Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Recent findings reveal that the security measures NPM implemented after the Shai-Hulud supply-chain attacks have vulnerabilities that can be exploited by hackers. Specifically, attackers can bypass these defenses by using Git dependencies, which undermines the protections designed to prevent malicious code from infiltrating projects. This issue affects developers and companies relying on NPM for package management, as it opens the door for potentially harmful code to be included in their applications. The ability for threat actors to exploit these weaknesses highlights the ongoing risks in software supply chains, making it crucial for developers to be vigilant when using Git dependencies. Understanding and addressing these vulnerabilities is essential to maintaining security in the software ecosystem.

Impact: NPM, Git dependencies
Remediation: Developers should review their use of Git dependencies and implement stricter controls on package sourcing and validation.
Read Original
Nike Data Breach Claims Surface as WorldLeaks Leaks 1.4TB of Files Online

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A significant data breach involving Nike has come to light, with the hacking group WorldLeaks leaking approximately 1.4 terabytes of sensitive files online. This leak reportedly includes internal documents, customer data, and other confidential information. The breach appears to coincide with ongoing concerns about data security at various companies, including Under Armour. With the scale of the leak, there are serious implications for Nike's customers and partners, as their personal information may be at risk. Companies like Nike must enhance their cybersecurity measures to prevent such incidents and protect their users' data.

Impact: Nike customer data, internal Nike documents
Remediation: Companies should assess their security protocols and enhance data protection measures.
Read Original

Poland recently thwarted a cyberattack aimed at its energy infrastructure, attributed to suspected Russian hackers. The attack occurred on December 29 and 30, 2025, targeting two combined heat and power plants and a system that manages electricity from renewable sources like wind and solar. Fortunately, the malware designed to wipe data failed to execute its intended damage. This incident emphasizes the ongoing risks that critical infrastructure faces from cyber threats, particularly from state-sponsored actors, and highlights the importance of robust cybersecurity measures in the energy sector to protect against such attacks in the future.

Impact: Combined heat and power plants, electricity management systems for wind turbines and photovoltaic farms.
Remediation: N/A
Read Original

Crunchbase has confirmed it was part of a data breach following claims by the hacking group ShinyHunters. Along with Crunchbase, SoundCloud and Betterment were also targeted in this campaign. The attackers reportedly accessed sensitive data, although specific details about the type of information compromised have not been disclosed. This incident raises concerns about the security of user data across these platforms and highlights the ongoing risks posed by organized hacking groups. Companies like Crunchbase are now under pressure to enhance their security measures to protect user information from future breaches.

Impact: Crunchbase, SoundCloud, Betterment
Remediation: N/A
Read Original

Okta has reported a new type of vishing attack where scammers impersonate IT support teams to steal user credentials. These attackers create fake login pages in real-time using phishing kits, which makes it challenging for victims to detect the fraud. This method allows them to bypass multi-factor authentication (MFA), a security measure that many organizations use to protect sensitive information. Users who fall for this trick may unknowingly provide their login details, putting their accounts and sensitive data at risk. Companies should remain vigilant and educate employees about these tactics to prevent successful attacks.

Impact: Okta users, organizations relying on MFA
Remediation: Educate users on recognizing phishing attempts, implement additional security measures, and monitor for suspicious login activity.
Read Original

The Irish government is set to enhance police powers regarding digital surveillance, which includes the ability to intercept communications, even those that are encrypted, as well as the legal use of spyware. This move aims to provide law enforcement with better resources to combat crime, particularly in the context of increasing digital threats. However, it raises significant concerns about privacy and civil liberties, as the potential for abuse of such powers could infringe on citizens' rights. The proposal is part of a broader trend where governments are seeking more control over digital communications in response to evolving security challenges. The implications for users and their data privacy could be profound, sparking debates on the balance between security and individual rights.

Impact: N/A
Remediation: N/A
Read Original

This week, cybersecurity experts noted a series of vulnerabilities and security incidents that demonstrate how attackers are exploiting both old and new methods to breach systems. Flaws in firewalls and browser-based traps are particularly concerning, as they reveal weaknesses in tools that users often trust. These security lapses suggest that just because a software issue has been patched doesn't mean it is safe. The ongoing evolution of malware, including AI-generated variants, presents a significant challenge for companies trying to defend against increasingly sophisticated threats. Organizations need to stay vigilant and update their defenses regularly to protect against these emerging risks.

Impact: Firewall systems, web browsers, user systems
Remediation: Regularly update firewall and browser software; implement security patches as they become available; conduct routine security audits.
Read Original

A new malware toolkit called 'Stanley' is being sold on cybercrime forums for between $2,000 and $6,000. This toolkit enables attackers to create counterfeit websites that mimic legitimate ones, facilitating phishing attacks. The post claims that the toolkit can publish these fraudulent sites on the Chrome Web Store, increasing their visibility and potential for success. This poses a significant risk to users who may unknowingly provide sensitive information to these spoofed sites. The emergence of such tools highlights the ongoing challenges in combating online fraud and the need for users to be vigilant when navigating web applications.

