Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Inotiv, an American pharmaceutical company, has reported a data breach following a ransomware attack that occurred in August 2025, compromising the personal information of thousands of individuals. This incident highlights the ongoing risks associated with ransomware attacks and the importance of data protection in the pharmaceutical sector.

Impact: Personal information of individuals associated with Inotiv
Remediation: N/A
Read Original

The Louvre Museum is enhancing its safety and security systems following a significant burglary incident in October. This initiative involves a public tender worth €57 million, indicating the museum's commitment to improving its protection against potential threats.

Impact: N/A
Remediation: N/A
Read Original

The article discusses a record-breaking DDoS attack powered by the Aisuru botnet, which peaked at 29 Tbps. Cloudflare successfully mitigated this attack, highlighting the growing severity of DDoS threats and the need for robust cybersecurity measures.

Impact: N/A
Remediation: Implement DDoS mitigation strategies and utilize services like Cloudflare for protection against large-scale attacks.
Read Original

The UK's National Cyber Security Center (NCSC) has launched a new service called Proactive Notifications aimed at alerting organizations about vulnerabilities in their systems. This initiative is crucial for enhancing cybersecurity awareness and proactive defense strategies among organizations in the UK.

Impact: N/A
Remediation: N/A
Read Original

The article highlights an ongoing espionage threat from China, utilizing Brickstorm malware that has affected numerous organizations over the past three years. The average duration of these attacks is reported to be 393 days, indicating a significant and persistent threat landscape.

Impact: Dozens of organizations (specific products or systems not specified)
Remediation: N/A
Read Original
Qilin Ransomware Claims Data Theft from Church of Scientology

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Qilin ransomware has claimed responsibility for stealing internal data from the Church of Scientology, providing 22 screenshots as evidence of the breach. The Church has not confirmed the incident, highlighting the ongoing concerns regarding ransomware attacks and data security within organizations.

Impact: Church of Scientology internal data
Remediation: N/A
Read Original

The article discusses newly published guidance from global cybersecurity agencies on the safe deployment of artificial intelligence in operational technology (OT), which is essential for critical infrastructure. This guidance aims to address potential security risks associated with AI in OT environments.

Impact: Operational technology systems and critical infrastructure
Remediation: Follow the guidance provided by global cybersecurity agencies regarding AI deployment in OT
Read Original
LummaC2 Infects North Korean Hacker Device Linked to Bybit Heist

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

The LummaC2 infostealer has infected a device used by North Korean hackers, revealing connections to the $1.4 billion Bybit heist. This incident highlights significant operational security failures and exposes the tools and infrastructure utilized by these cybercriminals.

Impact: North Korean hacker devices, Bybit platform
Remediation: Implement robust endpoint security measures, conduct regular security audits, and educate users on phishing and malware threats.
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a new malware threat named BrickStorm, which is being used by Chinese hackers to backdoor VMware vSphere servers. This poses a significant risk to organizations using these servers, as it could lead to unauthorized access and potential data breaches.

Impact: VMware vSphere servers
Remediation: Organizations are advised to implement security best practices, including regular updates and patches for VMware products, network segmentation, and monitoring for unusual activity on their servers.
Read Original

Two Virginia brothers have been charged with conspiring to steal sensitive information and wipe government databases after being terminated from their roles as federal contractors. This incident raises concerns about insider threats and the potential for significant data loss in government systems.

Impact: U.S. government databases
Remediation: Implement stricter access controls and monitoring for federal contractors; conduct thorough background checks and ongoing security assessments.
Read Original

Cybersecurity agencies have released guidance aimed at ensuring the secure integration of artificial intelligence into operational technology (OT) systems. This guidance highlights the importance of addressing potential vulnerabilities and threats associated with AI in critical infrastructure.

Impact: N/A
Remediation: Implement the guidance provided by cybersecurity agencies for secure AI integration in OT systems.
Read Original
Cloudflare Blocks Aisuru Botnet Powered Largest Ever 29.7 Tbps DDoS Attack

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

Cloudflare's Q3 2025 DDoS Threat Report highlights the unprecedented scale of a DDoS attack launched by the Aisuru botnet, reaching 29.7 Tbps. This surge in attacks indicates a growing threat landscape, particularly affecting critical sectors and emphasizing the need for enhanced cybersecurity measures.

Impact: N/A
Remediation: Organizations should implement robust DDoS mitigation strategies, including traffic filtering, rate limiting, and deploying advanced security solutions to protect against large-scale attacks.
Read Original

The article discusses a critical vulnerability known as 'React2Shell' in the React Server Components (RSC) 'Flight' protocol, which allows remote code execution without authentication in React and Next.js applications. This severe flaw poses significant risks to developers and organizations using these frameworks, as it could lead to unauthorized access and control over servers.

Impact: React, Next.js applications using the React Server Components 'Flight' protocol
Remediation: Developers are advised to review their applications for the vulnerability and apply necessary security patches or updates as they become available. Regular security audits and code reviews are recommended.
Read Original
PreviousPage 2 of 21Next