Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A recently discovered vulnerability, tracked as CVE-2026-6770, allowed attackers to track and fingerprint users of Firefox and the Tor Browser, even when they were using Private Browsing mode. This flaw could bypass Tor's New Identity feature, which is designed to enhance privacy. As a result, both Firefox version 150 and Tor Browser version 15.0.10 have released updates to address this issue. This vulnerability is particularly concerning because it compromises the privacy protections that users rely on, especially those using Tor for anonymous browsing. Users are urged to update their browsers promptly to protect against this tracking risk.

Impact: Firefox version 150, Tor Browser version 15.0.10
Remediation: Users should update to Firefox version 150 and Tor Browser version 15.0.10 to mitigate this vulnerability.
Read Original

A group identified as UNC6692 is using email bombing tactics and social engineering to spread the Snow malware family, which includes variants like Snowbelt, Snowglaze, and Snowbasin. This malware provides attackers with persistent access to infected systems, raising significant concerns for both individuals and organizations. The methods employed, such as overwhelming targets with emails to trick them into clicking malicious links, illustrate the evolving strategies cybercriminals use to gain entry. Victims of this campaign may face data theft or further exploitation, making it crucial for users to remain vigilant against suspicious emails and to enhance their cybersecurity measures. As these types of attacks become more sophisticated, organizations need to prioritize employee training on recognizing phishing attempts and implementing strong security protocols.

Impact: Snow malware family (Snowbelt, Snowglaze, Snowbasin)
Remediation: Users should enhance email filtering, educate employees on identifying phishing attempts, and implement multi-factor authentication to mitigate risks.
Read Original

The U.S. has launched a significant crackdown on cyberscam operations in Southeast Asia, which officials are describing as a new front in the fight against cybercrime. This initiative includes sanctions against a Cambodian senator believed to be involved in facilitating these scams. The crackdown aims to dismantle networks that have been scamming individuals, particularly targeting vulnerable populations in the region. By taking these actions, U.S. authorities hope to disrupt the operations and reduce the impact of these scams, which have been a growing concern in recent years. This move not only addresses immediate threats but also sends a message about the U.S. commitment to combating international cybercrime.

Impact: Southeast Asian cyberscam operations, Cambodian senator involved
Remediation: N/A
Read Original

Researchers have discovered a malware strain called 'fast16' that is believed to have targeted Iran's nuclear program before the well-known Stuxnet attack. This malware predates Stuxnet and indicates that cyber attacks on critical infrastructure may have been more advanced than previously thought. Fast16's potential use against Iran's nuclear facilities raises concerns about the cybersecurity of similar systems worldwide. Understanding this malware could provide insights into the tactics and techniques used by attackers in state-sponsored cyber operations, making it essential for governments and companies to enhance their defenses against such threats.

Impact: Iran's nuclear program and potentially other critical infrastructure systems.
Remediation: N/A
Read Original

A recently discovered vulnerability in Firefox, tracked as CVE-2026-6770, could allow attackers to fingerprint users of the Tor network. This issue primarily affects users who rely on Firefox and Tor for enhanced privacy and anonymity. Fingerprinting techniques can be used to track users across the internet, undermining the very purpose of using Tor, which is designed to protect user identities. The vulnerability has been addressed in the latest updates, specifically Firefox version 150 and Tor version 15.0.10, which users are strongly encouraged to install promptly. By patching this vulnerability, both Mozilla and the Tor Project aim to reinforce the security measures that protect user privacy online.

Impact: Firefox versions prior to 150, Tor versions prior to 15.0.10
Remediation: Users should update to Firefox version 150 and Tor version 15.0.10 to mitigate this vulnerability.
Read Original

A new group called BlackFile has emerged, focusing on vishing attacks specifically targeting the retail and hospitality sectors. Researchers have identified that this group uses voice phishing techniques to steal sensitive information from employees and customers. By impersonating trusted entities, attackers manipulate individuals into revealing personal data, which can lead to financial losses and data breaches. The rise of such tactics raises concerns for companies in these industries, as they must bolster their defenses against socially engineered attacks. Awareness and training for employees on recognizing vishing attempts are crucial to mitigate this threat.

Impact: Retail and hospitality sectors
Remediation: Companies should implement employee training programs on recognizing social engineering tactics and enhance their verification processes for sensitive information requests.
Read Original

Itron, a major utility company, reported a security breach after unauthorized access to its internal IT systems was detected on April 13, 2026. The company quickly activated its incident response plan and brought in external cybersecurity experts to address the situation. Authorities were also notified as part of the response process. While specific details about the extent of the breach or the data involved have not been disclosed, incidents like this can pose significant risks to utility services and customer data security. The breach raises concerns about the vulnerabilities within critical infrastructure sectors and the potential impact on services reliant on Itron's technology.

Impact: Itron's internal IT systems
Remediation: Activated incident response plan, engaged external cybersecurity experts, notified authorities
Read Original

Researchers have uncovered a telecommunications fraud scheme that tricks users with fake CAPTCHA prompts. This scam encourages unsuspecting individuals to send international text messages, which then result in hefty charges on their mobile bills. The perpetrators of this scheme profit by leasing the phone numbers used in these fraudulent messages. According to a report from Infoblox, this operation is part of a larger trend involving multiple campaigns, including 120 distinct Keitaro campaigns, which are primarily aimed at generating revenue through SMS and cryptocurrency fraud. This incident serves as a reminder for users to be cautious when interacting with unfamiliar verification processes and to monitor their mobile usage closely.

