Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Cameron Nicholas Curry, a tech worker from North Carolina, was found guilty of conducting an insider attack that resulted in the theft of sensitive corporate data from a Washington D.C.-based technology company. As his six-month contract was ending, Curry reportedly stole data and demanded a ransom of $2.5 million. This incident raises significant concerns about insider threats, where employees exploit their access to company information for personal gain. Companies need to be vigilant about monitoring employee activities, especially as contracts come to a close, to prevent similar attacks in the future. The case serves as a reminder of the potential risks posed by trusted employees and the importance of cybersecurity measures in protecting sensitive information.

Impact: D.C.-based tech company data
Remediation: Implement stronger monitoring of employee activities, especially during contract terminations. Increase security protocols to restrict access to sensitive data.
Read Original

The French aircraft carrier Charles de Gaulle was inadvertently tracked in real time due to a sailor's activity on the Strava fitness app, revealing a significant operational security lapse. A report by Le Monde indicated that the location of the carrier was exposed when an officer shared running data from the ship, which displayed its coordinates. This incident raises concerns about the security measures in place for military personnel using fitness tracking apps, especially in sensitive environments. The exposure of the carrier's location could have serious implications for national security, as it provides potential adversaries with critical information about military operations and asset movements. This situation serves as a reminder for military and defense organizations to enforce stricter guidelines on the use of personal devices and applications by service members.

Impact: French aircraft carrier Charles de Gaulle, Strava app
Remediation: Military personnel should avoid using fitness apps that publicly share location data while on duty. Stricter operational security protocols should be implemented for the use of personal devices.
Read Original

Bitrefill, a cryptocurrency e-commerce platform, has reported a cyberattack attributed to the North Korean hacking group Lazarus Group. This incident, which occurred earlier this month, resulted in the theft of 18,500 purchase records from Bitrefill's infrastructure. The stolen data could potentially expose users' transaction histories and personal information, raising significant privacy concerns. The involvement of Lazarus Group highlights the ongoing threat posed by state-sponsored cybercriminals, particularly in the cryptocurrency sector. As cryptocurrency transactions often lack the same protections as traditional financial systems, users need to remain vigilant and consider the security of platforms they use.

Impact: Bitrefill purchase records
Remediation: N/A
Read Original
Actively Exploited

Instances of OpenWebUI AI servers have been compromised by attackers using misconfigurations to install malware for cryptocurrency mining and stealing credentials. This attack campaign, which has been ongoing since late 2024, targets users of the widely used open-source software. The compromised servers could lead to unauthorized access to sensitive data and significant resource drain due to the mining activities. Organizations running OpenWebUI should review their server configurations and implement security measures to prevent such incidents. The growing trend of targeting misconfigured servers raises concerns about the security practices within the tech community.

Impact: OpenWebUI servers
Remediation: Review and secure server configurations, implement security best practices, and monitor for unauthorized access.
Read Original

North Korea has been operating a scheme involving fake IT workers to generate substantial revenue, reportedly close to $500 million annually. This operation relies on intricate networks and partnerships with individuals in Western countries, along with the use of an open-source messaging app to facilitate communication. The United Nations has flagged this activity as a significant concern, indicating that it not only finances the North Korean regime but also poses risks to international cybersecurity. The implications extend beyond financial loss; they raise alarms about the potential for increased cyber activities linked to rogue state actors. As this scheme continues to evolve, it underscores the need for vigilance among tech companies and law enforcement agencies worldwide.

Impact: N/A
Remediation: N/A
Read Original

The Interlock ransomware group has been exploiting a severe zero-day vulnerability in Cisco Secure Firewall Management Center software, identified as CVE-2026-20131, since January 26, prior to its public disclosure. This vulnerability allows for insecure deserialization, which can lead to unauthorized access and potential takeover of affected systems. Organizations using Cisco's Secure Firewall Management Center should be particularly vigilant, as the attacks have been ongoing for over a month, posing a significant risk to network security. The situation emphasizes the urgent need for timely security updates and monitoring to protect against such exploitation.

Impact: Cisco Secure Firewall Management Center software, specifically affected versions that are vulnerable to CVE-2026-20131.
Remediation: Organizations should apply any available security patches from Cisco for the affected software. They should also review their configurations and consider implementing additional security measures to mitigate the risk of exploitation.
Read Original

The underground market has seen a rise in refund fraud schemes, where methods like 'refund without return' allow customers to keep items while still getting their money back. Other tactics include chargeback fraud, where buyers dispute charges after receiving goods, and empty-box returns, where customers send back nothing or an empty box. These evolving practices not only cost retailers millions but also complicate the return process for legitimate customers. As these fraudulent activities gain traction, they pose a significant risk to businesses, affecting their bottom line and operational integrity. Companies need to be vigilant and adapt their return policies to combat these schemes effectively.

