Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The article discusses the importance of securing medical devices against cyber threats. With the increasing connectivity of these devices, such as pacemakers and insulin pumps, vulnerabilities could potentially allow attackers to manipulate their functions, posing serious risks to patient safety. The article emphasizes that manufacturers must prioritize security measures during the design and development phases of these devices. Additionally, it calls for regulatory bodies to establish stricter guidelines to ensure that medical devices meet security standards before they reach the market. This is crucial as healthcare systems become more reliant on technology, making them attractive targets for cybercriminals.

Impact: Medical devices like pacemakers, insulin pumps, and other connected health devices
Remediation: Manufacturers should implement security protocols during the design process and comply with regulatory security guidelines.
Read Original

Ericsson US has confirmed a data breach resulting from an attack on a third-party service provider. This incident has put the personal information of an unknown number of employees and customers at risk. The company did not specify the exact details of the breach, such as how many individuals were affected or what specific types of data were compromised. This situation raises concerns about the security of third-party vendors, as they can often serve as weak links in a company's overall cybersecurity posture. Users and customers of Ericsson should be vigilant about potential phishing attempts or identity theft as a result of this breach.

Impact: Employee and customer personal information
Remediation: N/A
Read Original

In March 2026, a significant security update was released, addressing eight critical vulnerabilities among a total of 82 Common Vulnerabilities and Exposures (CVEs). Two of these vulnerabilities had been publicly disclosed before the patch, raising concerns about their potential exploitation. The vulnerabilities affect various products and systems, making it crucial for organizations and users to apply the updates promptly to safeguard their environments. The nature of these vulnerabilities could allow attackers to gain unauthorized access or disrupt services, emphasizing the need for vigilance in maintaining software security. Companies and IT departments should prioritize these patches to mitigate risks associated with these newly identified threats.

Impact: Various products and systems, specific vendors and versions not specified
Remediation: Patches for the vulnerabilities are included in the March 2026 Patch Tuesday update; users should apply these updates immediately.
Read Original

The Department of Health and Human Services (HHS) has rolled out an updated toolkit designed to assist healthcare organizations in evaluating their cybersecurity measures. This Risk Identification and Site Criticality toolkit aims to help these organizations spot potential vulnerabilities and assess their readiness against cyber threats. With the healthcare sector frequently targeted by cyberattacks, this initiative is crucial for ensuring patient data security and maintaining operational integrity. By providing a structured approach to risk assessment, the HHS hopes to bolster the overall cybersecurity posture of healthcare facilities nationwide. This toolkit is a significant step in addressing the growing concerns over cybersecurity in the healthcare industry.

Impact: N/A
Remediation: N/A
Read Original

The House Energy and Commerce Committee has taken a significant step by approving a bipartisan package of cybersecurity bills aimed at strengthening the protection of the energy sector. Leading this initiative is the Rural and Municipal Utility Cybersecurity Act, which focuses on enhancing cybersecurity measures for smaller utilities that may lack the resources of larger companies. This legislation is crucial as it addresses the vulnerabilities in the energy infrastructure that could be targeted by cyberattacks. By promoting cybersecurity readiness among rural and municipal utilities, the bill aims to safeguard essential services against potential disruptions. The approval of this package reflects a growing recognition of the need for robust cybersecurity frameworks in the energy sector, especially as threats continue to evolve.

Impact: Rural and Municipal Utilities
Remediation: N/A
Read Original
Dutch Intel Warns of Russian Hackers Hijacking Signal, WhatsApp Attacks

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Dutch intelligence agencies have issued a warning about Russian hackers who are targeting Signal and WhatsApp accounts. These attackers are using fake support bots and scams that trick users into providing verification codes. The primary targets of these scams are officials and journalists, raising concerns about the potential for unauthorized access to sensitive communications. This incident highlights the ongoing risks posed by cybercriminals and the need for users to be vigilant when managing their online accounts. As these platforms are commonly used for secure communication, any compromise could have serious implications for privacy and security.

Impact: Signal, WhatsApp
Remediation: Users should enable two-factor authentication and be cautious of unsolicited messages or requests for verification codes.
Read Original
Actively Exploited

The FBI has issued a warning about a new phishing scam targeting individuals and businesses applying for planning and zoning permits. Scammers are posing as city and county officials, using publicly available information to create convincing messages that trick applicants into providing sensitive information. This attack not only affects those seeking permits but also raises concerns about the security of public records and how easily they can be exploited. As more people engage with local government processes online, it's crucial for applicants to remain vigilant and verify the legitimacy of any communications they receive. This incident underscores the need for awareness around phishing tactics that exploit public data.

Impact: Individuals and businesses applying for planning and zoning permits
Remediation: Verify the source of any communication before providing personal information; report suspicious messages to local authorities or the FBI.
Read Original

Ericsson Inc., the U.S. branch of the Swedish telecommunications company, has reported a data breach resulting from a cyberattack on one of its service providers. The breach has led to the theft of sensitive information belonging to an undisclosed number of employees and customers. While the company has not specified the exact nature of the stolen data or the service provider involved, this incident raises significant concerns about the security of third-party vendors and their impact on larger organizations. The breach highlights the ongoing risks companies face from attacks that exploit vulnerabilities in their supply chains. Users and businesses associated with Ericsson should remain vigilant and monitor for any unusual activity related to their data.

