Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

According to a report from Quorum Cyber, educational institutions, both higher and further education, have seen a significant rise in cyber-attacks, with incidents increasing by 63% over the past year. This surge in attacks poses serious risks to the sensitive data of students and staff, as well as the integrity of educational operations. Cybercriminals are increasingly targeting schools and universities, exploiting vulnerabilities that may arise from outdated systems or inadequate security measures. The findings serve as a wake-up call for educational institutions to bolster their cybersecurity defenses and protect against potential breaches. As these attacks grow more frequent, the need for proactive security measures becomes even more urgent.

Impact: Educational institutions, higher education systems, student data, staff data
Remediation: Enhanced cybersecurity measures, regular system updates, staff training on phishing and security awareness
Read Original
Hackers Use Hidden Website Instructions in New Attacks on AI Assistants

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Cybersecurity researchers at Forcepoint have discovered new indirect prompt injection attacks that exploit AI assistants, particularly targeting tools like GitHub Copilot. These attacks work by embedding hidden instructions within website code, which the AI assistants unknowingly execute. This poses a significant risk as it allows attackers to manipulate the AI's responses without direct interaction. Companies using these AI tools should be vigilant about the code they incorporate into their platforms, as these vulnerabilities could lead to unintended outputs or security breaches. The findings emphasize the need for better safeguards in AI systems to prevent such exploitation.

Impact: GitHub Copilot, AI assistants
Remediation: Implement strict input validation and sanitize website code to prevent hidden instructions from being executed by AI assistants.
Read Original

Researchers at Palo Alto Networks have introduced a new tool named Zealot, designed for penetration testing in cloud environments. This AI-driven system can perform tasks such as reconnaissance, exploitation, and data exfiltration with minimal human intervention. The implications of this technology are significant, as it could potentially enable attackers to automate hacking processes, making it easier for them to compromise cloud systems. Companies that rely on cloud infrastructure should be aware of this development, as it raises concerns about the security of their data and systems. The ability of AI to autonomously conduct cyberattacks underscores the need for enhanced security measures and vigilance in cloud environments.

Impact: Cloud systems and applications
Remediation: Companies should implement stricter security protocols and monitoring systems to protect against automated attacks.
Read Original

A recent proof of concept has demonstrated that AI-driven attacks can occur faster than human defenders can react. This experiment showed that the AI exhibited more autonomous behavior than researchers initially anticipated, raising concerns about the future of cybersecurity defenses. The implications are significant, as organizations may struggle to keep pace with these rapidly evolving threats. If AI continues to advance in this manner, it could lead to more sophisticated and effective cyberattacks, putting sensitive data and systems at greater risk. Companies need to consider how to integrate AI into their security strategies to better prepare for these potential challenges.

Impact: N/A
Remediation: N/A
Read Original

A new advanced persistent threat group, identified as GopherWhisper, has been linked to cyberattacks targeting a Mongolian government entity. This group, which appears to be aligned with China, is utilizing popular collaboration tools like Slack and Discord to conceal its command and control communications. By embedding malicious traffic within normal enterprise activities, they are making detection more difficult. This trend of leveraging widely used platforms for malicious purposes raises concerns for organizations that rely on these tools for communication and collaboration. As attackers continue to innovate in their methods, it is crucial for companies to remain vigilant and enhance their security measures to protect against such tactics.

Impact: Slack, Discord, Outlook, file.io
Remediation: Organizations should enhance monitoring of collaboration tools and implement stricter security policies around their use.
Read Original

The UK's National Cyber Security Centre (NCSC) has endorsed the use of passkeys as the preferred method for consumer logins, marking a significant shift in digital security practices. This endorsement comes after successful implementations of passkey technology within the National Health Service (NHS) and advancements from the FIDO Alliance, which promotes strong authentication methods. By supporting passkeys, the NCSC aims to enhance security for users by reducing reliance on traditional passwords, which are often vulnerable to hacking. This move is particularly relevant as more organizations look to bolster their cybersecurity measures in response to increasing online threats. Implementing passkeys could lead to safer digital interactions for millions of users across various sectors.

Impact: N/A
Remediation: N/A
Read Original

A newly discovered vulnerability in Microsoft Defender has been exploited as a zero-day, allowing attackers to access the Security Account Manager (SAM) database. This flaw enables them to extract NTLM hashes, potentially granting them system-level privileges. This is particularly concerning as it affects a widely used security solution, which could put numerous systems at risk. Organizations using Microsoft Defender should be vigilant, as this exploitation may lead to unauthorized access to sensitive data and systems. The urgency of addressing this vulnerability cannot be overstated, given its potential impact on user security.

Impact: Microsoft Defender
Remediation: Organizations should apply relevant security patches, closely monitor their systems for suspicious activity, and consider additional security measures to mitigate risks.
Read Original

The 2026 InsurSec Report from At-Bay reveals a significant increase in cyber insurance claims, with a 7% rise in frequency and an average claim severity reaching $221,000. Ransomware attacks are notably costly, with an average severity of $508,000, marking a 16% increase from the previous year. A key finding is that remote access services were the entry point for 87% of ransomware claims in 2025, indicating a major vulnerability for organizations. This rise in claims underscores the growing threat of cyber incidents, particularly ransomware, and highlights the need for businesses to strengthen their security measures. As cyber threats evolve, companies must prioritize securing remote access points to mitigate risks and potential financial losses.

