Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

On April 20, 2026, the Cybercrime Unit of Paris prosecutors conducted a raid on the offices of Elon Musk's social media platform, X, in France. This action came after both Musk and the former CEO of X were summoned for voluntary interviews regarding unspecified issues related to the platform. While details about the nature of the investigation remain unclear, the involvement of high-profile individuals like Musk suggests significant implications for the company's operations and legal standing. The situation raises questions about compliance with local laws and regulations, particularly in the realm of cybersecurity and user data protection. This incident underscores the increasing scrutiny on tech companies operating in Europe, especially concerning their responsibilities towards user privacy and security.

Impact: X social media platform
Remediation: N/A
Read Original

French prosecutors have conducted a raid on the offices of X, formerly known as Twitter, in Paris as part of a criminal investigation into the platform's Grok AI tool. This tool has been implicated in the creation of sexually explicit deepfake images, raising serious concerns about its misuse. The investigation has also led to a summons for Elon Musk, the owner of X, indicating the gravity of the situation. The use of AI to generate harmful content poses significant ethical and legal challenges, particularly regarding consent and the potential for exploitation. This incident not only highlights the risks associated with AI technologies but also places pressure on social media companies to implement stricter regulations and safeguards.

Impact: Grok AI tool, X platform
Remediation: N/A
Read Original
Everest Ransomware Claims 90GB Data Theft From HP Inc’s Polycom Systems

Hackread – Cybersecurity News, Data Breaches, AI, and More

Everest ransomware has claimed responsibility for a data breach affecting legacy Polycom systems owned by HP Inc. The attackers allege that they have stolen around 90GB of internal data. HP has yet to confirm the breach or provide details about the incident. This situation raises concerns about the security of legacy systems, which often have vulnerabilities that can be exploited by cybercriminals. As organizations increasingly rely on such systems, the potential for significant data theft becomes a pressing issue that companies need to address.

Impact: Polycom systems under HP Inc.
Remediation: N/A
Read Original

Recent outages at major cloud service providers like AWS, Azure, and Cloudflare have significantly disrupted internet services, affecting countless websites and applications. These incidents caused widespread interruptions for businesses and consumers who rely on these platforms for daily operations. Not only did users face difficulties accessing services, but many organizations found their workflows halted as a result of the outages. The ripple effects of these disruptions highlight the interconnected nature of online services and the vulnerabilities that can arise from relying on a few key providers. As outages become more frequent, understanding their impact is crucial for organizations that depend on cloud infrastructure.

Impact: AWS, Azure, Cloudflare, various websites and applications
Remediation: Organizations should evaluate their cloud dependencies and consider diversifying their service providers to reduce risk.
Read Original

Rob Allen discusses the rising concern of malware that utilizes large language models (LLMs) to enhance its effectiveness. These AI-assisted attacks pose a significant risk to both individuals and organizations, as they can automate and refine the process of creating malicious content. Allen emphasizes the need for proactive cybersecurity measures, urging companies to stay ahead of potential threats by implementing advanced detection tools and employee training. The article serves as a warning that as technology evolves, so too do the tactics employed by cybercriminals, making it essential for businesses to adapt their defenses accordingly. This is a call to action for organizations to prioritize cybersecurity and prepare for the challenges posed by AI-driven malware.

Impact: N/A
Remediation: Implement advanced detection tools and conduct employee training on recognizing AI-assisted threats.
Read Original

The manufacturing industry in the U.S. is facing increasing cybersecurity threats, particularly from intensified cyberattacks believed to be originating from China. In response to these growing risks, manufacturing firms are coming together to strengthen their cybersecurity efforts through the Manufacturing Information Sharing and Analysis Center (ISAC). This collaboration aims to enhance the sharing of information about potential threats and vulnerabilities among companies within the sector. As critical infrastructure becomes more targeted by malicious actors, these partnerships are essential for protecting sensitive data and ensuring operational continuity. The move reflects a recognition that collective defense strategies are crucial in combating sophisticated cyber threats.

Impact: Manufacturing sector, critical infrastructure
Remediation: N/A
Read Original

Tulsa International Airport has reportedly been compromised by the Qilin ransomware group, which claims to have stolen more than a dozen files from the airport's internal systems. This incident raises concerns about the security of critical infrastructure, as airports handle sensitive data and operations that are vital for public safety and travel. The breach could potentially disrupt airport operations or expose personal information of employees and travelers. As ransomware attacks continue to target essential services, this incident serves as a reminder for organizations to bolster their cybersecurity measures against increasing threats from cybercriminals. The situation is still developing, and further details regarding the extent of the breach and its implications are awaited.

Impact: Tulsa International Airport internal network systems
Remediation: N/A
Read Original

Iranian hackers have utilized artificial intelligence to carry out cyberattacks targeting individuals and organizations that have reported on human rights abuses amid ongoing protests in the country. This campaign, known as RedKitten, aims to intimidate and silence voices critical of the Iranian government. The use of large language models in these attacks indicates a shift in tactics, as attackers look to enhance their capabilities in spreading misinformation and conducting surveillance. Those affected include non-governmental organizations, activists, and journalists who are documenting the protests and human rights violations. This development raises significant concerns about the intersection of technology and state-sponsored aggression, particularly in how it can stifle dissent and manipulate narratives during critical social movements.

