Amazon Web Services (AWS) has released an updated compliance report for its Payment Cryptography service, confirming that it meets Payment Card Industry Personal Identification Number (PCI PIN) standards. This update follows a thorough audit by a Qualified Security Assessor (QSA). The compliance package is now available on AWS's compliance portal and includes an Attestation of Compliance (AOC) as well as additional documentation. This is significant for businesses using AWS Payment Cryptography, as it assures them that the service adheres to stringent security measures for handling payment data. Ensuring compliance not only helps protect sensitive information but also builds trust with customers who rely on secure payment processing.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Nike is currently investigating a potential data breach following claims from the WorldLeaks cybercrime group that they accessed and stole information from the company’s systems. The company has acknowledged the situation and is working to determine the extent of the security incident. This investigation comes at a time when many companies are facing increasing threats from hackers looking to exploit vulnerabilities for sensitive data. If the claims are verified, it could lead to serious implications for Nike, affecting customer trust and potentially exposing personal information. The outcome of Nike’s investigation will be closely watched, as it may reveal more about the tactics used by cybercriminals today.
Microsoft is looking into issues with some Windows 11 devices that are failing to boot after users installed the January 2026 Patch Tuesday security updates. Affected users are encountering 'UNMOUNTABLE_BOOT_VOLUME' errors, which prevent their systems from starting up properly. This situation could disrupt the workflow of many individuals and organizations that rely on Windows 11 for daily operations. Microsoft has not yet provided a specific fix or workaround for the problem, leaving users uncertain about how to resolve the issue. The investigation is ongoing as the company seeks to identify the root cause of the boot failures and implement a solution.
A new ransomware strain called Osiris was identified in a November 2025 attack targeting a significant food service franchise in Southeast Asia. Researchers from Symantec and Carbon Black reported that the attackers used a malicious driver known as POORTRY through a technique called Bring Your Own Vulnerable Driver (BYOVD) to disable security tools. This method allowed the ransomware to operate without detection, posing a serious risk to the affected organization. With ransomware attacks on the rise, this incident highlights the need for companies to strengthen their defenses against evolving tactics. The incident serves as a reminder for businesses to continuously update their security measures and remain vigilant against such threats.
Hackread – Cybersecurity News, Data Breaches, AI, and More
In a recent incident, the FBI accessed the BitLocker recovery keys of Windows laptops after Microsoft shared these keys as part of a legal request. This situation raises significant concerns about user privacy and data security, as it reveals how easily law enforcement can obtain sensitive information stored on personal devices. Affected users include anyone using Windows laptops that utilize BitLocker encryption for data protection. The implications are serious; users may feel their encrypted data is not as secure as previously thought, prompting a reevaluation of reliance on built-in security features. This incident serves as a reminder that while encryption is a valuable tool, it does not guarantee absolute privacy when legal authorities are involved.
BleepingComputer
The North Korean hacker group Konni is targeting blockchain developers and engineers with malware created using artificial intelligence. This new form of PowerShell malware is designed to infiltrate systems and steal sensitive information from individuals working in the blockchain sector. As the blockchain industry continues to grow, these attacks pose a significant risk to its security and the integrity of its projects. Developers in this field need to be particularly vigilant and ensure they have the latest security measures in place to protect against these sophisticated threats. The use of AI in malware creation represents a concerning evolution in cybercrime tactics, making it harder for security professionals to defend against such attacks.
Nike is currently investigating a potential security incident after the WorldLeaks cybercrime group claimed to have stolen sensitive data from the company. The attackers have threatened to leak this information if their demands are not met. This situation raises concerns about the security of customer data and proprietary company information, which could lead to significant reputational damage for Nike. As the investigation unfolds, it is important for users and stakeholders to stay informed about the nature of the data involved and any implications for their privacy and security. Companies like Nike must remain vigilant to protect against such threats as cybercriminals continue to target large organizations.
In late December 2025, the Russian hacking group Sandworm attempted a significant cyber attack on Poland's power sector, described by officials as the largest of its kind targeting the country's energy infrastructure. The attack involved a new type of malware called DynoWiper, which was designed to disrupt power operations. Fortunately, the attack was thwarted, and Poland's energy minister, Milosz Motyka, confirmed that the country's cyberspace forces detected and responded to the threat in time. This incident emphasizes the ongoing risks facing critical infrastructure from state-sponsored actors and highlights the importance of robust cybersecurity measures in protecting essential services. As cyber threats continue to evolve, organizations must remain vigilant to safeguard against potential disruptions.
