Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The Coruna exploit kit has been identified as a significant threat targeting older iPhones, specifically those running iOS versions from 13.0 to 17.2.1. Cybercriminals are using this toolkit to steal financial data from users, which raises concerns about the safety of personal and financial information on these devices. Researchers have noted that this multi-stage campaign is particularly aimed at exploiting vulnerabilities in outdated operating systems, making it crucial for users to stay updated. With many individuals still using older iPhone models, the risks associated with this exploit are substantial. Users are urged to upgrade their devices to the latest iOS version to protect against these attacks.

Impact: iPhones running iOS versions 13.0 to 17.2.1
Remediation: Users should update their iPhones to the latest iOS version to mitigate risks.
Read Original

A recent cyber campaign attributed to a group linked to Iran is targeting Iraqi government officials by impersonating the Ministry of Foreign Affairs. This operation, identified by Zscaler ThreatLabz and named Dust Specter, involves the deployment of new malware strains called SPLITDROP and GHOSTFORM. Observed in January 2026, these attacks aim to compromise sensitive information from officials within the Iraqi government. The use of sophisticated tactics and novel malware underscores a growing threat to government entities in the region. This incident raises concerns about the security of state institutions and the potential for sensitive data breaches that could have significant political ramifications.

Impact: Iraqi government officials, Ministry of Foreign Affairs
Remediation: N/A
Read Original

Despite the widespread implementation of multi-factor authentication (MFA) in organizations, many still fall victim to credential theft. Attackers are exploiting valid usernames and passwords to gain unauthorized access to networks, particularly in Windows environments. The problem isn't with MFA itself, but rather with how comprehensively it is enforced through identity providers like Microsoft Entra ID and Okta. If MFA isn't applied consistently across all access points, attackers can bypass these security measures. This situation emphasizes the need for companies to ensure that MFA is enforced everywhere, not just in select areas, to truly safeguard their systems from credential abuse.

Impact: Microsoft Entra ID, Okta, Windows environments
Remediation: Ensure comprehensive enforcement of MFA across all access points and systems
Read Original
Actively Exploited

A new vulnerability in FreeScout, identified by researchers at Ox Security, allows attackers to execute remote code without any user interaction, a situation referred to as a zero-click exploit. This flaw, dubbed Mail2Shell, could enable malicious actors to take control of FreeScout systems, putting organizations that use this customer support platform at risk. Users of FreeScout should be particularly vigilant, as this vulnerability could lead to unauthorized access and data breaches. The lack of user interaction required for the exploit makes it especially concerning, as it can be executed without any action from the target. Organizations are urged to monitor their systems closely and apply any available updates to mitigate potential risks from this vulnerability.

Impact: FreeScout systems
Remediation: Apply patches and updates as soon as they are released; regularly monitor for unusual activity.
Read Original

Europol has successfully dismantled the LeakBase cybercrime forum, a site known for sharing stolen personal data and facilitating illegal activities. This operation involved law enforcement agencies from multiple countries, highlighting a collaborative effort to combat cybercrime on a global scale. LeakBase was a popular hub for cybercriminals, and its shutdown is expected to disrupt various illegal operations that relied on the forum for buying and selling compromised information. The takedown is significant as it not only targets the platform itself but also sends a message to other similar forums about the risks of engaging in cybercriminal activities. Users whose data was found on LeakBase are urged to take steps to protect their personal information and monitor for potential identity theft.

Impact: LeakBase cybercrime forum, stolen personal data
Remediation: Users should monitor their personal information and consider using identity protection services.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Impact: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
Remediation: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
Read Original

Last week, a newly patched vulnerability in BeyondTrust's Remote Code Execution (RCE) software was exploited in the wild. This vulnerability poses significant risks as it allows attackers to execute commands on affected systems without authorization. BeyondTrust has issued patches to address this issue, but organizations using the affected software need to act quickly to apply these updates to prevent potential breaches. Additionally, in an interview, Deneen DeFiore, the Chief Information Security Officer at United Airlines, discussed the importance of resilience in cybersecurity. She emphasized that while prevention is crucial, organizations must also prepare for disruptions and manage risks associated with their interconnected vendor and partner ecosystems. This dual focus on resilience and safety is essential for maintaining operational integrity in today's complex digital landscape.

Impact: BeyondTrust RCE software
Remediation: Patches have been issued by BeyondTrust; users should apply these updates immediately.
Read Original
287 Chrome Extensions Caught Harvesting Browsing Data from 37M Users

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent investigation by Q Continuum has uncovered that 287 Chrome extensions are leaking private browsing data from approximately 37.4 million users to companies like Similarweb and Alibaba. These extensions, often perceived as harmless tools, have been found to convert users' browsing histories into marketable products. The data breach raises significant privacy concerns, particularly for users who may not be aware that their online activities are being monitored and sold. This incident highlights the need for users to be vigilant about the extensions they install and the permissions they grant. As these extensions may not seem malicious at first glance, it serves as a reminder of the potential risks associated with browser add-ons.

