The U.S. has charged 31 additional individuals as part of a sweeping investigation into a massive ATM jackpotting operation, bringing the total number of defendants to 87, predominantly from Venezuela. This scheme involved hackers manipulating ATMs to dispense large amounts of cash illegally. The charges include conspiracy, fraud, and money laundering, highlighting a significant collaborative effort among criminals across borders. This incident raises concerns about the security of ATMs and the potential financial impact on banks and their customers. The ongoing investigation underscores the need for stronger security measures in the banking sector to prevent such cybercrimes.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Researchers at Koi have discovered a series of vulnerabilities known as 'PackageGate' affecting popular JavaScript package managers: NPM, PNPM, VLT, and Bun. These flaws allow attackers to bypass existing supply chain protections, potentially enabling them to execute malicious code within applications that rely on these package managers. This is particularly concerning given the widespread use of these tools in the development community, meaning that many developers and organizations could be at risk without realizing it. The vulnerabilities pose a serious threat to software integrity and the security of applications built using these package managers. Developers are urged to stay vigilant and implement necessary security measures to protect their projects.
Fortinet has addressed a significant vulnerability tracked as CVE-2026-24858, which could allow attackers to bypass authentication and gain unauthorized access to devices linked to other FortiCloud accounts. This flaw presents a serious risk, as it enables malicious actors to potentially control devices that should be secure. Users and organizations utilizing FortiCloud services are particularly affected, as their account security could be compromised. Fortinet's swift action to patch this vulnerability is crucial to prevent exploitation and protect users' sensitive data. Companies using Fortinet products should ensure they apply the latest updates to mitigate this risk effectively.
OpenSSL has patched 12 vulnerabilities, including a high-severity flaw that allows remote code execution. This vulnerability was identified by a cybersecurity firm and poses significant risks for users and organizations relying on OpenSSL for secure communications. Attackers could exploit this flaw to execute arbitrary code on affected systems, potentially compromising sensitive data and operations. Users and organizations should prioritize applying the latest updates to safeguard their systems against potential attacks. The patch addresses critical issues that could affect a wide range of applications and services leveraging OpenSSL, making timely remediation essential.
The CERT Coordination Center has launched the CERT UEFI Parser, an open-source tool designed to help cybersecurity researchers analyze Unified Extensible Firmware Interface (UEFI) software. This tool aims to simplify the examination of UEFI code, making it easier to identify various types of vulnerabilities that can be challenging to detect. By applying program analysis techniques, the parser extracts architectural details that can reveal security weaknesses within UEFI firmware. This initiative is particularly important as UEFI is critical in the boot process of modern devices, and vulnerabilities in this area can lead to serious security risks. The tool is available through the Software Engineering Institute at Carnegie Mellon University, marking a significant step forward in UEFI security research.
A defect in WinRAR, a popular file compression tool, has been exploited by cybercriminals and nation-state groups for the past six months. This vulnerability is particularly concerning as it has been used to target sensitive sectors, including military, government, and technology organizations, primarily for espionage purposes. As attackers take advantage of this flaw, affected organizations risk data breaches and unauthorized access to sensitive information. Users of WinRAR are strongly urged to update their software to the latest version to mitigate these risks. The ongoing exploitation of this defect illustrates the persistent threat posed by both cybercriminals and state-sponsored actors in today's digital landscape.
SCM feed for Latest
The U.S. Office of Management and Budget (OMB) has rolled back a requirement put in place during the Biden administration that mandated federal contractors to complete a standardized self-attestation form regarding their software security practices. This requirement was introduced following the SolarWinds hack, which exposed significant vulnerabilities in federal systems. The reversal could impact the security oversight of government contractors, as the self-attestation was intended to ensure that these firms were implementing appropriate security measures. Without this requirement, there are concerns that the federal government may be less equipped to safeguard its systems against potential cyber threats. The decision raises questions about the future of cybersecurity standards for contractors working with government agencies.
