Recent findings reveal that the security measures NPM implemented after the Shai-Hulud supply-chain attacks have vulnerabilities that can be exploited by hackers. Specifically, attackers can bypass these defenses by using Git dependencies, which undermines the protections designed to prevent malicious code from infiltrating projects. This issue affects developers and companies relying on NPM for package management, as it opens the door for potentially harmful code to be included in their applications. The ability for threat actors to exploit these weaknesses highlights the ongoing risks in software supply chains, making it crucial for developers to be vigilant when using Git dependencies. Understanding and addressing these vulnerabilities is essential to maintaining security in the software ecosystem.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Hackread – Cybersecurity News, Data Breaches, AI, and More
A significant data breach involving Nike has come to light, with the hacking group WorldLeaks leaking approximately 1.4 terabytes of sensitive files online. This leak reportedly includes internal documents, customer data, and other confidential information. The breach appears to coincide with ongoing concerns about data security at various companies, including Under Armour. With the scale of the leak, there are serious implications for Nike's customers and partners, as their personal information may be at risk. Companies like Nike must enhance their cybersecurity measures to prevent such incidents and protect their users' data.
Help Net Security
Poland recently thwarted a cyberattack aimed at its energy infrastructure, attributed to suspected Russian hackers. The attack occurred on December 29 and 30, 2025, targeting two combined heat and power plants and a system that manages electricity from renewable sources like wind and solar. Fortunately, the malware designed to wipe data failed to execute its intended damage. This incident emphasizes the ongoing risks that critical infrastructure faces from cyber threats, particularly from state-sponsored actors, and highlights the importance of robust cybersecurity measures in the energy sector to protect against such attacks in the future.
Crunchbase has confirmed it was part of a data breach following claims by the hacking group ShinyHunters. Along with Crunchbase, SoundCloud and Betterment were also targeted in this campaign. The attackers reportedly accessed sensitive data, although specific details about the type of information compromised have not been disclosed. This incident raises concerns about the security of user data across these platforms and highlights the ongoing risks posed by organized hacking groups. Companies like Crunchbase are now under pressure to enhance their security measures to protect user information from future breaches.
Infosecurity Magazine
Okta has reported a new type of vishing attack where scammers impersonate IT support teams to steal user credentials. These attackers create fake login pages in real-time using phishing kits, which makes it challenging for victims to detect the fraud. This method allows them to bypass multi-factor authentication (MFA), a security measure that many organizations use to protect sensitive information. Users who fall for this trick may unknowingly provide their login details, putting their accounts and sensitive data at risk. Companies should remain vigilant and educate employees about these tactics to prevent successful attacks.
Schneier on Security
The Irish government is set to enhance police powers regarding digital surveillance, which includes the ability to intercept communications, even those that are encrypted, as well as the legal use of spyware. This move aims to provide law enforcement with better resources to combat crime, particularly in the context of increasing digital threats. However, it raises significant concerns about privacy and civil liberties, as the potential for abuse of such powers could infringe on citizens' rights. The proposal is part of a broader trend where governments are seeking more control over digital communications in response to evolving security challenges. The implications for users and their data privacy could be profound, sparking debates on the balance between security and individual rights.
The Hacker News
This week, cybersecurity experts noted a series of vulnerabilities and security incidents that demonstrate how attackers are exploiting both old and new methods to breach systems. Flaws in firewalls and browser-based traps are particularly concerning, as they reveal weaknesses in tools that users often trust. These security lapses suggest that just because a software issue has been patched doesn't mean it is safe. The ongoing evolution of malware, including AI-generated variants, presents a significant challenge for companies trying to defend against increasingly sophisticated threats. Organizations need to stay vigilant and update their defenses regularly to protect against these emerging risks.
A new malware toolkit called 'Stanley' is being sold on cybercrime forums for between $2,000 and $6,000. This toolkit enables attackers to create counterfeit websites that mimic legitimate ones, facilitating phishing attacks. The post claims that the toolkit can publish these fraudulent sites on the Chrome Web Store, increasing their visibility and potential for success. This poses a significant risk to users who may unknowingly provide sensitive information to these spoofed sites. The emergence of such tools highlights the ongoing challenges in combating online fraud and the need for users to be vigilant when navigating web applications.
