Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Venezuelan Nationals Face Deportation After Multi State ATM Jackpotting Scheme

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Two Venezuelan nationals are facing deportation after being implicated in a multi-state ATM jackpotting scheme. Authorities reported that both suspects were in the United States illegally and used sophisticated techniques to manipulate ATMs, allowing them to withdraw large sums of cash unlawfully. This type of attack, known as jackpotting, targets ATMs and involves exploiting vulnerabilities in the machines' software or hardware. The incident raises concerns about the security of ATM systems and highlights the ongoing challenges law enforcement faces in combating financial crimes. As these types of schemes become more prevalent, financial institutions may need to enhance their security measures to protect against similar attacks in the future.

Impact: ATMs, financial institutions
Remediation: Financial institutions should review and enhance ATM security protocols, including regular software updates and monitoring for suspicious activity.
Read Original

Hackers are actively exploiting a serious vulnerability in the GNU InetUtils telnetd server that has been around for 11 years. This flaw allows attackers to bypass authentication and gain root access, which poses a significant risk to systems still using this service. Organizations that rely on telnetd are at risk of unauthorized access, potentially leading to data breaches or system compromise. Security experts are urging affected users to address this vulnerability immediately to prevent exploitation. Given the age of the flaw, many systems might still be running unpatched versions, making them easy targets for attackers.

Impact: GNU InetUtils telnetd server
Remediation: Update to the latest version of GNU InetUtils that addresses this vulnerability.
Read Original

Researchers at Intruder have discovered that AI-generated code can create hidden security vulnerabilities when teams place too much trust in automated outputs. They set up an AI-written honeypot, a decoy system designed to lure attackers, only to find that it contained subtle flaws that were eventually exploited in real attacks. This incident highlights the risks of relying solely on AI for coding without thorough human oversight. Companies and developers need to be cautious and verify AI-generated code to prevent these kinds of vulnerabilities from being introduced into their systems. The findings serve as a reminder that while AI can enhance efficiency, it can also introduce risks that must be managed carefully.

Impact: AI-generated code, honeypots
Remediation: Conduct thorough code reviews and implement manual checks for AI-generated code to identify and fix potential vulnerabilities.
Read Original

MITRE has introduced a new framework called the Embedded Systems Threat Matrix, aimed at enhancing cybersecurity measures for embedded systems, which are often found in critical infrastructure. This initiative is crucial as these systems are increasingly targeted by cyber threats, impacting industries such as healthcare, manufacturing, and transportation. The new matrix provides a structured way to identify potential vulnerabilities and attack vectors specific to embedded systems, helping organizations better defend against these risks. By focusing on this area, MITRE is addressing a growing concern in cybersecurity, as the reliance on embedded systems continues to expand. This framework is expected to guide developers and security professionals in implementing stronger protections for these essential technologies.

Impact: Embedded systems in critical infrastructure, including healthcare devices, industrial control systems, and transportation systems.
Remediation: Organizations should adopt the Embedded Systems Threat Matrix to assess and improve their defenses against potential threats to embedded systems.
Read Original

During the Pwn2Own Automotive 2026 event, security researchers successfully exploited 76 zero-day vulnerabilities, earning a total of $1,047,000 over three days from January 21 to January 23. This event showcases the ongoing challenges in automotive cybersecurity, where researchers target vulnerabilities in vehicle software and systems. The financial rewards for discovering these exploits underscore the critical need for automakers to prioritize security in their products. These vulnerabilities could potentially be exploited by malicious actors, posing risks to vehicle safety and user privacy. As vehicles become increasingly reliant on software and connectivity, addressing these weaknesses is essential for protecting consumers and maintaining trust in automotive technology.

Impact: Automotive software and systems
Remediation: Automakers should conduct thorough security assessments and apply necessary patches to their systems.
Read Original
ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment

Hackread – Cybersecurity News, Data Breaches, AI, and More

ShinyHunters, a known hacking group, has reportedly leaked data from several companies, including SoundCloud, Crunchbase, and Betterment. The leak is said to involve the personal information of millions of users, raising serious concerns about data security and privacy. This incident follows previous breaches attributed to the group, which has a history of targeting various organizations. The potential for more leaks has been hinted at by the group, suggesting that the situation could worsen. This breach not only affects the companies involved but also puts the personal information of countless users at risk, emphasizing the ongoing challenges of cybersecurity in today's digital landscape.

Impact: SoundCloud, Crunchbase, Betterment
Remediation: Companies should notify affected users and assess their security measures to prevent future breaches.
Read Original

Under Armour is currently investigating a data breach that may have exposed approximately 72 million records. The company has stated that, so far, there is no evidence suggesting that the breach affected systems responsible for processing payments or storing customer passwords. This incident raises concerns about the potential exposure of personal data, which could include details such as email addresses and other sensitive information. For users of Under Armour's services, the situation is alarming as it may lead to phishing attempts or identity theft. The company is taking steps to understand the full scope of the breach and to protect its customers moving forward.