Impact: Retailers, e-commerce platforms
Remediation: Companies should tighten return policies and implement more robust verification processes for returns and chargebacks.
Read Original

At the RSAC 2026 Conference, a researcher raised alarms about the security risks associated with MCP (Multi-Cloud Platform) in large language model (LLM) environments. They explained that these risks are rooted in the architecture of MCP itself, making them difficult to address with simple patches or updates. This situation poses a significant challenge for organizations utilizing LLMs, as they may inadvertently expose sensitive data or systems to attackers. The implications are serious, affecting not just the integrity of the models but also the security of the broader infrastructure that supports them. Companies using MCP need to reassess their security frameworks to mitigate these inherent vulnerabilities.

Impact: Multi-Cloud Platforms (MCP), Large Language Models (LLMs)
Remediation: Organizations should reassess their security frameworks and consider architectural changes to mitigate inherent vulnerabilities.
Read Original

Aura, a digital security company, has reported a data breach linked to a voice phishing attack that compromised customer information. The exposed data originated from a marketing tool that Aura acquired in 2021. While specific details about the type of data exposed have not been disclosed, the incident raises concerns about the safety of customer data and the potential for further exploitation by cybercriminals. Users affected by this breach should be vigilant for phishing attempts and other suspicious activities. This incident highlights the ongoing risks associated with third-party tools and the importance of robust security measures for customer data protection.

Impact: Aura customer data, marketing tool data
Remediation: Customers should monitor accounts for unusual activity and be cautious of phishing attempts.
Read Original

Researchers from Eclypsium have identified vulnerabilities in four different IP KVM devices: GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and JetKVM. These security flaws allow unauthorized users to gain root access or run malicious code without authentication. This situation poses a serious risk to networks utilizing these devices, as attackers could potentially manipulate connected systems. It’s crucial for users of these products to be aware of these vulnerabilities and take necessary precautions to secure their networks. The discovery emphasizes the need for regular security assessments and updates for devices that manage critical network functions.

Impact: GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, JetKVM
Remediation: Users should apply any available patches or updates for their specific device models and review security configurations to limit unauthorized access.
Read Original

ConnectWise has issued a warning about a serious vulnerability in its ScreenConnect software. This flaw allows attackers to extract ASP.NET machine keys, which could lead to unauthorized access to user sessions. Organizations using ScreenConnect could be at risk, as this vulnerability enables attackers to bypass authentication controls. Users should be aware of the potential for misuse of their systems and take immediate action to protect their data. It is crucial for affected parties to stay updated on this issue and implement necessary safeguards to prevent exploitation.

Impact: ScreenConnect software by ConnectWise
Remediation: Users should apply any available patches or updates provided by ConnectWise and review their security configurations to mitigate risks.
Read Original

Ubiquiti has addressed two vulnerabilities in its UniFi Network app, one of which is particularly serious and could allow attackers to take control of user accounts. This software is commonly used to manage various networking devices such as access points, switches, and gateways. The critical flaw poses a significant risk as it could lead to unauthorized access to sensitive user information and network settings. Users of UniFi products are urged to apply the latest patches to protect their systems. This incident serves as a reminder of the importance of keeping software up-to-date to mitigate potential security risks.

Impact: Ubiquiti UniFi Network app, UniFi networking devices (access points, switches, gateways)
Remediation: Users should apply the latest patches provided by Ubiquiti to secure their systems.
Read Original

Researchers have identified a new malware called Speagle that exploits a legitimate software, Cobra DocGuard, to steal sensitive data. The malware takes control of the program's infrastructure, allowing attackers to collect information from infected computers without detection. This data is then sent to a compromised server associated with Cobra DocGuard, making the exfiltration process appear legitimate. Organizations using Cobra DocGuard should be particularly vigilant, as this malware specifically targets its users. The incident raises concerns about the security of trusted software and the potential for attackers to manipulate legitimate tools for malicious purposes.

Impact: Cobra DocGuard software
Remediation: Users should ensure their Cobra DocGuard software is updated to the latest version and monitor for suspicious activity on their systems.
Read Original

U.S. officials are on alert for potential cyberattacks from Iran, particularly following recent geopolitical tensions. Although there hasn't been a noticeable increase in attacks so far, experts from the Department of Defense and CISA are closely monitoring the situation. In a related incident, the federal government has responded to a breach involving Stryker, a medical technology company. While specific details about the Stryker breach are limited, it emphasizes the ongoing risks that critical infrastructure and healthcare sectors face from cyber threats. The situation serves as a reminder for organizations to bolster their cybersecurity measures and remain vigilant against potential attacks.

Impact: Stryker medical technology systems
Remediation: Organizations should enhance their cybersecurity protocols and monitoring practices.
Read Original

Bitrefill, a crypto-powered gift card retailer, reported that it suffered a cyberattack earlier this month, which it believes was carried out by the North Korean hacking group known as Lazarus, specifically its Bluenoroff sector. This group is known for targeting financial platforms and cryptocurrency services to steal funds. The attack raises concerns about the security of cryptocurrency transactions and the potential for further targeting of similar online services. As cyberattacks from state-sponsored groups continue to evolve, companies in the crypto space may need to enhance their defenses to protect against such threats. The implications of this incident could lead to increased scrutiny and tighter security measures across the industry.

Impact: Bitrefill, cryptocurrency services
Remediation: N/A
Read Original
PreviousPage 3 of 121Next