Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

eScan antivirus has suffered a supply chain breach that allowed attackers to distribute multi-stage malware through legitimate software updates. This incident raises serious concerns as it involves signed malware, meaning it could evade detection by users and security systems alike. The breach potentially affects eScan users who rely on the antivirus software for protection against threats. As attackers exploit trusted software to deliver malicious payloads, the trust users place in security products is significantly undermined. Companies using eScan should take immediate action to verify their software's integrity and consider alternative security measures until a fix is provided.

Impact: eScan antivirus software
Remediation: Users should verify the integrity of their eScan software, monitor for unusual system behavior, and consider temporary alternative security solutions until a patch is released.
Read Original

A recent survey conducted by Permiso Security shows that many organizations are rapidly adopting AI agents and automated systems that access sensitive data, but they are struggling to keep track of these non-human identities. This lack of visibility could lead to significant security risks, as companies may not be aware of how these systems interact with their data or the potential vulnerabilities involved. The survey indicates that while the use of automation and AI is increasing, the security measures needed to monitor and protect these identities are not keeping pace. As more businesses integrate these technologies, it becomes crucial for them to enhance their security protocols to prevent potential data breaches or misuse of sensitive information.

Impact: N/A
Remediation: Organizations should improve monitoring and security measures for AI systems and automated processes accessing sensitive data.
Read Original

According to a recent report from The Identity Underground, a significant number of executives, 54%, are worried about the potential for AI-enhanced identity threats by 2026. However, there's a notable gap in preparedness, with only 3% of these executives feeling 'very prepared' to tackle such risks. This indicates that while awareness of the threat is growing, many organizations are not taking the necessary steps to defend against possible attacks. This lack of readiness could leave companies vulnerable to sophisticated identity theft and fraud as AI technology continues to evolve. As AI becomes more integrated into cybercrime, businesses may face increased challenges in protecting their sensitive information and maintaining customer trust.

Impact: N/A
Remediation: Companies should enhance their security measures, conduct regular training for staff on identity protection, and invest in advanced threat detection systems.
Read Original

Cloudflare recently reported a 25-minute incident involving a Border Gateway Protocol (BGP) route leak that impacted IPv6 traffic. During this time, the leak caused significant problems including congestion and packet loss, resulting in an estimated 12 Gbps of dropped traffic. This misconfiguration affected various internet users and services relying on Cloudflare's infrastructure. Such route leaks can disrupt internet connectivity and degrade user experiences, highlighting the importance of proper configuration in network management. The incident serves as a reminder for organizations to regularly review their BGP settings to prevent similar occurrences in the future.

Impact: IPv6 traffic managed by Cloudflare
Remediation: Organizations should review and correct their BGP configurations to prevent route leaks.
Read Original

The European Commission has initiated an investigation into X, the company behind the Grok artificial intelligence tool, after reports emerged that Grok was used to create sexually explicit images. The inquiry will examine whether X adequately evaluated the potential risks associated with deploying this AI technology. This investigation comes amid growing concerns about the ethical implications of AI-generated content, particularly when it involves sensitive material. The outcome could have significant repercussions for X and may influence how AI tools are developed and regulated in the future. Users of AI technologies and the general public are closely watching the situation, as it raises questions about accountability and the safeguards needed to prevent misuse.

Impact: Grok AI tool
Remediation: N/A
Read Original
Actively Exploited

Hackers are taking advantage of inactive applications on Snapcraft by seizing their expired domain names. This tactic allows them to hijack these applications and potentially use them to steal cryptocurrency. Users who have previously downloaded these apps may be at risk if they attempt to access them again, as they could unknowingly interact with malicious versions. This situation highlights the need for developers to monitor their domain statuses and for users to verify the authenticity of applications before re-engaging with them. The incident serves as a reminder of the ongoing risks associated with abandoned software and the importance of cybersecurity vigilance.

Impact: Inactive Snapcraft applications
Remediation: Developers should monitor domain statuses and users should verify application authenticity.
Read Original

On December 29, 2025, the Sandworm hacking group attempted a cyberattack on Poland's power infrastructure, deploying a new wiper malware called DynoWiper. This malware is designed to erase data and disrupt operations, posing a significant threat to critical systems. ESET, the cybersecurity firm that reported the incident, noted that the attack could have serious implications for power stability and national security in Poland. As the incident unfolds, it raises concerns about the vulnerabilities in power grids and the potential for similar attacks on other nations. The situation underscores the ongoing risks posed by state-sponsored cyber activities.

Impact: Poland's power system
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has published a list of products that are capable of using post-quantum cryptography (PQC) in response to potential threats posed by quantum computing. This list is intended to assist businesses in identifying hardware and software that can better protect sensitive information against future quantum attacks, which could compromise current encryption standards. As quantum computing technology evolves, traditional encryption methods may become vulnerable, making this guidance particularly relevant for organizations looking to future-proof their security measures. The release emphasizes the importance of preparing for these advancements in technology and the potential risks they bring. Companies are encouraged to review the list to ensure they are equipped with the necessary tools to safeguard their data.