Impact: Chrome extensions, user browsing data
Remediation: Users should review and remove any unnecessary or suspicious Chrome extensions and check their permissions. Regularly monitoring browser settings and being cautious about the extensions installed is advisable.
Read Original

Fintech company Figure has confirmed a data breach resulting from a phishing attack that targeted one of its employees. The attackers used social engineering tactics to deceive the employee and gain access to a limited number of files. A spokesperson for Figure stated that while the breach is concerning, the extent of the data compromised is not extensive. This incident raises alarms about the effectiveness of employee training and awareness regarding phishing tactics, which continue to be a significant vulnerability for many organizations. Users and stakeholders of Figure should remain vigilant and monitor for any unusual activity related to their accounts.

Impact: Limited number of employee files
Remediation: Enhance employee training on phishing and social engineering tactics
Read Original

Recent threat intelligence reports indicate that a single threat actor is behind the majority of attacks exploiting two critical vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), identified as CVE-2026-21962 and CVE-2026-24061. These vulnerabilities allow for remote code execution, posing significant risks to organizations using this mobile management solution. The findings suggest that companies using Ivanti's software need to be vigilant, as the attacks are actively occurring. The focus on a single actor highlights the need for targeted defenses against this specific threat. Organizations are encouraged to monitor for unusual activity and apply any available patches to mitigate potential exploitation.

Impact: Ivanti Endpoint Manager Mobile (EPMM), versions affected not specified.
Remediation: Organizations should apply the latest security patches from Ivanti for the affected vulnerabilities and monitor their systems for any signs of exploitation. Regular updates and security assessments are recommended.
Read Original

Attackers are targeting users of cryptocurrency hardware wallets Trezor and Ledger by sending fake physical letters that appear to be from these companies. These letters aim to deceive users into revealing their recovery phrases, which can be used to steal their cryptocurrencies. This tactic exploits the trust users have in these well-known wallet providers and could lead to significant financial losses for those who fall for the scam. It’s crucial for users to be cautious and verify any communications they receive, especially when it comes to sensitive information like recovery phrases. The rise of such scams underscores the need for increased awareness and education around cryptocurrency security.

Impact: Trezor hardware wallets, Ledger hardware wallets
Remediation: Users should verify any correspondence from Trezor or Ledger directly through official channels and never share their recovery phrases.
Read Original

A newly identified hacking group, suspected to be linked to Russian intelligence, has launched attacks against various Ukrainian sectors, including defense, government, and energy. This group is using a malware called CANFAIL, which was uncovered by researchers from Google Threat Intelligence Group. The targeting of critical infrastructure and military entities raises significant concerns about national security and the ongoing conflict in the region. As these attacks could disrupt essential services and information systems, the situation highlights the need for enhanced cybersecurity measures among the affected organizations. This incident is part of a broader pattern of cyber warfare tactics being employed against Ukraine.

Impact: Ukrainian defense, government, and energy sectors
Remediation: Organizations should enhance cybersecurity protocols, conduct regular security assessments, and ensure timely updates and patches to their systems.
Read Original

North Korean hackers are running a fake recruiter scheme aimed at JavaScript and Python developers, using enticing cryptocurrency-related coding challenges to lure victims. These challenges often contain hidden malware designed to compromise the developers' systems. This tactic exploits the growing interest in cryptocurrency and the remote job market, making it especially appealing to tech professionals looking for work. Developers who engage with these fake opportunities risk not only their personal data but also their work environments, as the malware can lead to further security breaches. Awareness of these scams is crucial for developers to protect themselves from potential attacks.

Impact: JavaScript developers, Python developers, cryptocurrency-related coding tasks
Remediation: Developers should avoid engaging with unsolicited job offers, verify the legitimacy of recruiters, and implement strong cybersecurity measures, such as using updated antivirus software and practicing safe browsing habits.
Read Original

The article discusses various cybersecurity topics, including vulnerabilities in software and tools used by organizations. It mentions issues related to the Chrome browser and System Center Configuration Manager (SCCM), suggesting that users should stay updated to protect against potential exploits. Additionally, it brings attention to a tool named SSHStalker, which appears to be associated with security risks. The piece emphasizes the importance of maintaining software updates and being aware of the tools in use, as attackers often target widely used applications to compromise systems. Overall, the article serves as a reminder for users and organizations to remain vigilant about their cybersecurity practices.

Impact: Chrome browser, System Center Configuration Manager (SCCM), SSHStalker
Remediation: Users should ensure that their software is updated to the latest versions and consider applying any available patches.
Read Original

Disney has agreed to a settlement of $2.75 million to address violations of the California Consumer Privacy Act. The issues arose from the company's inadequate measures to allow customers to opt out of data sharing. This settlement underscores the importance of compliance with privacy laws, particularly as consumer data protection becomes a growing concern. Affected consumers include those who interacted with Disney's online services, as their data may have been shared without proper opt-out mechanisms. The case serves as a reminder for companies to prioritize transparency and user control over personal information.

Impact: Disney's online services and customer data management practices
Remediation: Implement clearer data sharing opt-out processes for users
Read Original
PreviousPage 21 of 121Next