tracking and curbing these activities. The report emphasizes the need for stronger international cooperation to combat money laundering and its associated risks.

Impact: N/A
Remediation: N/A
Read Original

The article discusses the ongoing risk of password reuse, which is often overlooked by security teams focused on more obvious threats like phishing or malware. Many users tend to use similar passwords across different accounts, creating a vulnerability that can be exploited by attackers. This practice allows cybercriminals to gain access to sensitive information if they compromise one account. Organizations are urged to take this risk seriously and implement stronger password policies and user education to mitigate the problem. The article emphasizes that even seemingly minor password habits can lead to significant security breaches, making it crucial for companies to address these issues proactively.

Impact: N/A
Remediation: Implement stronger password policies, promote the use of password managers, and educate users on the risks of password reuse.
Read Original

WhatsApp has introduced new security features aimed at protecting users who may be at risk, such as activists and journalists. These updates include stricter account settings that allow users to block incoming media and attachments from unknown contacts, as well as the option to silence calls from unknown numbers. This move is particularly significant for individuals who may face harassment or threats through the app. By enhancing these privacy settings, WhatsApp is responding to the growing concerns about user safety in digital communication, ensuring that vulnerable individuals can better manage their interactions and safeguard their information.

Impact: WhatsApp
Remediation: Users can adjust their account settings to block attachments and media, and silence calls from unknown contacts.
Read Original

The U.S. has charged 31 additional individuals as part of a sweeping investigation into a massive ATM jackpotting operation, bringing the total number of defendants to 87, predominantly from Venezuela. This scheme involved hackers manipulating ATMs to dispense large amounts of cash illegally. The charges include conspiracy, fraud, and money laundering, highlighting a significant collaborative effort among criminals across borders. This incident raises concerns about the security of ATMs and the potential financial impact on banks and their customers. The ongoing investigation underscores the need for stronger security measures in the banking sector to prevent such cybercrimes.

Impact: ATM systems, financial institutions
Remediation: Implement stronger security protocols for ATM systems, enhance monitoring for suspicious activities, and collaborate with law enforcement for ongoing investigations.
Read Original

Researchers at Koi have discovered a series of vulnerabilities known as 'PackageGate' affecting popular JavaScript package managers: NPM, PNPM, VLT, and Bun. These flaws allow attackers to bypass existing supply chain protections, potentially enabling them to execute malicious code within applications that rely on these package managers. This is particularly concerning given the widespread use of these tools in the development community, meaning that many developers and organizations could be at risk without realizing it. The vulnerabilities pose a serious threat to software integrity and the security of applications built using these package managers. Developers are urged to stay vigilant and implement necessary security measures to protect their projects.

Impact: NPM, PNPM, VLT, Bun
Remediation: Developers should monitor for updates from the respective package managers and apply any security patches as they become available.
Read Original

Fortinet has addressed a significant vulnerability tracked as CVE-2026-24858, which could allow attackers to bypass authentication and gain unauthorized access to devices linked to other FortiCloud accounts. This flaw presents a serious risk, as it enables malicious actors to potentially control devices that should be secure. Users and organizations utilizing FortiCloud services are particularly affected, as their account security could be compromised. Fortinet's swift action to patch this vulnerability is crucial to prevent exploitation and protect users' sensitive data. Companies using Fortinet products should ensure they apply the latest updates to mitigate this risk effectively.

Impact: FortiCloud services, devices registered to FortiCloud accounts.
Remediation: Fortinet has released patches to address the vulnerability. Users are advised to update their FortiCloud services and devices to the latest version as soon as possible.
Read Original
PreviousPage 12 of 87Next