Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

ESET researchers have uncovered a spyware campaign targeting individuals in Pakistan that employs romance scam tactics. This operation uses a malicious app masquerading as a chat service, which facilitates conversations through WhatsApp but primarily serves to steal data from infected devices. The malware is identified as GhostChat, and it appears to be part of a larger surveillance effort by the same threat actor. This incident is particularly concerning as it exploits personal relationships and trust, potentially affecting many unsuspecting users who are seeking companionship online. The implications of such spyware are significant, as it not only compromises personal data but also raises issues of privacy and security in digital communications.

Impact: Android devices, GhostChat malware
Remediation: Users should avoid downloading apps from untrusted sources and be cautious of any application promising to facilitate communication with potential romantic partners. Regularly updating device software and using security solutions can also help mitigate risks.
Read Original
Actively Exploited

The U.S. Justice Department has charged 31 individuals connected to a widespread ATM jackpotting scheme that exploited Ploutus malware to steal cash from ATMs nationwide. This malware allows attackers to manipulate ATM systems, enabling them to dispense large amounts of cash illegally. The recent indictments are part of ongoing efforts to combat this type of cybercrime, which poses significant risks to financial institutions and the security of ATM networks. With these arrests, authorities aim to disrupt the operations of organized criminal groups involved in such schemes. This incident serves as a reminder for banks and ATM operators to enhance their security measures against sophisticated cyber threats.

Impact: ATMs, financial institutions
Remediation: Banks and ATM operators should enhance security protocols, including monitoring for unusual ATM activity and updating software to protect against malware.
Read Original
Actively Exploited

A report from Trellix reveals that healthcare cyberattacks are becoming a significant safety issue, with over 54.7 million detections reported in 2025. Email is identified as the main attack vector, accounting for 85% of these incidents, and the United States is the most targeted nation, representing 75% of the detections. This alarming trend shows how vulnerable healthcare systems are to cyber threats, which can compromise patient safety and data integrity. With the increasing reliance on digital communication in healthcare, organizations need to bolster their security measures to protect sensitive information and ensure operational continuity. The findings call for urgent attention from healthcare providers to strengthen their defenses against these persistent cyber threats.

Impact: Healthcare systems, email communication systems
Remediation: Organizations should enhance email security protocols, implement multi-factor authentication, and conduct regular security training for employees.
Read Original

Spain's High Court has ended its investigation into the alleged use of NSO Group's Pegasus spyware against high-ranking officials, including Prime Minister Pedro Sánchez and Defense Minister Margarita Robles. The court cited a persistent lack of cooperation from Israeli authorities as a significant barrier to the investigation. This probe was initiated after reports surfaced of the spyware being used to monitor the communications of key political figures. The closure of the investigation raises concerns about accountability and transparency regarding the use of such surveillance tools, especially given the potential implications for privacy and civil liberties. The situation highlights ongoing tensions between governments and private surveillance companies.

Impact: Pegasus spyware, NSO Group products
Remediation: N/A
Read Original

As ransomware attacks become more aggressive, Chief Information Security Officers (CISOs) are urged to shift their focus towards enhancing business resilience. This includes taking immediate action to patch vulnerabilities, increasing user education to prevent successful phishing attempts, and implementing multi-factor authentication to secure access points. The rise in violent tactics used by attackers signals a need for companies to rethink their cybersecurity strategies and prioritize defense measures that can minimize disruptions. By proactively addressing these areas, organizations can better protect their assets and ensure continuity in the face of potential ransomware threats.

Impact: N/A
Remediation: Promptly patch vulnerabilities, improve user education, deploy multi-factor authentication.
Read Original

A vulnerability in WinRAR, a popular file compression software, is being exploited by Russian and Chinese nation-state attackers, even though a patch was released last July to fix the issue. This flaw poses a significant risk, particularly to small and medium-sized businesses (SMBs), which may not have updated their software or may be unaware of the vulnerability. The fact that this exploitation is ongoing months after the patch was issued raises concerns about the security practices of many organizations. Companies using affected versions of WinRAR need to take immediate action to protect themselves from potential breaches. Staying updated with software patches is crucial, especially when attackers are targeting known vulnerabilities.

Impact: WinRAR versions prior to the patch released in July 2023
Remediation: Users should update to the latest version of WinRAR as per the July 2023 patch.
Read Original

In late December, Poland's energy grid experienced a coordinated cyberattack that affected around 30 facilities nationwide. The attackers targeted various distributed energy resources, including combined heat and power plants, as well as wind and solar energy systems. This incident raises concerns about the security of critical infrastructure, as energy systems are essential for everyday life and economic stability. The attack not only disrupted operations but also highlighted vulnerabilities in the energy sector that could be exploited in the future. Authorities are likely to investigate the incident further to bolster defenses against potential future threats.