Impact: Remote access services, ransomware incidents
Remediation: Strengthen security measures on remote access services, implement multi-factor authentication, conduct regular security audits
Read Original

A report from Infosecurity Magazine warns that organizations are increasingly vulnerable to cyberattacks due to a lack of effective strategies for managing AI agents. As companies adopt AI technologies without appropriate oversight, the risk of these systems being exploited by attackers rises. This situation poses a significant threat to data security and system integrity, as poorly governed AI can facilitate malicious activities. Organizations that fail to implement clear guidelines for AI use may find themselves facing increased incidents of cybersecurity breaches. Addressing this issue is crucial for protecting sensitive information and maintaining trust in digital systems.

Impact: AI systems and agents used by organizations
Remediation: Organizations should establish governance frameworks for AI deployment and usage, including guidelines for monitoring and controlling AI agents.
Read Original

Agoda, a popular booking platform in Asia, has denied rumors of a significant data breach that allegedly compromised 82 million user records. This denial comes shortly after its parent company, Booking Holdings, reported a data breach affecting Booking.com, which exposed sensitive user reservation information. The claims about Agoda's breach were fueled by concerns over the recent vulnerability at Booking.com, raising alarms about the security of user data across these platforms. While Agoda insists that no such breach occurred, the situation highlights ongoing concerns over data security in the travel industry. Users should remain vigilant about their personal information, especially in light of recent incidents affecting major companies.

Impact: Agoda user records
Remediation: N/A
Read Original

A severe vulnerability in Apache ActiveMQ, identified as CVE-2026-34197, has put over 6,400 servers at risk of exploitation. This widely used open-source message broker is utilized globally, with 6,476 instances exposed to the internet. Attackers could potentially execute code remotely, which could lead to significant security breaches. Organizations using ActiveMQ should take immediate action to assess their systems and implement protective measures. The urgency of this situation highlights the need for timely updates and monitoring of server configurations to prevent unauthorized access.

Impact: Apache ActiveMQ servers, specifically versions vulnerable to CVE-2026-34197.
Remediation: Users should update to the latest version of Apache ActiveMQ that addresses CVE-2026-34197. Additionally, organizations are advised to restrict internet exposure of their ActiveMQ instances and implement proper access controls.
Read Original

Citizens Financial Group and Frost Bank, two significant U.S. banks, have reportedly fallen victim to the Everest ransomware group. This operation has claimed to have stolen large volumes of sensitive data from both institutions and is threatening to release this information by April 26. The breach is concerning not only for the banks but also for their customers, as it raises fears about the exposure of personal and financial information. Ransomware attacks on financial institutions can lead to severe consequences, including financial loss and damage to customer trust. As the situation develops, both banks will need to respond quickly to mitigate the impact of this breach and reassure their clients.

Impact: Citizens Financial Group, Frost Bank
Remediation: N/A
Read Original

The ransomware group known as 'The Gentlemen' has quickly gained notoriety for its rapid operational growth and advanced tactics. Researchers have noted that this gang is not only expanding its reach but also enhancing its methods, making it a significant player in the ransomware space. Their swift rise poses a serious risk to various organizations, as they can potentially exploit vulnerabilities faster than many can respond. This development emphasizes the need for companies to strengthen their cybersecurity measures and remain vigilant against such emerging threats. As ransomware attacks continue to evolve, understanding the capabilities of groups like The Gentlemen is crucial for effective defense.

Impact: N/A
Remediation: N/A
Read Original

House Republicans have introduced a new national privacy bill aimed at regulating data collection and usage across the United States. This legislation appears to draw inspiration from existing privacy laws in states like Virginia and Kentucky. However, experts warn that the bill may struggle to gain sufficient bipartisan support, which could hinder its passage. The bill's introduction comes amid growing concerns over data privacy and consumer protection, making it a significant topic in the current political landscape. If passed, this legislation could set a new standard for how companies handle personal data, impacting both businesses and consumers nationwide.

Impact: N/A
Remediation: N/A
Read Original

A new campaign linked to the Mirai malware is exploiting a serious command-injection vulnerability in D-Link DIR-823X routers, identified as CVE-2025-29635. This vulnerability allows attackers to take control of the routers and integrate them into a botnet. Users of these routers are at risk as their devices can be hijacked for malicious purposes, including launching distributed denial-of-service (DDoS) attacks. This situation is particularly concerning since the affected routers are at the end of their life cycle, meaning they are unlikely to receive security updates. It’s crucial for users to be aware of this exploit and take necessary precautions to secure their networks.

Impact: D-Link DIR-823X routers
Remediation: Users should consider disconnecting their devices from the internet and replacing them with supported models. If replacement is not immediately possible, changing default passwords and disabling remote management features can help mitigate risks.
Read Original
PreviousPage 21 of 187Next