Impact: Chrome Web Store, phishing websites
Remediation: Users should be cautious when entering personal information online and verify website legitimacy. Companies should enhance their security measures and educate users on phishing risks.
Read Original

Poland's energy sector recently faced a severe cyber attack attributed to the Russian hacking group Sandworm. This incident involved a wiper malware that aimed to disrupt the functioning of the power grid, posing significant risks to the country's energy stability. Authorities have raised alarms about the potential for further attacks, as Sandworm is known for its destructive tactics and has previously targeted critical infrastructure. The implications of this attack extend beyond Poland, reflecting ongoing geopolitical tensions and the vulnerability of national infrastructures to cyber warfare. As the situation develops, experts urge energy companies to enhance their cybersecurity measures to prevent similar incidents in the future.

Impact: Polish power grid and energy sector
Remediation: Energy companies should enhance cybersecurity measures and conduct thorough risk assessments.
Read Original

Researchers at Check Point have linked an active phishing campaign to the North Korean hacking group KONNI, also known by several other names. This campaign specifically targets software developers and engineers, using deceptive emails that present fake documentation related to blockchain projects. The attackers are employing an AI-generated PowerShell backdoor to infiltrate systems. This tactic not only showcases the group's evolving methods but also raises concerns about the security of developers working in the rapidly growing blockchain sector. The implications are significant, as successful compromises could lead to data theft and further exploitation of vulnerabilities within the tech community.

Impact: Developers, software engineers, blockchain project documentation
Remediation: Users should be cautious of unsolicited emails, verify the authenticity of project documentation, and employ security measures such as anti-phishing tools and regular system updates.
Read Original

Google is enhancing its Search functionality by integrating AI capabilities that connect with users' Gmail and Google Photos. This upgrade, available to AI Pro and AI Ultra subscribers, aims to provide more personalized search results by understanding users' preferences and plans without the need for repeated input. However, this move raises privacy concerns as it involves accessing personal data from multiple Google services. Users may worry about how their information is used and whether it could be exposed or mismanaged. As Google continues to expand its AI offerings, the implications for user privacy and data security are becoming increasingly significant.

Impact: Google Search, Gmail, Google Photos
Remediation: Users should review their privacy settings and consider the implications of allowing AI to access their personal data across services.
Read Original

Russian hackers known as Sandworm have been accused of launching a cyberattack on Poland's power grid using data-wiping malware. This incident comes a decade after they disrupted the Ukrainian power grid, indicating a pattern of targeting critical infrastructure in Eastern Europe. The attack poses significant risks, not only to Poland's energy supply but also raises concerns about regional security and the potential for similar incidents in other countries. As tensions between Russia and NATO continue, this incident could escalate fears about cyber warfare and its impact on national security. Authorities are investigating the attack and assessing the full extent of its impact on the power grid operations.

Impact: Polish power grid systems
Remediation: N/A
Read Original

In December 2025, Poland experienced a significant cyber attack on its power grid, attributed to the Russia-linked hacking group Sandworm. Researchers from ESET analyzed the malware involved and determined that the attack was one of the largest targeting Poland's energy infrastructure. The involvement of Sandworm, known for its previous cyber operations, raises concerns about the security of critical national systems. This incident not only endangers the stability of Poland's energy supply but also highlights the ongoing risks posed by state-sponsored cyber threats in Europe. As nations increasingly rely on digital infrastructure, the implications for energy security and national defense become more pronounced.

Impact: Poland's power grid and energy system
Remediation: N/A
Read Original

A newly discovered vulnerability in VMware products allows attackers to execute remote code by sending specially crafted network packets. This critical-severity flaw poses a serious risk for organizations using affected VMware systems, as it could lead to unauthorized access and control over their networks. VMware has not specified which products are impacted, but the nature of the vulnerability suggests that any systems relying on VMware technologies could be at risk. Companies should prioritize patching their systems as soon as updates are available to prevent potential exploitation. The urgency is heightened as this vulnerability is now a target for attackers.

Impact: VMware products (specific products not specified)
Remediation: Organizations should apply patches and updates as soon as they are released by VMware to mitigate the risk.
Read Original

Amazon Web Services (AWS) has released an updated compliance report for its Payment Cryptography service, confirming that it meets Payment Card Industry Personal Identification Number (PCI PIN) standards. This update follows a thorough audit by a Qualified Security Assessor (QSA). The compliance package is now available on AWS's compliance portal and includes an Attestation of Compliance (AOC) as well as additional documentation. This is significant for businesses using AWS Payment Cryptography, as it assures them that the service adheres to stringent security measures for handling payment data. Ensuring compliance not only helps protect sensitive information but also builds trust with customers who rely on secure payment processing.

Impact: AWS Payment Cryptography service
Remediation: N/A
Read Original
PreviousPage 17 of 88Next