Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

During the Pwn2Own contest at Automotive World 2026, security researchers successfully exploited multiple vulnerabilities in vehicle infotainment systems and electric vehicle (EV) chargers. These findings raise significant concerns about the security of modern vehicles, which increasingly rely on complex software for functionality. The vulnerabilities could potentially allow attackers to gain unauthorized access to vehicle systems, posing risks to both drivers and passengers. As vehicles become more connected, the implications of these security flaws extend beyond individual cars to broader public safety and privacy issues. Manufacturers must take these findings seriously to protect their customers and ensure the safety of their products.

Impact: Vehicle infotainment systems, electric vehicle chargers
Remediation: Manufacturers should investigate and patch the identified vulnerabilities in their systems.
Read Original

The Global Cybersecurity Vulnerability Exploit (GCVE) initiative aims to improve how security flaws are tracked globally, promoting better collaboration among cybersecurity professionals. However, there are growing concerns about potential fragmentation within vulnerability databases. Critics warn that the introduction of duplicate entries and a decentralized approach could complicate the efforts of defenders, making it harder to manage and respond to vulnerabilities effectively. The implications of this fragmentation may lead to confusion and inefficiencies in addressing security threats, affecting organizations that rely on these databases to protect their systems. As the cybersecurity community continues to evolve, finding a balance between collaboration and centralization will be crucial to enhancing overall security.

Impact: N/A
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of four vulnerabilities affecting enterprise software. These vulnerabilities impact products from Versa and Zimbra, as well as the Vite frontend tooling framework and the Prettier code formatter. Organizations using these tools are at risk as attackers are actively exploiting these flaws, which could lead to unauthorized access or data breaches. It's crucial for affected companies to address these vulnerabilities promptly to protect their systems and sensitive information. CISA's alert serves as a reminder of the ongoing security challenges in enterprise environments.

Impact: Versa enterprise software, Zimbra software, Vite frontend tooling framework, Prettier code formatter
Remediation: Organizations are advised to apply available patches for the affected software, update to the latest versions, and implement security best practices such as regular vulnerability assessments and system monitoring.
Read Original
Actively Exploited

The Osiris ransomware, which emerged in November, is raising concerns among cybersecurity experts due to its advanced techniques that suggest the involvement of experienced attackers. This ransomware targets various organizations, encrypting their data and demanding a ransom for its release. The sophistication of Osiris indicates that it could pose a significant risk to businesses that might not have robust security measures in place. As ransomware continues to evolve, companies must be vigilant and proactive in their cybersecurity strategies to defend against such threats. Understanding the tactics used by Osiris can help organizations better prepare for potential attacks and minimize their impact.

Impact: Organizations susceptible to ransomware attacks, particularly those lacking strong cybersecurity defenses.
Remediation: Organizations should implement strong security measures, including regular data backups, employee training on phishing attacks, and up-to-date antivirus software.
Read Original

Cyber Centaurs, a digital forensics firm, discovered critical attacker infrastructure while investigating a ransomware incident involving a U.S. client. This operational security lapse allowed the firm to recover data that the attackers had encrypted. The incident serves as a reminder of the vulnerabilities that organizations face when dealing with ransomware, particularly if they fail to maintain strict security protocols. Companies should take this case as a warning to enhance their cybersecurity measures, as ransomware attacks can have devastating consequences for both data integrity and business operations. The recovery of the data also raises questions about the methods used by attackers and the potential for further exploitation of the exposed infrastructure.

Impact: Ransomware affecting U.S. organizations
Remediation: Companies should enhance operational security protocols and conduct regular security audits.
Read Original

In 2025, various hacktivist groups such as Z-Pentest, Dark Engine, and Sector 16 ramped up their attacks on critical infrastructure, specifically targeting industrial control systems (ICS), operational technology (OT), and Human Machine Interface (HMI) environments. These attacks pose significant risks as they can disrupt essential services that rely on these systems, including utilities and manufacturing processes. By focusing on ICS and OT, these groups are not just seeking to cause chaos but are also likely aiming to draw attention to specific political or social issues. This increase in activity highlights the vulnerabilities in these crucial sectors and raises concerns about the potential for more severe consequences if these systems are compromised. Companies and organizations that manage such infrastructure need to bolster their cybersecurity defenses to prevent potential disruptions.

Impact: Industrial Control Systems (ICS), Operational Technology (OT), Human Machine Interface (HMI)
Remediation: Companies should enhance their cybersecurity measures, conduct regular security audits, and implement robust incident response plans.
Read Original

Two Venezuelan nationals have been convicted for their involvement in an ATM jackpotting scheme that resulted in the theft of hundreds of thousands of dollars from U.S. banks. Federal prosecutors in South Carolina announced that after serving their prison sentences, the men will be deported back to Venezuela. Jackpotting refers to a method where criminals use malware to manipulate ATMs, causing them to dispense cash without proper authorization. This case highlights the ongoing risks of ATM fraud and the challenges law enforcement faces in addressing cybercrime that crosses international borders. The actions of these individuals not only impacted financial institutions but also posed risks to consumers and the integrity of banking systems in the U.S.

Impact: U.S. banks, ATMs
Remediation: Increased security measures for ATMs, monitoring for unusual activity, and implementation of more advanced anti-malware solutions.
Read Original
Venezuelan Nationals Face Deportation After Multi State ATM Jackpotting Scheme

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Two Venezuelan nationals are facing deportation after being implicated in a multi-state ATM jackpotting scheme. Authorities reported that both suspects were in the United States illegally and used sophisticated techniques to manipulate ATMs, allowing them to withdraw large sums of cash unlawfully. This type of attack, known as jackpotting, targets ATMs and involves exploiting vulnerabilities in the machines' software or hardware. The incident raises concerns about the security of ATM systems and highlights the ongoing challenges law enforcement faces in combating financial crimes. As these types of schemes become more prevalent, financial institutions may need to enhance their security measures to protect against similar attacks in the future.