Impact: Data belonging to Ericsson employees and customers
Remediation: N/A
Read Original

The article discusses a significant shift in cybersecurity policy under former President Trump, moving away from a secure-by-design approach to one that emphasizes offensive operations. This change suggests that the U.S. may focus more on proactive measures, potentially targeting adversaries before they can launch attacks. The implications of this policy could affect various sectors, including government and private industry, as it raises questions about the legality and ethics of offensive cyber actions. By harnessing artificial intelligence, the policy aims to enhance the effectiveness of these operations but also opens up discussions about the potential risks involved. Overall, this shift reflects a broader strategy in national security that prioritizes preemptive actions in cyberspace.

Impact: N/A
Remediation: N/A
Read Original

OpenAI is set to acquire Promptfoo, a platform that specializes in securing AI systems. The goal of this acquisition is to enhance OpenAI's Frontier platform, which is designed for developing and managing AI coworkers. As more businesses begin to integrate AI into their operations, the need for thorough testing and risk assessment of these systems has become increasingly important. Promptfoo's technology will help enterprises identify vulnerabilities during the development phase, ensuring that AI agents function safely and comply with necessary regulations. This move signifies a proactive approach to AI security, addressing the potential risks associated with deploying AI in real-world applications.

Impact: OpenAI Frontier, Promptfoo
Remediation: N/A
Read Original

A recent discussion has emerged about the increasing use of AI agents in workplaces, which are starting to resemble human employees in their functions. However, these AI agents are often not governed properly, leading to significant security concerns. Without appropriate oversight, they can inadvertently expose sensitive information or make decisions that compromise security. This situation affects companies that utilize AI tools without adequate policies in place to manage their behavior and interactions. As AI continues to play a larger role in business operations, it's crucial for organizations to establish clear governance frameworks to mitigate these risks.

Impact: AI agents used in workplace environments
Remediation: Establish governance frameworks for AI usage, implement oversight measures, develop policies for AI interaction and data handling
Read Original
Fake CleanMyMac Site Uses ClickFix Trick to Install SHub Stealer on macOS

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Researchers have identified a fraudulent website mimicking CleanMyMac that employs a ClickFix attack to install SHub Stealer malware on macOS devices. This malicious software is designed to steal sensitive information, including passwords and cryptocurrency wallet data. Users who unknowingly download this malware may face significant risks to their personal and financial security. The incident serves as a reminder for macOS users to be cautious about where they download software and to verify the authenticity of websites before entering any personal information. Ensuring that systems are protected with up-to-date security measures is crucial in preventing such attacks.

Impact: macOS devices, CleanMyMac software
Remediation: Users should avoid downloading software from unofficial or suspicious websites. It's essential to verify the authenticity of software sources and keep macOS security features up to date.
Read Original

Sean Cairncross, the national cyber director, is advocating for a new cyber strategy that integrates cyber operations with diplomacy, law enforcement, and corporate accountability. This approach aims to strengthen the cybersecurity posture of organizations by pressuring CEOs to improve their security measures. Cairncross believes that a collaborative effort among government agencies, private sector leaders, and international partners is essential to address the growing cyber threats. This strategy reflects a shift towards a more unified front against cyber adversaries, emphasizing the need for proactive measures rather than reactive responses. The implications of this strategy could significantly impact how organizations manage their cybersecurity risks and collaborate with government entities.

Impact: N/A
Remediation: N/A
Read Original

Microsoft is rolling out a new feature for Teams that will automatically tag third-party bots trying to join meetings. This update will place these bots in a lobby, giving meeting organizers the ability to control whether they can enter the meeting or not. This move aims to enhance security by preventing unauthorized or unwanted bots from participating in discussions. It’s particularly significant for organizations that rely on Teams for sensitive communications, as it allows them to maintain better oversight over who can access their meetings. As more companies integrate bots into their workflows, ensuring that only trusted applications can join meetings becomes increasingly important for maintaining data security and privacy.

Impact: Microsoft Teams, third-party bots
Remediation: N/A
Read Original

Researchers from Huntress have identified a campaign where attackers are exploiting vulnerabilities to steal sensitive data. These attackers are using Elastic Cloud as a central hub for managing the stolen information. This method not only showcases the attackers' ability to exploit weaknesses in systems but also raises concerns about how cloud services can be misused in cyberattacks. Organizations that rely on Elastic Cloud need to be especially vigilant, as the stolen data can lead to further breaches or unauthorized access. Understanding these tactics is crucial for companies to enhance their security measures and protect against potential threats.

Impact: Elastic Cloud
Remediation: Organizations should review their security configurations, apply relevant patches, and monitor for unusual activity in their Elastic Cloud environments.
Read Original
PreviousPage 17 of 121Next