Russian hackers known as Sandworm have been accused of launching a cyberattack on Poland's power grid using data-wiping malware. This incident comes a decade after they disrupted the Ukrainian power grid, indicating a pattern of targeting critical infrastructure in Eastern Europe. The attack poses significant risks, not only to Poland's energy supply but also raises concerns about regional security and the potential for similar incidents in other countries. As tensions between Russia and NATO continue, this incident could escalate fears about cyber warfare and its impact on national security. Authorities are investigating the attack and assessing the full extent of its impact on the power grid operations.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
In December 2025, Poland experienced a significant cyber attack on its power grid, attributed to the Russia-linked hacking group Sandworm. Researchers from ESET analyzed the malware involved and determined that the attack was one of the largest targeting Poland's energy infrastructure. The involvement of Sandworm, known for its previous cyber operations, raises concerns about the security of critical national systems. This incident not only endangers the stability of Poland's energy supply but also highlights the ongoing risks posed by state-sponsored cyber threats in Europe. As nations increasingly rely on digital infrastructure, the implications for energy security and national defense become more pronounced.
SecurityWeek
A newly discovered vulnerability in VMware products allows attackers to execute remote code by sending specially crafted network packets. This critical-severity flaw poses a serious risk for organizations using affected VMware systems, as it could lead to unauthorized access and control over their networks. VMware has not specified which products are impacted, but the nature of the vulnerability suggests that any systems relying on VMware technologies could be at risk. Companies should prioritize patching their systems as soon as updates are available to prevent potential exploitation. The urgency is heightened as this vulnerability is now a target for attackers.
Amazon Web Services (AWS) has released an updated compliance report for its Payment Cryptography service, confirming that it meets Payment Card Industry Personal Identification Number (PCI PIN) standards. This update follows a thorough audit by a Qualified Security Assessor (QSA). The compliance package is now available on AWS's compliance portal and includes an Attestation of Compliance (AOC) as well as additional documentation. This is significant for businesses using AWS Payment Cryptography, as it assures them that the service adheres to stringent security measures for handling payment data. Ensuring compliance not only helps protect sensitive information but also builds trust with customers who rely on secure payment processing.
Nike is currently investigating a potential data breach following claims from the WorldLeaks cybercrime group that they accessed and stole information from the company’s systems. The company has acknowledged the situation and is working to determine the extent of the security incident. This investigation comes at a time when many companies are facing increasing threats from hackers looking to exploit vulnerabilities for sensitive data. If the claims are verified, it could lead to serious implications for Nike, affecting customer trust and potentially exposing personal information. The outcome of Nike’s investigation will be closely watched, as it may reveal more about the tactics used by cybercriminals today.
Microsoft is looking into issues with some Windows 11 devices that are failing to boot after users installed the January 2026 Patch Tuesday security updates. Affected users are encountering 'UNMOUNTABLE_BOOT_VOLUME' errors, which prevent their systems from starting up properly. This situation could disrupt the workflow of many individuals and organizations that rely on Windows 11 for daily operations. Microsoft has not yet provided a specific fix or workaround for the problem, leaving users uncertain about how to resolve the issue. The investigation is ongoing as the company seeks to identify the root cause of the boot failures and implement a solution.
A new ransomware strain called Osiris was identified in a November 2025 attack targeting a significant food service franchise in Southeast Asia. Researchers from Symantec and Carbon Black reported that the attackers used a malicious driver known as POORTRY through a technique called Bring Your Own Vulnerable Driver (BYOVD) to disable security tools. This method allowed the ransomware to operate without detection, posing a serious risk to the affected organization. With ransomware attacks on the rise, this incident highlights the need for companies to strengthen their defenses against evolving tactics. The incident serves as a reminder for businesses to continuously update their security measures and remain vigilant against such threats.
Hackread – Cybersecurity News, Data Breaches, AI, and More
In a recent incident, the FBI accessed the BitLocker recovery keys of Windows laptops after Microsoft shared these keys as part of a legal request. This situation raises significant concerns about user privacy and data security, as it reveals how easily law enforcement can obtain sensitive information stored on personal devices. Affected users include anyone using Windows laptops that utilize BitLocker encryption for data protection. The implications are serious; users may feel their encrypted data is not as secure as previously thought, prompting a reevaluation of reliance on built-in security features. This incident serves as a reminder that while encryption is a valuable tool, it does not guarantee absolute privacy when legal authorities are involved.