Security Affairs
CVE-2026-24061Researchers have discovered a critical vulnerability in the GNU InetUtils telnet daemon (telnetd), tracked as CVE-2026-24061, which has remained unnoticed for nearly 11 years. This flaw affects all versions from 1.9.3 to 2.7 and has a high severity score of 9.8, indicating a significant risk. If exploited, attackers could gain root access to affected systems, posing a serious threat to security. This vulnerability impacts a variety of systems that rely on GNU InetUtils, making it imperative for users and organizations to address this issue promptly. As this flaw has been present for so long, it raises concerns about the security practices in place for maintaining software.
SCM feed for Latest
A recent data leak has exposed millions of account credentials from various platforms, including Gmail, Facebook, and numerous financial services. This dataset contains sensitive information, potentially affecting countless users who have accounts on these platforms. The breach raises serious concerns about identity theft and fraud, as attackers may exploit this data for malicious activities. Users are urged to change their passwords immediately and enable two-factor authentication where available. This incident highlights the ongoing challenges of online security, reminding everyone of the importance of safeguarding personal information.
SCM feed for Latest
The SagaEVM blockchain has suspended its operations after a significant security breach that resulted in the theft of nearly $7 million in cryptocurrency assets. The incident, reported by Cybernews, raises concerns about the safety and security of blockchain technologies, particularly for investors and users involved with SagaEVM. This event not only impacts the immediate financial stability of the platform but also shakes user confidence in blockchain security as a whole. As the cryptocurrency landscape continues to evolve, incidents like this underscore the necessity for robust security measures and protocols within blockchain systems. Users and stakeholders will need to stay informed about the situation as it develops.
SCM feed for Latest
A serious vulnerability has been discovered in all versions of GNU InetUtils telnetd, specifically those ranging from 1.9.3 to 2.7. This flaw, which allows remote attackers to bypass authentication, has gone unnoticed for nearly 11 years. Given the age of this issue, many systems may still be running vulnerable versions, putting users at risk. The discovery emphasizes the need for organizations to audit their systems and ensure they are not using outdated software. Users and administrators should take immediate action to update or patch their systems to mitigate potential exploitation.
SCM feed for Latest
Recent research has revealed that attackers can now conduct more efficient intrusions targeting page caches in Linux systems. The study highlights vulnerabilities in how Linux manages memory, particularly in the page cache, which can be manipulated to access sensitive information. This development poses a risk to a wide range of Linux distributions, potentially affecting servers and workstations that rely on this operating system. As the efficiency of these attacks increases, companies and users need to be aware of the potential for data breaches and take preventive measures. It’s crucial for system administrators to stay informed and implement appropriate security protocols to mitigate these risks.
SCM feed for Latest
Cybernews has reported that fake cryptocurrency wallet applications are targeting Linux users, specifically those pretending to be popular wallets like Exodus, Trust Wallet, and Ledger Live. These malicious apps are available in the Canonical Snap Store and have been designed to steal cryptocurrency from unsuspecting users. This situation poses a significant risk for Linux users who may believe they are downloading legitimate software when in fact they are exposing themselves to malware. Users are advised to be cautious when downloading apps and to verify the authenticity of the software they use for managing their cryptocurrency. The increase in such scams highlights the ongoing dangers in the crypto space, especially for those using less traditional operating systems like Linux.
Hackread – Cybersecurity News, Data Breaches, AI, and More
A significant data breach has surfaced, revealing that 149 million login credentials from popular platforms such as Roblox, TikTok, Netflix, and various crypto wallets have been exposed online in plain text. This incident raises serious concerns for users of these services, as attackers could easily exploit these credentials for unauthorized access. The discovery of these credentials emphasizes the ongoing risks associated with poor security practices, such as weak passwords and lack of two-factor authentication. Companies must take immediate action to secure their systems and encourage users to change their passwords and enable additional security measures. As the digital landscape continues to evolve, incidents like this serve as a stark reminder of the importance of safeguarding personal information.