Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A new strain of malware known as GlassWorm has been found targeting macOS systems through compromised OpenVSX extensions. This malware aims to steal sensitive information, including passwords, cryptocurrency wallet data, and developer credentials. Users who have installed these extensions may be at risk, highlighting a significant security issue for developers and crypto users on macOS. Researchers emphasize the importance of vigilance when installing third-party extensions and recommend that users ensure their software is up-to-date. This incident underscores the need for better security practices in the software development ecosystem to prevent such attacks.

Impact: macOS systems, OpenVSX extensions
Remediation: Users should uninstall any suspicious OpenVSX extensions and ensure their macOS and software are updated to the latest versions. Regularly changing passwords and using two-factor authentication where possible is also advised.
Read Original

In 2019, two penetration testers were wrongfully arrested by Iowa police while conducting a security assessment. The incident arose during a red teaming exercise, where they were hired to simulate attacks on a local government system to identify vulnerabilities. This situation illustrates the dangers that cybersecurity professionals face when their work is misunderstood by law enforcement or the public. The county has since settled the case, paying $600,000 to the testers, which raises concerns about how security practices are perceived and the potential legal ramifications for professionals in this field. This case serves as a reminder for organizations to ensure clear communication and understanding of security testing protocols.

Impact: N/A
Remediation: N/A
Read Original

Ukraine's Computer Emergency Response Team (CERT) has reported that Russian hackers are taking advantage of a newly patched vulnerability in Microsoft Office, identified as CVE-2026-21509. This flaw affects multiple versions of the software, which could leave users open to various cyberattacks. The exploitation of this vulnerability is concerning, especially as Microsoft Office is widely used in both personal and professional settings. Users and organizations are urged to ensure that their systems are updated with the latest security patches to mitigate the risk of being targeted. The situation underscores the need for vigilance in maintaining software security, especially with ongoing geopolitical tensions.

Impact: Microsoft Office (multiple versions)
Remediation: Users should apply the latest updates and patches provided by Microsoft for their respective versions of Office. Regularly check for updates to ensure protection against this vulnerability.
Read Original

In a troubling development, researchers have discovered over 230 malicious packages targeting OpenClaw, an AI assistant tool, within just a week. These packages, found on the tool's official registry and GitHub, are designed to steal user passwords. This situation raises concerns as it affects users of OpenClaw who may inadvertently download these harmful packages, putting their sensitive information at risk. The rapid proliferation of these packages indicates a serious security threat to the AI assistant community. Users are urged to be cautious and verify the legitimacy of any packages before installation.

Impact: OpenClaw (formerly Moltbot and ClawdBot)
Remediation: Users should avoid downloading packages from unverified sources and ensure they are using trusted versions of OpenClaw.
Read Original

A recent security audit conducted by Koi Security has revealed that out of 2,857 skills available on ClawHub, 341 were identified as malicious. These harmful skills are designed to steal data from users of OpenClaw, an artificial intelligence assistant platform. The presence of these malicious skills raises significant supply chain risks for users who depend on third-party integrations. As ClawHub serves as a marketplace for these skills, the findings indicate a pressing need for enhanced security measures to protect users from potential data breaches. Users of OpenClaw should be vigilant when selecting skills and consider the implications of using third-party applications that may not be secure.

Impact: ClawHub, OpenClaw users
Remediation: Users should avoid installing skills from unverified sources and regularly review the permissions granted to installed skills.
Read Original

According to a report by TRM Labs, illegal cryptocurrency transactions reached a staggering $158 billion in 2025, marking a 145% increase in illicit cryptocurrency flows compared to previous years. Despite this surge, the overall share of illegal activities within the total on-chain volume has slightly decreased to 1.2%. This indicates that while the absolute value of illicit transactions is rising, they represent a smaller fraction of total cryptocurrency activity. This trend raises concerns about the potential for increased criminal activity in the digital currency space and highlights the ongoing challenges in regulating and monitoring cryptocurrency transactions. It is crucial for law enforcement and regulatory agencies to adapt their strategies to address these growing risks effectively.

Impact: N/A
Remediation: N/A
Read Original

A massive distributed denial-of-service (DDoS) attack has reached a staggering 31.4 terabits per second, setting new records for online attacks. This incident is attributed to a powerful botnet known as the 'apex' botnet, which has been exploiting consumer devices, such as routers and smart home gadgets, to amplify its attack capabilities. As attackers increasingly turn ordinary home devices into tools for cyber warfare, businesses and individuals alike are at risk of service disruptions. The scale of this attack serves as a wake-up call for users to secure their connected devices and for companies to enhance their defenses against such overwhelming assaults. The implications are serious, as these attacks can cripple online services and affect a vast number of users worldwide.

Impact: Consumer devices, routers, smart home gadgets
Remediation: Users should secure their devices by changing default passwords, updating firmware regularly, and disabling unnecessary services. Companies need to implement stronger network defenses and monitor traffic for unusual patterns.
Read Original

The National Security Agency (NSA) has released new guidelines aimed at helping organizations implement Zero Trust security models effectively. This approach focuses on minimizing trust assumptions within networks, requiring strict verification for every user and device attempting to access resources. The guidelines are designed for organizations looking to reach a target-level maturity in their Zero Trust practices, which is increasingly important as cyber threats evolve. By adopting these recommendations, companies can better protect their sensitive data and systems from unauthorized access. This is particularly relevant for sectors handling critical infrastructure or sensitive information.

