Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A serious vulnerability has been discovered in all versions of GNU InetUtils telnetd, specifically those ranging from 1.9.3 to 2.7. This flaw, which allows remote attackers to bypass authentication, has gone unnoticed for nearly 11 years. Given the age of this issue, many systems may still be running vulnerable versions, putting users at risk. The discovery emphasizes the need for organizations to audit their systems and ensure they are not using outdated software. Users and administrators should take immediate action to update or patch their systems to mitigate potential exploitation.

Impact: GNU InetUtils telnetd versions 1.9.3 to 2.7
Remediation: Update to the latest version of GNU InetUtils telnetd to address the vulnerability.
Read Original

Recent research has revealed that attackers can now conduct more efficient intrusions targeting page caches in Linux systems. The study highlights vulnerabilities in how Linux manages memory, particularly in the page cache, which can be manipulated to access sensitive information. This development poses a risk to a wide range of Linux distributions, potentially affecting servers and workstations that rely on this operating system. As the efficiency of these attacks increases, companies and users need to be aware of the potential for data breaches and take preventive measures. It’s crucial for system administrators to stay informed and implement appropriate security protocols to mitigate these risks.

Impact: Linux systems, including various distributions and versions
Remediation: Implement security patches and updates as they become available; review and enhance memory management configurations.
Read Original

Cybernews has reported that fake cryptocurrency wallet applications are targeting Linux users, specifically those pretending to be popular wallets like Exodus, Trust Wallet, and Ledger Live. These malicious apps are available in the Canonical Snap Store and have been designed to steal cryptocurrency from unsuspecting users. This situation poses a significant risk for Linux users who may believe they are downloading legitimate software when in fact they are exposing themselves to malware. Users are advised to be cautious when downloading apps and to verify the authenticity of the software they use for managing their cryptocurrency. The increase in such scams highlights the ongoing dangers in the crypto space, especially for those using less traditional operating systems like Linux.

Impact: Exodus, Trust Wallet, Ledger Live, Linux operating system users
Remediation: Users should verify the authenticity of wallet applications before downloading and consider using official sources or trusted repositories.
Read Original
149M Logins from Roblox, TikTok, Netflix, Crypto Wallets Found Online

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A significant data breach has surfaced, revealing that 149 million login credentials from popular platforms such as Roblox, TikTok, Netflix, and various crypto wallets have been exposed online in plain text. This incident raises serious concerns for users of these services, as attackers could easily exploit these credentials for unauthorized access. The discovery of these credentials emphasizes the ongoing risks associated with poor security practices, such as weak passwords and lack of two-factor authentication. Companies must take immediate action to secure their systems and encourage users to change their passwords and enable additional security measures. As the digital landscape continues to evolve, incidents like this serve as a stark reminder of the importance of safeguarding personal information.

Impact: Roblox, TikTok, Netflix, Crypto Wallets
Remediation: Users should change their passwords immediately and enable two-factor authentication where available. Companies should conduct security audits and enhance their password policies.
Read Original

During the Pwn2Own contest at Automotive World 2026, security researchers successfully exploited multiple vulnerabilities in vehicle infotainment systems and electric vehicle (EV) chargers. These findings raise significant concerns about the security of modern vehicles, which increasingly rely on complex software for functionality. The vulnerabilities could potentially allow attackers to gain unauthorized access to vehicle systems, posing risks to both drivers and passengers. As vehicles become more connected, the implications of these security flaws extend beyond individual cars to broader public safety and privacy issues. Manufacturers must take these findings seriously to protect their customers and ensure the safety of their products.

Impact: Vehicle infotainment systems, electric vehicle chargers
Remediation: Manufacturers should investigate and patch the identified vulnerabilities in their systems.
Read Original

The Global Cybersecurity Vulnerability Exploit (GCVE) initiative aims to improve how security flaws are tracked globally, promoting better collaboration among cybersecurity professionals. However, there are growing concerns about potential fragmentation within vulnerability databases. Critics warn that the introduction of duplicate entries and a decentralized approach could complicate the efforts of defenders, making it harder to manage and respond to vulnerabilities effectively. The implications of this fragmentation may lead to confusion and inefficiencies in addressing security threats, affecting organizations that rely on these databases to protect their systems. As the cybersecurity community continues to evolve, finding a balance between collaboration and centralization will be crucial to enhancing overall security.

Impact: N/A
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of four vulnerabilities affecting enterprise software. These vulnerabilities impact products from Versa and Zimbra, as well as the Vite frontend tooling framework and the Prettier code formatter. Organizations using these tools are at risk as attackers are actively exploiting these flaws, which could lead to unauthorized access or data breaches. It's crucial for affected companies to address these vulnerabilities promptly to protect their systems and sensitive information. CISA's alert serves as a reminder of the ongoing security challenges in enterprise environments.

Impact: Versa enterprise software, Zimbra software, Vite frontend tooling framework, Prettier code formatter
Remediation: Organizations are advised to apply available patches for the affected software, update to the latest versions, and implement security best practices such as regular vulnerability assessments and system monitoring.
Read Original
Actively Exploited

The Osiris ransomware, which emerged in November, is raising concerns among cybersecurity experts due to its advanced techniques that suggest the involvement of experienced attackers. This ransomware targets various organizations, encrypting their data and demanding a ransom for its release. The sophistication of Osiris indicates that it could pose a significant risk to businesses that might not have robust security measures in place. As ransomware continues to evolve, companies must be vigilant and proactive in their cybersecurity strategies to defend against such threats. Understanding the tactics used by Osiris can help organizations better prepare for potential attacks and minimize their impact.