Impact: ATMs, financial institutions
Remediation: Financial institutions should review and enhance ATM security protocols, including regular software updates and monitoring for suspicious activity.
Read Original

Hackers are actively exploiting a serious vulnerability in the GNU InetUtils telnetd server that has been around for 11 years. This flaw allows attackers to bypass authentication and gain root access, which poses a significant risk to systems still using this service. Organizations that rely on telnetd are at risk of unauthorized access, potentially leading to data breaches or system compromise. Security experts are urging affected users to address this vulnerability immediately to prevent exploitation. Given the age of the flaw, many systems might still be running unpatched versions, making them easy targets for attackers.

Impact: GNU InetUtils telnetd server
Remediation: Update to the latest version of GNU InetUtils that addresses this vulnerability.
Read Original

Researchers at Intruder have discovered that AI-generated code can create hidden security vulnerabilities when teams place too much trust in automated outputs. They set up an AI-written honeypot, a decoy system designed to lure attackers, only to find that it contained subtle flaws that were eventually exploited in real attacks. This incident highlights the risks of relying solely on AI for coding without thorough human oversight. Companies and developers need to be cautious and verify AI-generated code to prevent these kinds of vulnerabilities from being introduced into their systems. The findings serve as a reminder that while AI can enhance efficiency, it can also introduce risks that must be managed carefully.

Impact: AI-generated code, honeypots
Remediation: Conduct thorough code reviews and implement manual checks for AI-generated code to identify and fix potential vulnerabilities.
Read Original

MITRE has introduced a new framework called the Embedded Systems Threat Matrix, aimed at enhancing cybersecurity measures for embedded systems, which are often found in critical infrastructure. This initiative is crucial as these systems are increasingly targeted by cyber threats, impacting industries such as healthcare, manufacturing, and transportation. The new matrix provides a structured way to identify potential vulnerabilities and attack vectors specific to embedded systems, helping organizations better defend against these risks. By focusing on this area, MITRE is addressing a growing concern in cybersecurity, as the reliance on embedded systems continues to expand. This framework is expected to guide developers and security professionals in implementing stronger protections for these essential technologies.

Impact: Embedded systems in critical infrastructure, including healthcare devices, industrial control systems, and transportation systems.
Remediation: Organizations should adopt the Embedded Systems Threat Matrix to assess and improve their defenses against potential threats to embedded systems.
Read Original

During the Pwn2Own Automotive 2026 event, security researchers successfully exploited 76 zero-day vulnerabilities, earning a total of $1,047,000 over three days from January 21 to January 23. This event showcases the ongoing challenges in automotive cybersecurity, where researchers target vulnerabilities in vehicle software and systems. The financial rewards for discovering these exploits underscore the critical need for automakers to prioritize security in their products. These vulnerabilities could potentially be exploited by malicious actors, posing risks to vehicle safety and user privacy. As vehicles become increasingly reliant on software and connectivity, addressing these weaknesses is essential for protecting consumers and maintaining trust in automotive technology.

Impact: Automotive software and systems
Remediation: Automakers should conduct thorough security assessments and apply necessary patches to their systems.
Read Original
ShinyHunters Leak Alleged Data of Millions From SoundCloud, Crunchbase and Betterment

Hackread – Cybersecurity News, Data Breaches, AI, and More

ShinyHunters, a known hacking group, has reportedly leaked data from several companies, including SoundCloud, Crunchbase, and Betterment. The leak is said to involve the personal information of millions of users, raising serious concerns about data security and privacy. This incident follows previous breaches attributed to the group, which has a history of targeting various organizations. The potential for more leaks has been hinted at by the group, suggesting that the situation could worsen. This breach not only affects the companies involved but also puts the personal information of countless users at risk, emphasizing the ongoing challenges of cybersecurity in today's digital landscape.

Impact: SoundCloud, Crunchbase, Betterment
Remediation: Companies should notify affected users and assess their security measures to prevent future breaches.
Read Original

Under Armour is currently investigating a data breach that may have exposed approximately 72 million records. The company has stated that, so far, there is no evidence suggesting that the breach affected systems responsible for processing payments or storing customer passwords. This incident raises concerns about the potential exposure of personal data, which could include details such as email addresses and other sensitive information. For users of Under Armour's services, the situation is alarming as it may lead to phishing attempts or identity theft. The company is taking steps to understand the full scope of the breach and to protect its customers moving forward.

Impact: 72 million records, customer data including email addresses
Remediation: N/A
Read Original

During the Pwn2Own Automotive 2026 event, hackers identified 76 vulnerabilities across various automotive systems, including infotainment systems and electric vehicle chargers. These exploits earned the participants a total of $1 million in rewards, highlighting the ongoing security challenges faced by the automotive industry. The vulnerabilities could potentially allow attackers to manipulate vehicle functions, putting drivers and passengers at risk. As more vehicles become connected and reliant on software, manufacturers need to prioritize security updates to protect against these types of attacks. The event serves as a reminder of the importance of proactive security measures in the rapidly evolving automotive sector.

Impact: Infotainment systems, electric vehicle chargers
Remediation: Manufacturers should implement security updates and patches as they become available to address the identified vulnerabilities.
Read Original
PreviousPage 32 of 101Next