Impact: 72 million records, customer data including email addresses
Remediation: N/A
Read Original

During the Pwn2Own Automotive 2026 event, hackers identified 76 vulnerabilities across various automotive systems, including infotainment systems and electric vehicle chargers. These exploits earned the participants a total of $1 million in rewards, highlighting the ongoing security challenges faced by the automotive industry. The vulnerabilities could potentially allow attackers to manipulate vehicle functions, putting drivers and passengers at risk. As more vehicles become connected and reliant on software, manufacturers need to prioritize security updates to protect against these types of attacks. The event serves as a reminder of the importance of proactive security measures in the rapidly evolving automotive sector.

Impact: Infotainment systems, electric vehicle chargers
Remediation: Manufacturers should implement security updates and patches as they become available to address the identified vulnerabilities.
Read Original

Two Venezuelan men have been convicted in the United States for their involvement in ATM jackpotting schemes, which use malware to hack into ATMs and dispense cash fraudulently. This conviction is part of a larger crackdown on a network of Venezuelan nationals charged with similar crimes. The attacks typically involve manipulating ATM software to trick machines into disbursing large amounts of money without authorization. This case is significant as it highlights the ongoing issue of international cybercrime and the risks posed to financial institutions and consumers. The convictions may serve as a deterrent to others considering similar criminal activities.

Impact: ATMs, financial institutions
Remediation: Financial institutions should enhance ATM security measures, including software updates and monitoring for unusual activity.
Read Original

Under Armour is currently investigating a significant data breach after approximately 72 million customer records were discovered online, allegedly posted by a cybercriminal. The leaked data includes personal information that could impact a large number of individuals who have engaged with the brand, which is known for its sportswear and fitness accessories. This incident raises serious concerns about data security and the potential risks to affected customers, including identity theft and fraud. As Under Armour works to assess the situation and secure its systems, customers are advised to monitor their accounts for any unusual activity. The breach serves as a reminder of the importance of strong cybersecurity measures in protecting personal information.

Impact: 72 million customer records, personal information
Remediation: Customers advised to monitor accounts for unusual activity; Under Armour conducting investigation and security assessment.
Read Original

GitLab has addressed a serious vulnerability in its authentication services that allowed attackers to bypass two-factor authentication (2FA). This flaw was due to an unchecked return value, which meant that if an attacker knew a target's account ID, they could submit fake device responses to gain unauthorized access. The issue is particularly concerning as it undermines a key security feature—2FA—that many users rely on to protect their accounts. GitLab has released patches to fix this vulnerability, and users are urged to update their systems promptly to ensure their accounts remain secure. This incident serves as a reminder of the importance of robust security measures in software development and the need for vigilance against potential exploits.

Impact: GitLab authentication services
Remediation: GitLab has issued patches to address the vulnerability; users should update their systems to the latest version.
Read Original

Ireland's government has introduced a new bill, the Communications (Interception and Lawful Access) Bill, aimed at updating the country's laws surrounding communication interception. This proposed legislation seeks to replace a 1993 law that no longer fits the current digital environment. If passed, the bill would allow law enforcement agencies to intercept encrypted communications in certain situations. This move raises concerns among privacy advocates about the potential for overreach and the implications for personal privacy in an era where encryption is vital for protecting sensitive information. The discussion around this bill is particularly relevant as nations globally grapple with balancing security needs and individual rights.

Impact: N/A
Remediation: N/A
Read Original

Recent reports indicate that hundreds of test environments, which were originally designed for security training, have been misconfigured and are now exposing vulnerabilities to attackers. These misconfigurations have turned these environments into easy targets for cryptocurrency miners, who can exploit them to mine digital currencies without the organization’s consent. This situation poses a significant risk not only to the organizations involved but also to the broader cloud infrastructure, as it highlights the potential for mismanaged environments to be weaponized. Companies that utilize these training applications need to reassess their configurations and security measures to prevent unauthorized access and potential financial losses.

Impact: Test environments for security training, cloud infrastructure
Remediation: Organizations should review and secure their test environment configurations, implement strict access controls, and monitor for unusual activity to prevent exploitation.
Read Original
Actively Exploited

Attackers are exploiting unsecured Zendesk instances to send out a large volume of spam. These instances allow anyone, including unverified users, to submit support tickets, which the attackers are taking advantage of. This has led to a significant increase in spam messages across various platforms, affecting organizations that rely on Zendesk for customer support. The situation raises concerns about the security of customer interaction tools and highlights the need for companies to ensure their systems are properly configured to prevent unauthorized access. Organizations using Zendesk should review their security settings to mitigate this risk.

Impact: Zendesk support ticket system
Remediation: Review and secure Zendesk configurations to restrict ticket submissions to verified users.
Read Original

At the Davos 2026 conference, Dave Treat, the chief technology officer at Pearson, raised concerns about the challenges AI agents face in distinguishing between legitimate and deceptive tactics that could mislead human employees. As AI technology becomes more integrated into various sectors, ensuring that these systems can effectively recognize and respond to potential security threats is crucial. The discussion emphasizes the growing need for organizations to develop robust training and protocols for AI to minimize risks associated with social engineering and other deceptive practices. This issue is particularly relevant as more companies adopt AI-driven solutions, making it essential to address these vulnerabilities to protect sensitive information and maintain trust in automated systems. The conversation at Davos signals a call to action for businesses to enhance their cybersecurity measures in the age of AI.

Impact: N/A
Remediation: N/A
Read Original
PreviousPage 20 of 88Next