Infosecurity Magazine
Poland's energy sector recently faced a severe cyber attack attributed to the Russian hacking group Sandworm. This incident involved a wiper malware that aimed to disrupt the functioning of the power grid, posing significant risks to the country's energy stability. Authorities have raised alarms about the potential for further attacks, as Sandworm is known for its destructive tactics and has previously targeted critical infrastructure. The implications of this attack extend beyond Poland, reflecting ongoing geopolitical tensions and the vulnerability of national infrastructures to cyber warfare. As the situation develops, experts urge energy companies to enhance their cybersecurity measures to prevent similar incidents in the future.
Researchers at Check Point have linked an active phishing campaign to the North Korean hacking group KONNI, also known by several other names. This campaign specifically targets software developers and engineers, using deceptive emails that present fake documentation related to blockchain projects. The attackers are employing an AI-generated PowerShell backdoor to infiltrate systems. This tactic not only showcases the group's evolving methods but also raises concerns about the security of developers working in the rapidly growing blockchain sector. The implications are significant, as successful compromises could lead to data theft and further exploitation of vulnerabilities within the tech community.
Google is enhancing its Search functionality by integrating AI capabilities that connect with users' Gmail and Google Photos. This upgrade, available to AI Pro and AI Ultra subscribers, aims to provide more personalized search results by understanding users' preferences and plans without the need for repeated input. However, this move raises privacy concerns as it involves accessing personal data from multiple Google services. Users may worry about how their information is used and whether it could be exposed or mismanaged. As Google continues to expand its AI offerings, the implications for user privacy and data security are becoming increasingly significant.
Russian hackers known as Sandworm have been accused of launching a cyberattack on Poland's power grid using data-wiping malware. This incident comes a decade after they disrupted the Ukrainian power grid, indicating a pattern of targeting critical infrastructure in Eastern Europe. The attack poses significant risks, not only to Poland's energy supply but also raises concerns about regional security and the potential for similar incidents in other countries. As tensions between Russia and NATO continue, this incident could escalate fears about cyber warfare and its impact on national security. Authorities are investigating the attack and assessing the full extent of its impact on the power grid operations.
In December 2025, Poland experienced a significant cyber attack on its power grid, attributed to the Russia-linked hacking group Sandworm. Researchers from ESET analyzed the malware involved and determined that the attack was one of the largest targeting Poland's energy infrastructure. The involvement of Sandworm, known for its previous cyber operations, raises concerns about the security of critical national systems. This incident not only endangers the stability of Poland's energy supply but also highlights the ongoing risks posed by state-sponsored cyber threats in Europe. As nations increasingly rely on digital infrastructure, the implications for energy security and national defense become more pronounced.
SecurityWeek
A newly discovered vulnerability in VMware products allows attackers to execute remote code by sending specially crafted network packets. This critical-severity flaw poses a serious risk for organizations using affected VMware systems, as it could lead to unauthorized access and control over their networks. VMware has not specified which products are impacted, but the nature of the vulnerability suggests that any systems relying on VMware technologies could be at risk. Companies should prioritize patching their systems as soon as updates are available to prevent potential exploitation. The urgency is heightened as this vulnerability is now a target for attackers.
Amazon Web Services (AWS) has released an updated compliance report for its Payment Cryptography service, confirming that it meets Payment Card Industry Personal Identification Number (PCI PIN) standards. This update follows a thorough audit by a Qualified Security Assessor (QSA). The compliance package is now available on AWS's compliance portal and includes an Attestation of Compliance (AOC) as well as additional documentation. This is significant for businesses using AWS Payment Cryptography, as it assures them that the service adheres to stringent security measures for handling payment data. Ensuring compliance not only helps protect sensitive information but also builds trust with customers who rely on secure payment processing.