Impact: Organizations susceptible to ransomware attacks, particularly those lacking strong cybersecurity defenses.
Remediation: Organizations should implement strong security measures, including regular data backups, employee training on phishing attacks, and up-to-date antivirus software.
Read Original

Cyber Centaurs, a digital forensics firm, discovered critical attacker infrastructure while investigating a ransomware incident involving a U.S. client. This operational security lapse allowed the firm to recover data that the attackers had encrypted. The incident serves as a reminder of the vulnerabilities that organizations face when dealing with ransomware, particularly if they fail to maintain strict security protocols. Companies should take this case as a warning to enhance their cybersecurity measures, as ransomware attacks can have devastating consequences for both data integrity and business operations. The recovery of the data also raises questions about the methods used by attackers and the potential for further exploitation of the exposed infrastructure.

Impact: Ransomware affecting U.S. organizations
Remediation: Companies should enhance operational security protocols and conduct regular security audits.
Read Original

In 2025, various hacktivist groups such as Z-Pentest, Dark Engine, and Sector 16 ramped up their attacks on critical infrastructure, specifically targeting industrial control systems (ICS), operational technology (OT), and Human Machine Interface (HMI) environments. These attacks pose significant risks as they can disrupt essential services that rely on these systems, including utilities and manufacturing processes. By focusing on ICS and OT, these groups are not just seeking to cause chaos but are also likely aiming to draw attention to specific political or social issues. This increase in activity highlights the vulnerabilities in these crucial sectors and raises concerns about the potential for more severe consequences if these systems are compromised. Companies and organizations that manage such infrastructure need to bolster their cybersecurity defenses to prevent potential disruptions.

Impact: Industrial Control Systems (ICS), Operational Technology (OT), Human Machine Interface (HMI)
Remediation: Companies should enhance their cybersecurity measures, conduct regular security audits, and implement robust incident response plans.
Read Original

Two Venezuelan nationals have been convicted for their involvement in an ATM jackpotting scheme that resulted in the theft of hundreds of thousands of dollars from U.S. banks. Federal prosecutors in South Carolina announced that after serving their prison sentences, the men will be deported back to Venezuela. Jackpotting refers to a method where criminals use malware to manipulate ATMs, causing them to dispense cash without proper authorization. This case highlights the ongoing risks of ATM fraud and the challenges law enforcement faces in addressing cybercrime that crosses international borders. The actions of these individuals not only impacted financial institutions but also posed risks to consumers and the integrity of banking systems in the U.S.

Impact: U.S. banks, ATMs
Remediation: Increased security measures for ATMs, monitoring for unusual activity, and implementation of more advanced anti-malware solutions.
Read Original
Venezuelan Nationals Face Deportation After Multi State ATM Jackpotting Scheme

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Two Venezuelan nationals are facing deportation after being implicated in a multi-state ATM jackpotting scheme. Authorities reported that both suspects were in the United States illegally and used sophisticated techniques to manipulate ATMs, allowing them to withdraw large sums of cash unlawfully. This type of attack, known as jackpotting, targets ATMs and involves exploiting vulnerabilities in the machines' software or hardware. The incident raises concerns about the security of ATM systems and highlights the ongoing challenges law enforcement faces in combating financial crimes. As these types of schemes become more prevalent, financial institutions may need to enhance their security measures to protect against similar attacks in the future.

Impact: ATMs, financial institutions
Remediation: Financial institutions should review and enhance ATM security protocols, including regular software updates and monitoring for suspicious activity.
Read Original

Hackers are actively exploiting a serious vulnerability in the GNU InetUtils telnetd server that has been around for 11 years. This flaw allows attackers to bypass authentication and gain root access, which poses a significant risk to systems still using this service. Organizations that rely on telnetd are at risk of unauthorized access, potentially leading to data breaches or system compromise. Security experts are urging affected users to address this vulnerability immediately to prevent exploitation. Given the age of the flaw, many systems might still be running unpatched versions, making them easy targets for attackers.

Impact: GNU InetUtils telnetd server
Remediation: Update to the latest version of GNU InetUtils that addresses this vulnerability.
Read Original

Researchers at Intruder have discovered that AI-generated code can create hidden security vulnerabilities when teams place too much trust in automated outputs. They set up an AI-written honeypot, a decoy system designed to lure attackers, only to find that it contained subtle flaws that were eventually exploited in real attacks. This incident highlights the risks of relying solely on AI for coding without thorough human oversight. Companies and developers need to be cautious and verify AI-generated code to prevent these kinds of vulnerabilities from being introduced into their systems. The findings serve as a reminder that while AI can enhance efficiency, it can also introduce risks that must be managed carefully.

Impact: AI-generated code, honeypots
Remediation: Conduct thorough code reviews and implement manual checks for AI-generated code to identify and fix potential vulnerabilities.
Read Original

MITRE has introduced a new framework called the Embedded Systems Threat Matrix, aimed at enhancing cybersecurity measures for embedded systems, which are often found in critical infrastructure. This initiative is crucial as these systems are increasingly targeted by cyber threats, impacting industries such as healthcare, manufacturing, and transportation. The new matrix provides a structured way to identify potential vulnerabilities and attack vectors specific to embedded systems, helping organizations better defend against these risks. By focusing on this area, MITRE is addressing a growing concern in cybersecurity, as the reliance on embedded systems continues to expand. This framework is expected to guide developers and security professionals in implementing stronger protections for these essential technologies.

Impact: Embedded systems in critical infrastructure, including healthcare devices, industrial control systems, and transportation systems.
Remediation: Organizations should adopt the Embedded Systems Threat Matrix to assess and improve their defenses against potential threats to embedded systems.
Read Original
PreviousPage 19 of 88Next