Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Recent reports indicate that hundreds of test environments, which were originally designed for security training, have been misconfigured and are now exposing vulnerabilities to attackers. These misconfigurations have turned these environments into easy targets for cryptocurrency miners, who can exploit them to mine digital currencies without the organization’s consent. This situation poses a significant risk not only to the organizations involved but also to the broader cloud infrastructure, as it highlights the potential for mismanaged environments to be weaponized. Companies that utilize these training applications need to reassess their configurations and security measures to prevent unauthorized access and potential financial losses.

Impact: Test environments for security training, cloud infrastructure
Remediation: Organizations should review and secure their test environment configurations, implement strict access controls, and monitor for unusual activity to prevent exploitation.
Read Original
Actively Exploited

Attackers are exploiting unsecured Zendesk instances to send out a large volume of spam. These instances allow anyone, including unverified users, to submit support tickets, which the attackers are taking advantage of. This has led to a significant increase in spam messages across various platforms, affecting organizations that rely on Zendesk for customer support. The situation raises concerns about the security of customer interaction tools and highlights the need for companies to ensure their systems are properly configured to prevent unauthorized access. Organizations using Zendesk should review their security settings to mitigate this risk.

Impact: Zendesk support ticket system
Remediation: Review and secure Zendesk configurations to restrict ticket submissions to verified users.
Read Original

At the Davos 2026 conference, Dave Treat, the chief technology officer at Pearson, raised concerns about the challenges AI agents face in distinguishing between legitimate and deceptive tactics that could mislead human employees. As AI technology becomes more integrated into various sectors, ensuring that these systems can effectively recognize and respond to potential security threats is crucial. The discussion emphasizes the growing need for organizations to develop robust training and protocols for AI to minimize risks associated with social engineering and other deceptive practices. This issue is particularly relevant as more companies adopt AI-driven solutions, making it essential to address these vulnerabilities to protect sensitive information and maintain trust in automated systems. The conversation at Davos signals a call to action for businesses to enhance their cybersecurity measures in the age of AI.

Impact: N/A
Remediation: N/A
Read Original

Concerns have arisen over China's electric buses, which are currently in use across Australia and Europe. These buses have been found to have vulnerabilities that could be exploited by cybercriminals. Additionally, there is a worrying feature described as a virtual kill switch, which could potentially be activated by the Chinese government. This has prompted the Australian government to review the security implications of these vehicles. The situation raises significant questions about the safety of critical infrastructure and the potential risks posed by foreign technology in public transport systems.

Impact: Chinese electric buses deployed in Australia and Europe
Remediation: N/A
Read Original

Okta has issued a warning about a new wave of attacks targeting its Single Sign-On (SSO) accounts through voice phishing, or vishing. Attackers are using custom phishing kits designed specifically for these social engineering tactics to trick users into revealing their Okta SSO credentials. This breach affects organizations that rely on Okta for secure login processes, potentially exposing sensitive data if attackers gain access. As these attacks are currently active, users are urged to remain vigilant and verify any requests for sensitive information they receive via phone. This situation emphasizes the need for enhanced security measures and user education on recognizing vishing attempts.

Impact: Okta SSO accounts
Remediation: Users should verify requests for sensitive information and consider enabling multi-factor authentication (MFA) for added protection.
Read Original

A watchdog group has filed a lawsuit against the Transportation Security Administration (TSA) seeking the release of a data-sharing agreement with U.S. Immigration and Customs Enforcement (ICE). This legal action comes just one day after a TSA official defended the data-sharing practice during a congressional hearing, labeling it essential for national security. The lawsuit raises concerns about privacy and the extent of collaboration between federal agencies regarding personal data. The outcome could influence how government agencies manage and share information related to travelers, particularly in the context of immigration enforcement. This issue is significant as it touches on civil liberties and the balance between security measures and individual rights.

Impact: TSA, ICE
Remediation: N/A
Read Original

Experts are predicting that in 2026, we will see a rise in AI-driven cyberattacks, which could lead to more sophisticated breaches than ever before. These attacks may include techniques such as 'vibe hacking,' which manipulates user emotions and perceptions to gain unauthorized access. There's also a growing debate around ransom payments, as companies grapple with whether to pay attackers to retrieve their data. These developments pose significant risks to businesses and individuals alike, as trust in digital systems may begin to erode if these threats are not addressed effectively. Overall, the anticipated changes could reshape the cybersecurity landscape and challenge existing defenses.

Impact: N/A
Remediation: N/A
Read Original

Concerns are rising in Europe regarding the heavy reliance on US cybersecurity firms. This unease has been amplified by recent discussions about the potential takeover of Greenland, which is seen as a threat to European sovereignty and trust in US tech companies. The European Union is increasingly worried that this dependence could compromise its cybersecurity posture and lead to vulnerabilities. As a result, many EU nations are considering strategies to bolster local cybersecurity solutions and reduce reliance on foreign technology. This trend reflects broader anxieties about national security and data privacy within the region.

