Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Checkmarx has confirmed that data from its GitHub repository was posted on the dark web following a supply chain attack on March 23, 2026. The company is currently investigating the breach and believes that the attackers gained access to its repository during this incident. This exposure could have significant implications for Checkmarx and its clients, as sensitive information may have been compromised. The incident highlights the ongoing risks associated with supply chain vulnerabilities, emphasizing the need for companies to enhance their security measures. As the investigation continues, Checkmarx is likely to provide further updates on the extent of the data breach and potential impacts on affected users.

Impact: Checkmarx GitHub repository data
Remediation: N/A
Read Original

A group of attackers known as BlackFile is actively extorting companies in the retail and hospitality sectors by threatening to release stolen data. Researchers believe these attackers are linked to another group called The Com. In a disturbing tactic, they have reportedly swatted company executives, which involves falsely reporting emergencies to law enforcement to create fear and pressure victims into complying with ransom demands. This aggressive strategy not only harms the targeted businesses but also raises concerns about the safety and privacy of their executives and employees. Companies in these sectors need to be vigilant about their cybersecurity measures and consider the potential risks of data breaches and extortion attempts.

Impact: Retail and hospitality sectors, company executives
Remediation: Companies should enhance their cybersecurity protocols, conduct employee training on social engineering attacks, and consider legal measures against extortion attempts.
Read Original

Itron, a technology supplier for utility companies, has reported a cyber incident but believes that its operations remain unaffected. The company has not provided detailed information about the nature of the attack or whether any sensitive data was compromised. Despite the incident, Itron reassured stakeholders that it does not expect any significant impact on its business. This revelation raises concerns about the cybersecurity measures in place within critical infrastructure sectors, as attacks on utility suppliers can have broader implications for service delivery and public safety. Stakeholders in the utilities sector should remain vigilant and conduct thorough assessments of their cybersecurity protocols.

Impact: N/A
Remediation: N/A
Read Original

Medtronic, a major player in the medical device industry, recently confirmed that its network was breached by hackers who accessed sensitive data from its corporate IT systems. The attackers claim to have stolen approximately 9 million records, raising significant concerns about the security of personal health information. While Medtronic has not disclosed specific details about the affected data or the nature of the breach, the incident underscores the vulnerability of healthcare organizations to cyberattacks. As the healthcare sector increasingly relies on digital systems, this breach serves as a reminder of the potential risks to patient privacy and the importance of robust cybersecurity measures. Medtronic is currently investigating the breach and working to secure its systems to prevent further incidents.

Impact: N/A
Remediation: N/A
Read Original

A Chinese national executed a spear-phishing campaign targeting NASA employees by impersonating a U.S. researcher. This deception led to the unauthorized sharing of sensitive information related to defense software and export controls. The NASA Office of Inspector General is investigating the incident, which raises concerns about national security and the vulnerability of governmental agencies to social engineering attacks. Such incidents can have serious implications, as they may compromise sensitive technologies and data. The case underscores the need for enhanced cybersecurity measures and employee training to prevent future breaches.

Impact: NASA systems, defense software related to exports
Remediation: Increased training for employees on recognizing phishing attempts, implementing stricter verification processes for sensitive information requests.
Read Original
LINKEDIN BROWSERGATE

Security Affairs

Actively Exploited

A recent investigation by Fairlinked, an organization representing LinkedIn users, alleges that LinkedIn is engaged in unauthorized user tracking through browser fingerprinting. This practice reportedly involves collecting device data and details from browser extensions, which are then sent to third parties in an encrypted format. The investigation claims this situation represents one of the largest data breaches and corporate espionage incidents in digital history. Users of LinkedIn may be unknowingly affected as their data could be used for tracking purposes without their consent. This raises significant privacy concerns and questions about how user data is managed by large platforms like LinkedIn.

Impact: LinkedIn, user data, browser extensions
Remediation: Users should review their browser extensions and privacy settings, consider limiting data sharing, and stay informed about updates from LinkedIn regarding data privacy practices.
Read Original
Actively Exploited

Recent findings reveal that numerous browser extensions are selling user data, as disclosed in their privacy policies. These extensions, which are widely used, have been caught sharing sensitive information with third parties, raising significant concerns about user privacy and data security. The issue affects a broad range of users who rely on these extensions for various functionalities, including ad-blocking and productivity enhancements. The implications are serious, as users may unknowingly expose their personal data, browsing habits, and even login credentials. This situation calls for heightened scrutiny from both users and regulatory bodies to ensure that privacy standards are upheld and to protect individuals from potential misuse of their data.

Impact: Browser extensions that sell user data
Remediation: Users should review the privacy policies of their installed extensions, consider removing those that sell data, and look for alternatives that prioritize user privacy.
Read Original

Researchers have discovered a malware framework called 'fast16' that dates back to 2004, making it five years older than the notorious Stuxnet. This malware is believed to have been used in cyber sabotage efforts, potentially setting a precedent for future attacks on critical infrastructure. The implications of this discovery are significant, as it suggests that sophisticated cyber threats have been around longer than previously understood. Fast16’s existence raises concerns about the security of various industrial systems that may still be vulnerable to similar attacks. Understanding its capabilities and origins could help organizations better defend against current and future threats.