BleepingComputer
The North Korean hacker group Konni is targeting blockchain developers and engineers with malware created using artificial intelligence. This new form of PowerShell malware is designed to infiltrate systems and steal sensitive information from individuals working in the blockchain sector. As the blockchain industry continues to grow, these attacks pose a significant risk to its security and the integrity of its projects. Developers in this field need to be particularly vigilant and ensure they have the latest security measures in place to protect against these sophisticated threats. The use of AI in malware creation represents a concerning evolution in cybercrime tactics, making it harder for security professionals to defend against such attacks.
Nike is currently investigating a potential security incident after the WorldLeaks cybercrime group claimed to have stolen sensitive data from the company. The attackers have threatened to leak this information if their demands are not met. This situation raises concerns about the security of customer data and proprietary company information, which could lead to significant reputational damage for Nike. As the investigation unfolds, it is important for users and stakeholders to stay informed about the nature of the data involved and any implications for their privacy and security. Companies like Nike must remain vigilant to protect against such threats as cybercriminals continue to target large organizations.
In late December 2025, the Russian hacking group Sandworm attempted a significant cyber attack on Poland's power sector, described by officials as the largest of its kind targeting the country's energy infrastructure. The attack involved a new type of malware called DynoWiper, which was designed to disrupt power operations. Fortunately, the attack was thwarted, and Poland's energy minister, Milosz Motyka, confirmed that the country's cyberspace forces detected and responded to the threat in time. This incident emphasizes the ongoing risks facing critical infrastructure from state-sponsored actors and highlights the importance of robust cybersecurity measures in protecting essential services. As cyber threats continue to evolve, organizations must remain vigilant to safeguard against potential disruptions.
Security Affairs
CVE-2026-24061Researchers have discovered a critical vulnerability in the GNU InetUtils telnet daemon (telnetd), tracked as CVE-2026-24061, which has remained unnoticed for nearly 11 years. This flaw affects all versions from 1.9.3 to 2.7 and has a high severity score of 9.8, indicating a significant risk. If exploited, attackers could gain root access to affected systems, posing a serious threat to security. This vulnerability impacts a variety of systems that rely on GNU InetUtils, making it imperative for users and organizations to address this issue promptly. As this flaw has been present for so long, it raises concerns about the security practices in place for maintaining software.
SCM feed for Latest
A recent data leak has exposed millions of account credentials from various platforms, including Gmail, Facebook, and numerous financial services. This dataset contains sensitive information, potentially affecting countless users who have accounts on these platforms. The breach raises serious concerns about identity theft and fraud, as attackers may exploit this data for malicious activities. Users are urged to change their passwords immediately and enable two-factor authentication where available. This incident highlights the ongoing challenges of online security, reminding everyone of the importance of safeguarding personal information.
SCM feed for Latest
The SagaEVM blockchain has suspended its operations after a significant security breach that resulted in the theft of nearly $7 million in cryptocurrency assets. The incident, reported by Cybernews, raises concerns about the safety and security of blockchain technologies, particularly for investors and users involved with SagaEVM. This event not only impacts the immediate financial stability of the platform but also shakes user confidence in blockchain security as a whole. As the cryptocurrency landscape continues to evolve, incidents like this underscore the necessity for robust security measures and protocols within blockchain systems. Users and stakeholders will need to stay informed about the situation as it develops.
SCM feed for Latest
A serious vulnerability has been discovered in all versions of GNU InetUtils telnetd, specifically those ranging from 1.9.3 to 2.7. This flaw, which allows remote attackers to bypass authentication, has gone unnoticed for nearly 11 years. Given the age of this issue, many systems may still be running vulnerable versions, putting users at risk. The discovery emphasizes the need for organizations to audit their systems and ensure they are not using outdated software. Users and administrators should take immediate action to update or patch their systems to mitigate potential exploitation.