Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Amazon Web Services (AWS) has released an updated compliance report for its Payment Cryptography service, confirming that it meets Payment Card Industry Personal Identification Number (PCI PIN) standards. This update follows a thorough audit by a Qualified Security Assessor (QSA). The compliance package is now available on AWS's compliance portal and includes an Attestation of Compliance (AOC) as well as additional documentation. This is significant for businesses using AWS Payment Cryptography, as it assures them that the service adheres to stringent security measures for handling payment data. Ensuring compliance not only helps protect sensitive information but also builds trust with customers who rely on secure payment processing.

Impact: AWS Payment Cryptography service
Remediation: N/A
Read Original

Nike is currently investigating a potential data breach following claims from the WorldLeaks cybercrime group that they accessed and stole information from the company’s systems. The company has acknowledged the situation and is working to determine the extent of the security incident. This investigation comes at a time when many companies are facing increasing threats from hackers looking to exploit vulnerabilities for sensitive data. If the claims are verified, it could lead to serious implications for Nike, affecting customer trust and potentially exposing personal information. The outcome of Nike’s investigation will be closely watched, as it may reveal more about the tactics used by cybercriminals today.

Impact: Nike's customer data, internal systems
Remediation: N/A
Read Original

Microsoft is looking into issues with some Windows 11 devices that are failing to boot after users installed the January 2026 Patch Tuesday security updates. Affected users are encountering 'UNMOUNTABLE_BOOT_VOLUME' errors, which prevent their systems from starting up properly. This situation could disrupt the workflow of many individuals and organizations that rely on Windows 11 for daily operations. Microsoft has not yet provided a specific fix or workaround for the problem, leaving users uncertain about how to resolve the issue. The investigation is ongoing as the company seeks to identify the root cause of the boot failures and implement a solution.

Impact: Windows 11 devices
Remediation: N/A
Read Original

A new ransomware strain called Osiris was identified in a November 2025 attack targeting a significant food service franchise in Southeast Asia. Researchers from Symantec and Carbon Black reported that the attackers used a malicious driver known as POORTRY through a technique called Bring Your Own Vulnerable Driver (BYOVD) to disable security tools. This method allowed the ransomware to operate without detection, posing a serious risk to the affected organization. With ransomware attacks on the rise, this incident highlights the need for companies to strengthen their defenses against evolving tactics. The incident serves as a reminder for businesses to continuously update their security measures and remain vigilant against such threats.

Impact: Osiris ransomware, POORTRY driver
Remediation: Companies should strengthen their security measures, update antivirus software, and monitor for unusual activity to mitigate risks from ransomware attacks.
Read Original
FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys

Hackread – Cybersecurity News, Data Breaches, AI, and More

In a recent incident, the FBI accessed the BitLocker recovery keys of Windows laptops after Microsoft shared these keys as part of a legal request. This situation raises significant concerns about user privacy and data security, as it reveals how easily law enforcement can obtain sensitive information stored on personal devices. Affected users include anyone using Windows laptops that utilize BitLocker encryption for data protection. The implications are serious; users may feel their encrypted data is not as secure as previously thought, prompting a reevaluation of reliance on built-in security features. This incident serves as a reminder that while encryption is a valuable tool, it does not guarantee absolute privacy when legal authorities are involved.

Impact: Windows PCs utilizing BitLocker encryption
Remediation: Users should consider additional layers of security, such as using personal encryption solutions or regularly updating privacy settings.
Read Original

The North Korean hacker group Konni is targeting blockchain developers and engineers with malware created using artificial intelligence. This new form of PowerShell malware is designed to infiltrate systems and steal sensitive information from individuals working in the blockchain sector. As the blockchain industry continues to grow, these attacks pose a significant risk to its security and the integrity of its projects. Developers in this field need to be particularly vigilant and ensure they have the latest security measures in place to protect against these sophisticated threats. The use of AI in malware creation represents a concerning evolution in cybercrime tactics, making it harder for security professionals to defend against such attacks.

Impact: PowerShell malware targeting blockchain developers and engineers
Remediation: Users should implement strong security protocols, update antivirus software regularly, and be cautious of suspicious emails or links.
Read Original

Nike is currently investigating a potential security incident after the WorldLeaks cybercrime group claimed to have stolen sensitive data from the company. The attackers have threatened to leak this information if their demands are not met. This situation raises concerns about the security of customer data and proprietary company information, which could lead to significant reputational damage for Nike. As the investigation unfolds, it is important for users and stakeholders to stay informed about the nature of the data involved and any implications for their privacy and security. Companies like Nike must remain vigilant to protect against such threats as cybercriminals continue to target large organizations.

Impact: Nike systems and potentially customer data
Remediation: N/A
Read Original

In late December 2025, the Russian hacking group Sandworm attempted a significant cyber attack on Poland's power sector, described by officials as the largest of its kind targeting the country's energy infrastructure. The attack involved a new type of malware called DynoWiper, which was designed to disrupt power operations. Fortunately, the attack was thwarted, and Poland's energy minister, Milosz Motyka, confirmed that the country's cyberspace forces detected and responded to the threat in time. This incident emphasizes the ongoing risks facing critical infrastructure from state-sponsored actors and highlights the importance of robust cybersecurity measures in protecting essential services. As cyber threats continue to evolve, organizations must remain vigilant to safeguard against potential disruptions.