Impact: N/A
Remediation: N/A
Read Original

A recently identified vulnerability in Windows has been exploited by APT28, a hacking group linked to Russia, in attacks targeting Ukraine and several EU nations. This flaw allows for zero-click attacks, meaning attackers can compromise systems without any user interaction. The incomplete patch aimed at fixing this vulnerability has raised concerns about its effectiveness, potentially leaving users at risk. The ongoing exploitation of this vulnerability poses a serious threat to sensitive data and national security for affected countries. As this situation evolves, it is crucial for Windows users to stay updated on patches and security advisories.

Impact: Windows operating systems
Remediation: Users should apply the latest security updates from Microsoft and monitor for any additional patches addressing this vulnerability.
Read Original

Evan Tangeman, a 22-year-old from Newport Beach, California, has been sentenced to 70 months in prison for his role in laundering funds from a significant cryptocurrency theft worth $230 million. This heist involved various cryptocurrencies, and Tangeman was part of a network that helped obscure the origins of the stolen money. The case highlights the ongoing challenges in tracking illicit cryptocurrency transactions and the legal consequences for those involved in such activities. With the rise of digital currencies, law enforcement is increasingly focused on cracking down on money laundering schemes tied to these assets. The sentence serves as a warning to others who might consider engaging in similar illegal actions.

Impact: Cryptocurrency assets, specifically those involved in the $230 million theft.
Remediation: Individuals and institutions should enhance their monitoring of cryptocurrency transactions and report suspicious activities to authorities.
Read Original

A significant vulnerability in OpenSSH has been discovered, allowing attackers to gain full root shell access to affected systems. This flaw, which has been present for 15 years, stems from a coding issue that misinterprets comma characters in certificate principals as list separators. As a result, unauthorized users could exploit this vulnerability to escalate privileges and take control of systems. OpenSSH is widely used for secure remote access, making this a serious concern for organizations relying on it for security. Users and administrators are urged to review their systems and apply any available patches to mitigate this risk.

Impact: OpenSSH versions with the flaw, affecting both client and server implementations.
Remediation: Apply patches or updates as they become available from OpenSSH maintainers; review configurations to ensure proper handling of certificate principals.
Read Original

Google has reported an increase in malicious AI prompt injection attacks, although many of these attempts are not sophisticated and pose little harm. Some of these exploits have been identified as potentially dangerous, indicating that while attackers are becoming more active, their methods remain relatively basic. The findings suggest that users and organizations interacting with AI systems should be aware of the risks associated with prompt injections. As AI technology continues to evolve, the security implications of these attacks could become more significant, making it essential for developers and users alike to stay vigilant and informed about the potential for exploitation.

Impact: AI systems and applications that utilize prompt inputs.
Remediation: Users and developers should implement input validation and filtering mechanisms to mitigate the risk of prompt injection attacks.
Read Original

PhantomCore, a pro-Ukrainian hacktivist group, has been targeting TrueConf video conferencing software in Russia since September 2025. Researchers from Positive Technologies reported that the group is exploiting a series of three vulnerabilities to gain remote access to affected systems. This attack is significant as it affects servers that may be crucial for communications in various sectors, potentially disrupting operations and compromising sensitive information. The ongoing nature of these attacks raises concerns for organizations using TrueConf, as they may be at risk of unauthorized access and data breaches. Users of this software are advised to remain vigilant and implement security measures to protect their systems.

Impact: TrueConf video conferencing software
Remediation: Users should apply any available patches for TrueConf, ensure that their systems are updated, and implement strong access controls to mitigate risks.
Read Original

A recently discovered vulnerability, tracked as CVE-2026-6770, allowed attackers to track and fingerprint users of Firefox and the Tor Browser, even when they were using Private Browsing mode. This flaw could bypass Tor's New Identity feature, which is designed to enhance privacy. As a result, both Firefox version 150 and Tor Browser version 15.0.10 have released updates to address this issue. This vulnerability is particularly concerning because it compromises the privacy protections that users rely on, especially those using Tor for anonymous browsing. Users are urged to update their browsers promptly to protect against this tracking risk.

Impact: Firefox version 150, Tor Browser version 15.0.10
Remediation: Users should update to Firefox version 150 and Tor Browser version 15.0.10 to mitigate this vulnerability.
Read Original

A group identified as UNC6692 is using email bombing tactics and social engineering to spread the Snow malware family, which includes variants like Snowbelt, Snowglaze, and Snowbasin. This malware provides attackers with persistent access to infected systems, raising significant concerns for both individuals and organizations. The methods employed, such as overwhelming targets with emails to trick them into clicking malicious links, illustrate the evolving strategies cybercriminals use to gain entry. Victims of this campaign may face data theft or further exploitation, making it crucial for users to remain vigilant against suspicious emails and to enhance their cybersecurity measures. As these types of attacks become more sophisticated, organizations need to prioritize employee training on recognizing phishing attempts and implementing strong security protocols.

Impact: Snow malware family (Snowbelt, Snowglaze, Snowbasin)
Remediation: Users should enhance email filtering, educate employees on identifying phishing attempts, and implement multi-factor authentication to mitigate risks.
Read Original
PreviousPage 16 of 187Next