Impact: N/A
Remediation: Organizations should follow the NSA's guidelines for Zero Trust implementation.
Read Original

A recent report from CTM360 warns of a significant rise in fake high-yield investment platforms globally. These scams typically lure victims with promises of 'guaranteed' returns, which often turn out to be classic Ponzi schemes. Researchers found that these fraudulent schemes are proliferating through social media, using recycled marketing templates and exploiting referral systems to attract more victims. This surge in HYIP scams poses a serious risk to investors, many of whom may be unaware they are being targeted. The findings highlight the need for increased awareness and caution among potential investors, as well as for regulatory bodies to take action against these deceptive practices.

Impact: High-yield investment platforms, social media users, potential investors
Remediation: Investors should conduct thorough research before investing, be wary of promises of guaranteed returns, and report suspicious platforms to authorities.
Read Original

The ShinyHunters group has expanded its extortion activities by using advanced vishing techniques and login harvesting to compromise Single Sign-On (SSO) credentials. This allows them to enroll unauthorized Multi-Factor Authentication (MFA), making it easier for them to access sensitive information. Organizations that rely on SSO for employee access are particularly at risk, as the attackers can bypass standard security measures. This escalation in tactics is concerning for businesses and individuals alike, as it highlights the increasing sophistication of cybercriminals and their methods for gaining unauthorized access. Companies should be vigilant about their security protocols and ensure that their MFA implementations are robust against these types of attacks.

Impact: Single Sign-On (SSO) systems, Multi-Factor Authentication (MFA) implementations
Remediation: Organizations should strengthen their MFA setups, conduct regular security audits, and train employees to recognize vishing attempts.
Read Original
Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Ivanti has reported two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These flaws allow remote code execution, meaning attackers could potentially take control of affected systems without needing physical access. The company warns that these vulnerabilities are currently being actively exploited, putting users at risk. Organizations using EPMM should prioritize applying the necessary security updates to safeguard their systems. Failure to address these vulnerabilities could lead to significant security breaches, affecting both the integrity of user data and the overall security posture of the organization.

Impact: Ivanti Endpoint Manager Mobile (EPMM) software
Remediation: Users should apply the latest patches provided by Ivanti for EPMM to mitigate the vulnerabilities. Specific patch numbers or versions were not mentioned in the article, but it is critical to ensure that the software is updated to the latest version available.
Read Original

The article discusses the rapid development of a personal AI assistant called OpenClaw, which has raised alarms among cybersecurity experts. Researchers are concerned about its evolution from Clawdbot to OpenClaw, particularly due to its potential to be misused in malicious ways. As this AI technology becomes more sophisticated, it could be exploited by attackers to automate phishing scams, generate fake content, or even execute more complex cyberattacks. This situation poses risks to both individuals and organizations, as they may find it increasingly difficult to identify genuine communications from AI-generated ones. The urgency for improved security measures and user awareness is evident as this technology continues to advance.

Impact: Clawdbot, OpenClaw, AI personal assistants
Remediation: Users should remain vigilant about communications and verify sources; organizations need to enhance security protocols for AI interactions.
Read Original
Spotify and Major Music Labels Sue Anna’s Archive for $13 Trillion

Hackread – Cybersecurity News, Data Breaches, AI, and More

Spotify and major music labels have launched an astonishing $13 trillion lawsuit against Anna’s Archive, claiming the site conducted a significant data scrape of their music catalog. This lawsuit, one of the largest in history, stems from allegations that Anna's Archive unlawfully collected and distributed music data, which could have far-reaching implications for digital music sharing and copyright enforcement. The outcome of this case may set a precedent for how music rights are protected online and could influence the future of streaming services. If successful, this lawsuit could not only impact Anna’s Archive but also affect countless other platforms that aggregate music data. The case raises important questions about the balance between access to music and the rights of artists and record labels.

Impact: Spotify, major music labels (Universal Music Group, Sony Music Entertainment, Warner Music Group), Anna’s Archive
Remediation: N/A
Read Original

Poland's Computer Emergency Response Team (CERT) has reported a serious cyberattack on the country's energy facilities. The attack involved the exploitation of default credentials in industrial control systems (ICS), which allowed attackers to gain unauthorized access and cause significant disruptions. This incident raises concerns about the security of critical infrastructure, particularly as it highlights the risks associated with using default login information. The targeted energy facilities are crucial for Poland's power supply, and any breach in their security can have widespread implications for both the economy and public safety. The report also suggests that this attack may be part of a broader trend of cyber threats aimed at critical infrastructure worldwide.

Impact: Polish energy facilities, industrial control systems (ICS)
Remediation: Organizations should change default credentials immediately, implement stronger access controls, and regularly update their security protocols for ICS.
Read Original

A recent investigation has revealed that two AI coding assistants, which are popular among approximately 1.5 million developers, are secretly transmitting all the code they process to servers in China. This raises serious concerns about data privacy and security, as users may unknowingly expose their proprietary or sensitive code. The report suggests that developers should consider alternatives to these tools to protect their intellectual property. The implications of this breach could be significant, especially for companies that rely on these coding assistants for software development. Users need to be aware of the risks associated with using these tools and take necessary precautions to safeguard their work.

Impact: AI coding assistants used by 1.5 million developers
Remediation: Consider using alternative coding assistants to protect sensitive code.
Read Original
PreviousPage 3 of 86Next