Impact: Poland's power sector
Remediation: N/A
Read Original

Researchers have discovered a critical vulnerability in the GNU InetUtils telnet daemon (telnetd), tracked as CVE-2026-24061, which has remained unnoticed for nearly 11 years. This flaw affects all versions from 1.9.3 to 2.7 and has a high severity score of 9.8, indicating a significant risk. If exploited, attackers could gain root access to affected systems, posing a serious threat to security. This vulnerability impacts a variety of systems that rely on GNU InetUtils, making it imperative for users and organizations to address this issue promptly. As this flaw has been present for so long, it raises concerns about the security practices in place for maintaining software.

Impact: GNU InetUtils versions 1.9.3 to 2.7
Remediation: Users should upgrade to a patched version of GNU InetUtils to mitigate this vulnerability. It is crucial to check for any available updates or patches that address CVE-2026-24061.
Read Original

A recent data leak has exposed millions of account credentials from various platforms, including Gmail, Facebook, and numerous financial services. This dataset contains sensitive information, potentially affecting countless users who have accounts on these platforms. The breach raises serious concerns about identity theft and fraud, as attackers may exploit this data for malicious activities. Users are urged to change their passwords immediately and enable two-factor authentication where available. This incident highlights the ongoing challenges of online security, reminding everyone of the importance of safeguarding personal information.

Impact: Gmail, Facebook, various financial accounts
Remediation: Users should change passwords and enable two-factor authentication.
Read Original
Actively Exploited

The SagaEVM blockchain has suspended its operations after a significant security breach that resulted in the theft of nearly $7 million in cryptocurrency assets. The incident, reported by Cybernews, raises concerns about the safety and security of blockchain technologies, particularly for investors and users involved with SagaEVM. This event not only impacts the immediate financial stability of the platform but also shakes user confidence in blockchain security as a whole. As the cryptocurrency landscape continues to evolve, incidents like this underscore the necessity for robust security measures and protocols within blockchain systems. Users and stakeholders will need to stay informed about the situation as it develops.

Impact: SagaEVM blockchain
Remediation: N/A
Read Original

A serious vulnerability has been discovered in all versions of GNU InetUtils telnetd, specifically those ranging from 1.9.3 to 2.7. This flaw, which allows remote attackers to bypass authentication, has gone unnoticed for nearly 11 years. Given the age of this issue, many systems may still be running vulnerable versions, putting users at risk. The discovery emphasizes the need for organizations to audit their systems and ensure they are not using outdated software. Users and administrators should take immediate action to update or patch their systems to mitigate potential exploitation.

Impact: GNU InetUtils telnetd versions 1.9.3 to 2.7
Remediation: Update to the latest version of GNU InetUtils telnetd to address the vulnerability.
Read Original

Recent research has revealed that attackers can now conduct more efficient intrusions targeting page caches in Linux systems. The study highlights vulnerabilities in how Linux manages memory, particularly in the page cache, which can be manipulated to access sensitive information. This development poses a risk to a wide range of Linux distributions, potentially affecting servers and workstations that rely on this operating system. As the efficiency of these attacks increases, companies and users need to be aware of the potential for data breaches and take preventive measures. It’s crucial for system administrators to stay informed and implement appropriate security protocols to mitigate these risks.

Impact: Linux systems, including various distributions and versions
Remediation: Implement security patches and updates as they become available; review and enhance memory management configurations.
Read Original

Cybernews has reported that fake cryptocurrency wallet applications are targeting Linux users, specifically those pretending to be popular wallets like Exodus, Trust Wallet, and Ledger Live. These malicious apps are available in the Canonical Snap Store and have been designed to steal cryptocurrency from unsuspecting users. This situation poses a significant risk for Linux users who may believe they are downloading legitimate software when in fact they are exposing themselves to malware. Users are advised to be cautious when downloading apps and to verify the authenticity of the software they use for managing their cryptocurrency. The increase in such scams highlights the ongoing dangers in the crypto space, especially for those using less traditional operating systems like Linux.

Impact: Exodus, Trust Wallet, Ledger Live, Linux operating system users
Remediation: Users should verify the authenticity of wallet applications before downloading and consider using official sources or trusted repositories.
Read Original
149M Logins from Roblox, TikTok, Netflix, Crypto Wallets Found Online

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A significant data breach has surfaced, revealing that 149 million login credentials from popular platforms such as Roblox, TikTok, Netflix, and various crypto wallets have been exposed online in plain text. This incident raises serious concerns for users of these services, as attackers could easily exploit these credentials for unauthorized access. The discovery of these credentials emphasizes the ongoing risks associated with poor security practices, such as weak passwords and lack of two-factor authentication. Companies must take immediate action to secure their systems and encourage users to change their passwords and enable additional security measures. As the digital landscape continues to evolve, incidents like this serve as a stark reminder of the importance of safeguarding personal information.

Impact: Roblox, TikTok, Netflix, Crypto Wallets
Remediation: Users should change their passwords immediately and enable two-factor authentication where available. Companies should conduct security audits and enhance their password policies.
Read Original
PreviousPage 31 of 101Next