Impact: Combined heat and power (CHP) facilities, wind and solar dispatch systems
Remediation: N/A
Read Original

A class action lawsuit has been filed against xAI, the company behind the Grok deepfake technology, by individuals whose images were used to create non-consensual sexual content. The lawsuit claims that xAI is exploiting a growing demand for humiliating deepfake images, which raises significant ethical and legal concerns. The plaintiffs argue that their rights and privacy have been violated, as their likenesses were used without consent in a harmful manner. This incident highlights ongoing issues surrounding deepfake technology and the urgent need for better regulations to protect individuals from such abuses. The outcome of this lawsuit could set important precedents for how deepfake content is handled legally in the future.

Impact: Grok deepfake technology from xAI
Remediation: N/A
Read Original

Fortinet has confirmed a new zero-day vulnerability that is allowing attackers to exploit single sign-on (SSO) authentication for malicious logins. In response to the ongoing attacks, the company has temporarily disabled FortiCloud SSO authentication across all devices to mitigate the risk. This means that users relying on this feature for secure access may face disruptions while Fortinet works on a solution. The situation is particularly concerning as it puts sensitive information at risk and could lead to unauthorized access to critical systems. Companies using Fortinet products should monitor the situation closely and be prepared to implement any updates once they are released.

Impact: FortiCloud SSO authentication
Remediation: Temporarily disabled FortiCloud SSO authentication for all devices
Read Original

MicroWorld Technologies, the company behind the eScan antivirus software, has confirmed that one of its update servers was compromised. This breach allowed attackers to distribute a malicious update to a small number of eScan users earlier this month. The unauthorized update was later analyzed and flagged as harmful, raising concerns about the security of users' systems. Although the number of affected customers is limited, the incident underscores the risks associated with software updates and the potential for malicious actors to exploit vulnerabilities in update mechanisms. Users of eScan should remain vigilant and ensure their software is updated from legitimate sources to avoid such threats.

Impact: eScan antivirus software
Remediation: Users are advised to ensure that software updates are obtained from trusted sources only.
Read Original

A new cyber threat known as the PeckBirdy framework has been linked to advanced persistent threats (APTs) associated with China. This framework is particularly targeting gambling and government entities, utilizing JScript and living-off-the-land binaries (LOLBins) to execute attacks across various environments. The implications of these attacks are significant, as they could compromise sensitive information and disrupt operations within the affected sectors. Organizations in the gambling and government sectors should be vigilant and strengthen their security measures to prevent potential breaches. Researchers are continuing to monitor the situation for further developments and potential mitigation strategies.

Impact: Gambling and government entities
Remediation: Organizations should enhance security protocols and monitor for unusual activity. Specific patches or updates were not mentioned.
Read Original

SEC Consult has identified several security vulnerabilities in Dormakaba's exos 9300 access systems, including hardcoded credentials, weak passwords, and command injection flaws. These vulnerabilities could allow attackers to remotely unlock doors, posing a significant risk to physical security in facilities that rely on these systems. Dormakaba, a leading provider of access control solutions, serves a wide range of industries, meaning many organizations could be affected. Users of the exos 9300 need to be aware of these vulnerabilities and take immediate action to secure their systems to prevent unauthorized access. The findings emphasize the need for strong security practices in access control systems, especially in critical infrastructure.

Impact: Dormakaba exos 9300 access systems
Remediation: Users should change hardcoded credentials and implement stronger password policies. Regular security audits and updates should be performed to mitigate command injection risks.
Read Original

A recent analysis of over 33 million SMS messages has revealed a significant security flaw in how many authentication systems operate. Researchers found that numerous services treat the possession of a URL sent via SMS as adequate proof of a user's identity. This method can expose users to risks, as attackers could potentially intercept these messages to gain unauthorized access to accounts. The findings suggest that many companies may need to rethink their verification processes to enhance security and protect user data. As more services rely on SMS for authentication, this issue raises concerns about the overall safety of personal information across various platforms.

Impact: Various online services using SMS for authentication
Remediation: Implement stronger verification methods beyond SMS link possession, such as multi-factor authentication.
Read Original

Researchers have identified two serious vulnerabilities in the n8n workflow automation platform that could expose instances to remote code execution (RCE) attacks. If exploited, attackers could gain full control of affected systems, allowing them to access sensitive data and execute arbitrary code on the underlying host. This situation poses a significant risk to organizations that rely on n8n for automating workflows, as it could lead to data breaches and system compromises. Users of n8n are urged to take immediate action to secure their instances against these vulnerabilities. The details of these flaws underscore the need for vigilance in maintaining security in automation tools.

Impact: n8n workflow automation platform
Remediation: Users should apply available patches and updates to n8n as they become available and review security configurations to mitigate potential risks.
Read Original

WhatsApp has announced new security enhancements that include stricter account settings and integration of the Rust programming language into its codebase. These updates aim to improve the overall security of the messaging platform, which is used by over two billion people globally. The stricter account settings will help users better manage their privacy and security, potentially reducing the risk of unauthorized access. Rust integration is expected to bolster performance and security, as the language is known for its memory safety features. These changes come as part of WhatsApp’s ongoing efforts to protect user data and maintain trust in its platform, especially as cyber threats continue to evolve.

Impact: WhatsApp
Remediation: N/A
Read Original
PreviousPage 24 of 101Next