Impact: N/A
Remediation: N/A
Read Original

A new strain of ransomware known as Osiris has been identified, targeting a major food service franchisee operator in Southeast Asia in November 2025. The attackers utilized a malicious driver called POORTRY in a technique known as bring your own vulnerable driver (BYOVD), which helps them disable security measures on the victim's systems. This method allows the ransomware to operate without detection, increasing the risk of data theft and operational disruption. The emergence of Osiris is concerning as it reflects a growing trend in ransomware attacks that exploit existing drivers to bypass security protocols. Organizations, especially those in sensitive sectors like food services, need to be vigilant and ensure their security measures can defend against such sophisticated techniques.

Impact: Osiris ransomware, POORTRY driver
Remediation: Organizations should implement strict monitoring of driver installations, apply security patches promptly, and enhance endpoint protection to detect and prevent the exploitation of vulnerable drivers.
Read Original

Google's 'Take A Message' voicemail feature has been reported to unintentionally leave recorded messages, potentially leaking sensitive background audio. This issue can affect users who rely on this feature for managing their voicemails. The concern arises particularly when users believe their conversations are private, but the feature may be recording and storing audio without their knowledge. Such vulnerabilities can lead to privacy breaches and unwanted exposure of personal information. Users are advised to disable this feature until a fix is provided to prevent any unintended leaks.

Impact: Google Pixel devices using the 'Take A Message' feature
Remediation: Users should turn off the 'Take A Message' feature until a resolution is implemented.
Read Original

A recent investigation by Citizen Lab has revealed that the Jordanian government allegedly utilized Cellebrite's phone-cracking technology to target activists during protests related to Gaza. This use of advanced surveillance tools raises serious concerns about human rights violations and the government's approach to dissent. The technology, which is designed to extract data from mobile devices, appears to have been deployed to monitor and potentially intimidate individuals expressing their views. This incident is part of a broader pattern of state surveillance and repression against activists, highlighting the ongoing challenges faced by those advocating for human rights in the region.

Impact: Cellebrite phone-cracking technology
Remediation: N/A
Read Original

Last month, a situation involving Waymo's autonomous vehicles in San Francisco raised concerns about their ability to process contextual identity information. When the vehicles shut down, they inadvertently caused significant traffic disruptions, revealing a gap in their operational understanding. This incident points to the need for improved identity recognition systems within autonomous technology to prevent similar occurrences in the future. As these vehicles integrate more into urban environments, ensuring they can effectively interpret their surroundings and react appropriately is crucial for maintaining traffic flow and safety. The implications of this incident highlight the challenges faced by companies developing self-driving technology and the importance of addressing potential identity-related issues in their systems.

Impact: Waymo autonomous vehicles
Remediation: Enhancements to context-aware identity recognition systems are needed to prevent future incidents.
Read Original

A serious vulnerability has been discovered in the GNU InetUtils telnet daemon (telnetd) that has existed for nearly 11 years. This flaw, identified as CVE-2026-24061, allows attackers to bypass authentication remotely and gain root access to affected systems. It impacts all versions of GNU InetUtils from 1.9.3 to 2.7. Given its high CVSS score of 9.8, this vulnerability poses a significant risk to organizations still using these versions. Users and administrators should prioritize addressing this issue to prevent unauthorized access to their systems.

Impact: GNU InetUtils telnet daemon (telnetd), all versions from 1.9.3 to 2.7
Remediation: Users should upgrade to the latest version of GNU InetUtils that addresses this vulnerability. Specific patch numbers or versions were not mentioned, so it's crucial to consult official sources for the latest updates.
Read Original

A failure in operational security by the INC ransomware group has allowed researchers to recover data stolen from 12 U.S. organizations. This incident highlights vulnerabilities in the ransomware gang's methods, which typically aim to keep their operations hidden and secure. The affected organizations were able to regain access to their compromised data, which could lessen the impact of the attack. Such operational oversights by attackers can provide critical opportunities for recovery and response for victims. This situation serves as a reminder for organizations to remain vigilant and proactive in their cybersecurity measures to protect against ransomware threats.

Impact: Data from 12 U.S. organizations affected by INC ransomware
Remediation: Organizations should review their cybersecurity practices, enhance data backup protocols, and implement robust incident response strategies.
Read Original

A recent report by the World Economic Forum indicates a significant lack of confidence among cybersecurity professionals in Latin America regarding their countries' ability to defend against cyberattacks targeting critical infrastructure. The findings suggest that many experts believe their nations are not adequately prepared to handle potential threats, which could lead to serious vulnerabilities in essential services. This lack of faith is concerning, especially as cyberattacks continue to rise globally. The situation calls for urgent attention to improve cybersecurity measures and training in the region. Without stronger defenses, critical infrastructure may remain at risk of attacks that could disrupt services and endanger public safety.

Impact: Critical infrastructure in Latin America
Remediation: Enhance cybersecurity measures and training programs
Read Original
PreviousPage 21 of 88Next