SCM feed for Latest
A new SEO poisoning marketplace called HaxorSEO, or HxSEO, has been discovered, offering over a thousand backlinks to legitimate websites that have been compromised. These sites are infected with a webshell, which attackers use to manipulate search engine rankings. This tactic not only harms the targeted websites' integrity but also misleads users and can damage trust in search results. As these backlinks can significantly alter search visibility, website owners need to be vigilant about their site's security. The rise of such marketplaces poses a serious risk to online businesses and consumers alike, as it can lead to increased exposure to malicious activities.
SCM feed for Latest
The Clop ransomware gang has claimed responsibility for a breach involving Hilton, a major U.S. hospitality company. While specific details about the nature of the breach and the data compromised have not been disclosed, the incident raises concerns about the security of sensitive customer information within the hospitality sector. Ransomware attacks like this can disrupt operations and potentially expose personal data, putting customers at risk. Companies in similar industries should take this as a warning to review their security measures and ensure they are prepared for potential attacks. As the situation develops, it is crucial for Hilton and other affected entities to communicate transparently with their customers about the breach and any protective steps being taken.
Mustang Panda, a Chinese hacking group, has rolled out a new version of its CoolClient backdoor that enhances its capabilities to steal sensitive information. This updated variant can capture login credentials from web browsers and monitor clipboard activities, raising the stakes for individuals and organizations targeted by the group. The espionage tactics employed by Mustang Panda are concerning, as they indicate a sophisticated approach to gathering intelligence and personal data. Users of various web browsers should be particularly vigilant, as this threat has implications for anyone who stores sensitive information online. It's crucial for organizations to bolster their defenses against such attacks to protect their data and maintain security.
A new ransomware strain known as 'Sicarii' has emerged, marked by its poorly designed code and a peculiar identity that suggests a connection to Hebrew culture, which may be misleading. This ransomware is particularly concerning because it cannot be decrypted, leaving victims unable to recover their files without paying the ransom. The strain first appeared last year, and while it may not be as sophisticated as other ransomware variants, its continued presence poses a risk to various organizations. Users and companies need to remain vigilant and consider implementing robust backup solutions to mitigate the impact of such attacks. The odd branding could lead to confusion about the true origins of this malware, making it a unique case in the evolving landscape of ransomware.
A newly discovered flaw in telnet servers exposes vulnerabilities in many legacy systems and Internet of Things (IoT) devices still using this outdated protocol for remote access. Despite telnet being largely replaced by more secure options, it remains in use across hundreds of thousands of devices, making them susceptible to potential attacks. Researchers have pointed out that this forgotten attack surface could allow unauthorized access to sensitive systems, putting data and operations at risk. Organizations relying on these systems need to assess their use of telnet and consider transitioning to more secure protocols to mitigate these risks. This situation underscores the importance of keeping security practices updated, even for older technologies that may still be in operation.
Hackread – Cybersecurity News, Data Breaches, AI, and More
ShinyHunters, a notorious hacking group, is targeting over 100 organizations through a combination of vishing (voice phishing) and fake login pages. They are working with other groups to bypass Single Sign-On (SSO) security measures to gain unauthorized access to sensitive company data. This tactic not only compromises individual accounts but potentially exposes entire networks to further attacks. The extent of the breach could impact numerous sectors, leading to significant data loss and financial repercussions for the affected companies. Organizations need to be vigilant about their security protocols and educate employees on recognizing phishing attempts to mitigate these risks.
WhatsApp has introduced a new feature called 'Strict Account Settings' aimed at enhancing user privacy and protecting against spyware. This toggle allows users to tighten their account security beyond the existing end-to-end encryption already offered by the app. The move comes as concerns grow over the potential for spyware to compromise personal data on messaging platforms. Users will now have more control over who can see their information and how their accounts can be accessed. This is significant as it reflects a broader trend in tech companies prioritizing user privacy amid rising cyber threats.
SCM feed for Latest
India is currently dealing with a sophisticated espionage campaign that utilizes the Blackmoon trojan. This attack begins with a ZIP file that conceals malicious files, allowing attackers to infiltrate systems. The campaign poses a significant risk to sensitive information and national security, as it targets various sectors within the country. Cybersecurity experts are urging organizations in India to remain vigilant and enhance their security measures to protect against such advanced threats. This incident underscores the ongoing risks of cyber espionage and the need for robust defense strategies.