Impact: Individuals and non-governmental organizations reporting human rights abuses in Iran.
Remediation: Organizations should enhance their cybersecurity measures, including employee training on recognizing phishing attempts and employing robust monitoring tools to detect unusual activities.
Read Original
Actively Exploited

Recent reports indicate that several threat groups, including UNC6661, UNC6671, and UNC6240, have intensified their cyber attacks under the ShinyHunters name. These attacks primarily target cloud-based software-as-a-service (SaaS) applications, employing tactics such as voice phishing and creating fake websites to steal user credentials. This surge in extortion-themed intrusions poses a significant risk to organizations relying on SaaS platforms, as attackers aim to exploit vulnerabilities for financial gain. Businesses and users need to be vigilant about potential phishing attempts and ensure their security practices are up to date to safeguard sensitive information.

Impact: Cloud-based software-as-a-service (SaaS) applications
Remediation: Users should verify the legitimacy of communications and avoid sharing sensitive information over untrusted channels. Implementing multi-factor authentication (MFA) may also help mitigate risks.
Read Original

A Chinese-speaking cybercrime group known as UAT-8099 has been attacking unsecured Internet Information Services (IIS) servers across Asia, with a focus on Thailand and Vietnam. This campaign started late last year and has raised concerns among cybersecurity experts. The attackers are exploiting vulnerabilities in these servers, which could lead to unauthorized access and data breaches. Organizations using IIS servers in the targeted regions need to prioritize their security measures to prevent exploitation. The ongoing attacks highlight the risks associated with unprotected web servers, especially in areas where cybersecurity practices may not be as stringent.

Impact: Internet Information Services (IIS) servers in Thailand and Vietnam
Remediation: Organizations should secure their IIS servers by applying the latest security patches, configuring firewalls, and implementing strong access controls.
Read Original

A recent report from The Identity Underground points out a concerning gap in how organizations prepare for AI-related identity threats. The findings indicate that while executives recognize the importance of addressing these threats, there is a significant disconnect with the capabilities of their teams on the ground. This misalignment could leave companies vulnerable to attacks that exploit AI for identity fraud and other malicious activities. With AI technology advancing rapidly, organizations must take a closer look at their security measures to ensure they are equipped to handle potential risks. The report serves as a wake-up call for businesses to bridge this gap and strengthen their defenses against emerging threats.

Impact: N/A
Remediation: Organizations should assess their current identity threat preparedness and invest in training for frontline teams to better align with executive priorities.
Read Original

As federal agencies like the Cybersecurity and Infrastructure Security Agency (CISA) scale back their support for election security, state officials are feeling the pressure to fill the gap. Secretaries of State across the country are now seeking alternative cybersecurity services to protect their election systems. This shift comes at a time when many states are still working to bolster their defenses following past election interference incidents. The lack of federal resources means states will need to rely more on their own budgets and local expertise, which could lead to disparities in security measures across the nation. Ensuring safe and secure elections is critical for maintaining public trust in the electoral process.

Impact: Election systems, state cybersecurity resources
Remediation: States are advised to seek local cybersecurity services and allocate budget for election security improvements.
Read Original

A new strain of malware known as GlassWorm has been found targeting macOS systems through compromised OpenVSX extensions. This malware aims to steal sensitive information, including passwords, cryptocurrency wallet data, and developer credentials. Users who have installed these extensions may be at risk, highlighting a significant security issue for developers and crypto users on macOS. Researchers emphasize the importance of vigilance when installing third-party extensions and recommend that users ensure their software is up-to-date. This incident underscores the need for better security practices in the software development ecosystem to prevent such attacks.

Impact: macOS systems, OpenVSX extensions
Remediation: Users should uninstall any suspicious OpenVSX extensions and ensure their macOS and software are updated to the latest versions. Regularly changing passwords and using two-factor authentication where possible is also advised.
Read Original

In 2019, two penetration testers were wrongfully arrested by Iowa police while conducting a security assessment. The incident arose during a red teaming exercise, where they were hired to simulate attacks on a local government system to identify vulnerabilities. This situation illustrates the dangers that cybersecurity professionals face when their work is misunderstood by law enforcement or the public. The county has since settled the case, paying $600,000 to the testers, which raises concerns about how security practices are perceived and the potential legal ramifications for professionals in this field. This case serves as a reminder for organizations to ensure clear communication and understanding of security testing protocols.

Impact: N/A
Remediation: N/A
Read Original

Ukraine's Computer Emergency Response Team (CERT) has reported that Russian hackers are taking advantage of a newly patched vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw affects multiple versions of the software, which could leave users open to various cyberattacks. The exploitation of this vulnerability is concerning, especially as Microsoft Office is widely used in both personal and professional settings. Users and organizations are urged to ensure that their systems are updated with the latest security patches to mitigate the risk of being targeted. The situation underscores the need for vigilance in maintaining software security, especially with ongoing geopolitical tensions.

Impact: Microsoft Office (multiple versions)
Remediation: Users should apply the latest updates and patches provided by Microsoft for their respective versions of Office. Regularly check for updates to ensure protection against this vulnerability.
Read Original
PreviousPage 2 of 85Next