Impact: Mobile users, telecom services
Remediation: Users should verify the legitimacy of CAPTCHA requests and monitor their mobile bills for unexpected charges.
Read Original
Microsoft Entra Agent ID Flaw Enabled Tenant Takeover via Privilege Escalation

Hackread – Cybersecurity News, Data Breaches, AI and More

A flaw in Microsoft Entra's Agent ID allowed for privilege escalation, which could lead to a complete tenant takeover through the misuse of Service Principals. This vulnerability posed a significant risk to organizations using Microsoft Entra, as it could enable attackers to gain unauthorized access to sensitive data and systems. Microsoft has since released a patch to address this issue, ensuring that affected users can secure their environments. It is crucial for companies to apply this update promptly to mitigate potential risks and protect their assets from exploitation. Regular monitoring and security practices should also be reinforced to prevent similar vulnerabilities in the future.

Impact: Microsoft Entra, Service Principal
Remediation: Fully patched by Microsoft
Read Original

The latest Security Affairs Malware newsletter highlights several emerging cybersecurity threats. One notable mention is Morpheus, a new spyware linked to IPS Intelligence, which poses risks to user privacy and data security. Additionally, the newsletter discusses DarkSword and Coruna, which are targeting vulnerabilities in iPhones, suggesting that even this previously secure platform is now at risk. Another significant threat is the Lotus Wiper, aimed at the energy and utilities sector, indicating a growing trend of cyberattacks on critical infrastructure. Lastly, a new variant of NGate has been reported, showcasing the ever-evolving landscape of malware. These developments emphasize the need for companies and individuals to stay vigilant and update their security measures.

Impact: iPhone, energy and utilities sector, IPS Intelligence systems
Remediation: Users should ensure their devices are updated with the latest security patches and consider employing advanced security measures to detect and mitigate spyware and malware.
Read Original
Fake CAPTCHA Scam Abuses Verification Clicks to Send Costly International Texts

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent study by Infoblox has uncovered a widespread scam that exploits fake CAPTCHA prompts and manipulates users into sending expensive international text messages. This Click2SMS fraud scheme tricks victims into believing they are completing a verification process, only to find themselves unknowingly agreeing to send costly texts to foreign numbers. The scam primarily targets unsuspecting individuals who may not be aware of the potential charges associated with these messages. As a result, this scheme poses a financial risk to users who fall victim to it. Awareness and caution are essential for individuals navigating online services that require CAPTCHA verification.

Impact: Users tricked into sending international text messages
Remediation: Users should be cautious of unsolicited CAPTCHA requests and verify the legitimacy of the service before proceeding.
Read Original

Researchers at SentinelOne have discovered a previously unknown malware framework called 'fast16,' which dates back to 2005. This Lua-based malware was designed to target high-precision calculation software, which is often used in engineering and industrial applications. The malware predates the infamous Stuxnet worm, which was aimed at disrupting Iran's nuclear program. The implications of fast16 are significant as it shows that cyber sabotage efforts have been in play for much longer than previously thought, raising concerns about the security of critical infrastructure and industrial systems. Companies using this type of software need to be aware of the potential risks and take steps to protect their systems.

Impact: High-precision calculation software used in engineering and industrial applications.
Remediation: Companies should assess their systems for vulnerabilities related to high-precision calculation software and implement security measures to mitigate potential risks.
Read Original

Recent attacks involving malicious browser extensions called 'AiFrame' are targeting users by injecting iframes that display phishing content. These extensions are designed to extract sensitive information from users, posing a significant risk to their online security. The attacks can compromise personal data, making it essential for users to be cautious about the extensions they install. This situation highlights the vulnerability of browser ecosystems, where seemingly benign add-ons can turn out to be harmful. Users are advised to only download extensions from trusted sources and to regularly review the permissions granted to their installed extensions.

Impact: Browser extensions, specifically 'AiFrame' extensions
Remediation: Users should avoid installing extensions from unverified sources, regularly check and remove suspicious extensions, and maintain updated antivirus software.
Read Original

A vulnerability known as 'Pack2TheRoot,' tracked as CVE-2026-41651, has been identified in Linux systems, allowing local users to gain root privileges without authorization. This flaw has existed for nearly 12 years and has been rated with a high severity score of 8.8. It enables unprivileged users to install or remove system packages, which could lead to complete control over the system. This issue affects any Linux distribution that utilizes PackageKit, making it a significant concern for users and administrators alike. Given the potential for exploitation, it is crucial for affected parties to take immediate action to secure their systems.

Impact: Linux systems using PackageKit
Remediation: Users should update their systems and apply any available patches for PackageKit. It is also advisable to restrict access to system package management tools and review user permissions to mitigate the risk of unauthorized access.
Read Original

A new hacking group known as BlackFile has emerged, targeting retail and hospitality organizations since February 2026. This group is primarily focused on data theft and extortion, escalating the risk for businesses in these sectors. Researchers found that BlackFile's tactics include vishing attacks, where attackers use phone calls to manipulate victims into revealing sensitive information. The implications of this surge are significant, as it not only threatens the financial stability of affected companies but also jeopardizes customer data and trust. As organizations in retail and hospitality deal with these threats, they need to enhance their security measures and employee training to mitigate the risks associated with such attacks.

Impact: Retail and hospitality organizations
Remediation: Organizations should enhance security measures and employee training to combat vishing attacks.
Read Original
PreviousPage 17 of 187Next