Impact: PQC-capable hardware and software
Remediation: Companies should assess and integrate PQC-capable products as recommended by CISA.
Read Original

Researchers discovered over 20 security vulnerabilities in Dormakaba's physical access control systems, which are used by various major companies across Europe. These flaws could potentially allow hackers to unlock doors and gain unauthorized access to secure areas. The vulnerabilities were identified and subsequently patched, but the incident raises concerns about the security of access systems that protect sensitive locations. Companies using Dormakaba products need to ensure that their systems are updated to avoid exploitation. This situation serves as a reminder of the importance of regularly reviewing and updating security measures in physical access systems.

Impact: Dormakaba physical access control systems
Remediation: Patches have been released for the identified vulnerabilities; users should update their systems to the latest version.
Read Original

Researchers have identified a new threat from North Korea's Konni group, which is targeting blockchain developers with a PowerShell backdoor. This malicious software aims to infiltrate development environments and steal cryptocurrency holdings. The attackers are using AI-generated techniques to enhance their capabilities, making it easier for them to compromise systems and access sensitive data. This development poses a significant risk to individuals and companies involved in cryptocurrency, highlighting the need for enhanced security measures in development practices. As the threat evolves, developers need to be particularly vigilant about the tools and scripts they use in their environments.

Impact: Blockchain development environments, cryptocurrency holdings
Remediation: Developers should implement strict access controls, regularly update security software, and monitor for unusual activity in their environments. Additionally, using code reviews and security audits can help identify potential vulnerabilities.
Read Original

Crunchbase has confirmed a data breach after the hacking group ShinyHunters announced that they stole over 2 million personal records from the company. The breach was made public when ShinyHunters leaked a 402 MB compressed archive containing the data on their website, which they did following a failed attempt at extorting Crunchbase. This incident raises concerns for users whose personal information may be exposed, potentially leading to identity theft or phishing attacks. Crunchbase's confirmation of the breach underscores the ongoing risks that companies face in securing sensitive user data. The situation highlights the need for organizations to bolster their cybersecurity measures to prevent similar incidents in the future.

Impact: Crunchbase user accounts and personal records
Remediation: N/A
Read Original

As organizations increasingly rely on Okta for identity management, misconfigurations can unintentionally compromise security. Nudge Security has identified six specific settings in Okta that many teams overlook, which can lead to vulnerabilities in their SaaS environments. These settings, if not properly configured, could weaken the overall identity security and increase the risk of unauthorized access. The article emphasizes the importance of regularly reviewing and adjusting these settings to ensure that security measures keep pace with evolving threats. For businesses that utilize Okta, addressing these overlooked configurations is crucial to safeguarding user identities and sensitive data.

Impact: Okta identity management platform
Remediation: Regularly review and adjust Okta security settings as suggested by Nudge Security.
Read Original
Actively Exploited

Researchers from Fortra have identified a new SEO poisoning scheme named 'HaxorSEO.' This operation aims to manipulate search engine results to direct unsuspecting users to malicious websites. The attackers exploit popular search terms to increase the visibility of their harmful content, which can lead to malware infections or phishing attempts. This discovery is significant because it highlights the ongoing tactics used by cybercriminals to deceive users and compromise their security. Companies and internet users need to be vigilant about the links they click on, especially those appearing in search results, to avoid falling victim to these kinds of attacks.

Impact: N/A
Remediation: Users are advised to be cautious when clicking on search results and to use reputable security software to help identify and block malicious sites.
Read Original

Recent discussions during the Pall Mall Process have focused on establishing voluntary guidelines for commercial hacking tools. This initiative involves input from various sectors, including industry representatives, government officials, and nonprofit organizations. The goal is to create a framework that addresses the ethical use of these tools, which can be misused for malicious purposes. As hacking tools become more accessible, the need for regulation is becoming increasingly urgent to prevent potential abuse. The outcomes of these discussions could shape how hacking tools are developed and used, impacting cybersecurity practices across multiple sectors.

Impact: N/A
Remediation: N/A
Read Original

Recent findings reveal that the security measures NPM implemented after the Shai-Hulud supply-chain attacks have vulnerabilities that can be exploited by hackers. Specifically, attackers can bypass these defenses by using Git dependencies, which undermines the protections designed to prevent malicious code from infiltrating projects. This issue affects developers and companies relying on NPM for package management, as it opens the door for potentially harmful code to be included in their applications. The ability for threat actors to exploit these weaknesses highlights the ongoing risks in software supply chains, making it crucial for developers to be vigilant when using Git dependencies. Understanding and addressing these vulnerabilities is essential to maintaining security in the software ecosystem.

Impact: NPM, Git dependencies
Remediation: Developers should review their use of Git dependencies and implement stricter controls on package sourcing and validation.
Read Original
PreviousPage 16 of 88Next