Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The article discusses a new form of hacking called 'vibe hacking,' which uses artificial intelligence to manipulate social interactions and influence user perceptions. This type of attack changes how defenders approach cybersecurity, as it targets the emotional and psychological states of individuals rather than traditional technical vulnerabilities. Researchers warn that these tactics can affect various sectors, including social media platforms, online marketplaces, and any service that relies on user engagement. The implications are significant, as companies must now consider how AI can be weaponized against their user base, making it crucial to develop strategies to counter these innovative threats. As technology evolves, so do the methods of attackers, emphasizing the need for ongoing vigilance and adaptation in cybersecurity practices.

Impact: Social media platforms, online marketplaces, user engagement services
Remediation: Developing strategies to counter AI-enabled manipulative tactics, enhancing user education on recognizing potential manipulation
Read Original

The FBI has taken control of two websites associated with the Handala hacktivist group following a severe cyberattack on Stryker, a major medical technology company. This attack resulted in the destruction of around 80,000 medical devices, raising significant concerns about patient safety and the reliability of healthcare technology. The Handala group claimed responsibility for the attack, which underscores the ongoing risks that organizations in the healthcare sector face from cyber threats. The seizure of these websites aims to disrupt Handala's operations and prevent further attacks. This incident highlights the critical need for enhanced cybersecurity measures in the medical technology industry to protect sensitive devices and patient data.

Impact: Stryker medical devices, approximately 80,000 devices affected
Remediation: Organizations should enhance their cybersecurity protocols and assess the security of their medical devices to prevent similar attacks.
Read Original

The Marquis data breach has affected approximately 672,000 individuals, a significant reduction from earlier estimates that suggested over 1.6 million might be impacted. This breach raises concerns over the security of personal information, as affected individuals may have had their data exposed. The specifics of what data was compromised have not been detailed, but such incidents can lead to identity theft and other forms of fraud. Organizations must take this breach seriously and assess their own data protection measures to prevent similar incidents in the future. The incident serves as a reminder of the vulnerabilities that exist in handling personal data.

Impact: Personal information of 672,000 individuals
Remediation: N/A
Read Original

Hackers associated with APT28, a group believed to be linked to the Russian military intelligence, are exploiting a vulnerability in the Zimbra Collaboration Suite (ZCS) to target Ukrainian government entities. This attack is part of ongoing cyber operations against Ukraine amid the broader conflict with Russia. The specific flaw being exploited allows attackers to gain unauthorized access, which could lead to significant data breaches or disruptions in government operations. The situation is critical, as it not only affects the security of Ukrainian governmental systems but also reflects the increasing use of cyber tactics in geopolitical conflicts. Ukrainian officials and cybersecurity experts are urging immediate action to patch the vulnerabilities and safeguard sensitive information.

Impact: Zimbra Collaboration Suite (ZCS)
Remediation: Update Zimbra Collaboration Suite to the latest version and apply all security patches as they become available.
Read Original
Actively Exploited

A Russian advanced persistent threat (APT) group has been exploiting a critical cross-site scripting (XSS) vulnerability in Zimbra, identified as CVE-2025-66376, with a severity score of 7.2. The attackers are sending HTML emails that contain insufficiently sanitized scripts, which execute when opened by users. This campaign specifically targets individuals in Ukraine, highlighting the ongoing cyber conflict in the region. The exploitation of this vulnerability could allow attackers to compromise user accounts and access sensitive information. Organizations using Zimbra should be particularly vigilant and take immediate action to secure their systems.

Impact: Zimbra Collaboration, affected versions unspecified.
Remediation: Users should apply any available patches for Zimbra Collaboration as soon as possible. Additionally, organizations are advised to implement email filtering solutions to block potentially malicious HTML emails and to educate users on the risks of opening unknown emails.
Read Original

A recent surge in mobile banking malware has targeted over 1,200 financial apps worldwide, shifting the focus of fraud from traditional methods to user devices. This malware is designed to compromise mobile banking applications, putting sensitive user information at risk. The attack affects a wide range of banking services, potentially impacting millions of users who rely on their smartphones for financial transactions. As attackers continue to evolve their tactics, it’s crucial for financial institutions to enhance their security measures and for users to remain vigilant about the apps they download and the permissions they grant. The ongoing threat emphasizes the need for increased awareness around mobile security practices among both consumers and companies.

Impact: Over 1,200 mobile banking applications globally
Remediation: Users should ensure their mobile apps are up to date, avoid downloading apps from unofficial sources, and regularly monitor their bank accounts for suspicious activity. Financial institutions should implement stronger authentication measures and user education on security practices.
Read Original

Aura, a cybersecurity firm, has reported a data breach that affects approximately 900,000 records. The breach occurred after an employee was targeted in a phone phishing attack, which allowed attackers to steal information from a marketing tool used by the company. This incident raises concerns about the effectiveness of employee training in recognizing phishing attempts and the security measures in place for sensitive data. Users whose information may have been compromised should remain vigilant about potential follow-up phishing attempts or identity theft. The breach serves as a reminder for organizations to continuously update their security protocols and educate employees about the risks of social engineering attacks.

Impact: 900,000 records from Aura's marketing tool
Remediation: Companies should enhance employee training on recognizing phishing attempts and review security measures for data protection.
Read Original

Password reset processes can be vulnerable to privilege escalation attacks, as they are often less secure than regular logins. Attackers exploit weaknesses in these workflows to gain unauthorized access to accounts, potentially leading to serious data breaches. Specops Software outlines several strategies to fortify these procedures, emphasizing the need for stronger verification methods during resets. This is particularly important for organizations that manage sensitive information, as a compromised account can have significant repercussions. By implementing better security practices, companies can better protect their users and maintain trust.

Impact: Password reset workflows across various online services
Remediation: Implement stronger verification methods for password resets, such as multi-factor authentication and security questions that are harder to guess.
Read Original

Ubiquiti has addressed two vulnerabilities in its UniFi Network Application, including a serious flaw that could let attackers take control of user accounts. This vulnerability is particularly concerning as it affects the security of network management for users, potentially allowing unauthorized access to sensitive information and settings. Users of the application should ensure they update to the latest version to mitigate this risk. The company has emphasized the importance of applying these patches promptly to maintain network security. As cyber threats continue to evolve, staying updated with software patches is crucial for protecting against potential account takeovers.

Impact: Ubiquiti UniFi Network Application
Remediation: Users should update to the latest version of the UniFi Network Application to apply the patches.
Read Original
SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft

Hackread – Cybersecurity News, Data Breaches, AI and More

SpyCloud's 2026 Identity Exposure Report reveals a significant rise in identity theft cases involving non-human identities, such as bots and automated systems. Researchers found that these types of identity theft are being used to commit fraud and manipulate systems across various sectors, affecting businesses and consumers alike. The report indicates that attackers are increasingly targeting automated accounts, which can bypass traditional security measures. This trend raises concerns for companies that rely on automated processes and have not implemented robust identity verification systems. The findings emphasize the need for organizations to reassess their security protocols to protect against this evolving threat.

Impact: Non-human identities, automated accounts, various sectors
Remediation: Organizations should enhance identity verification processes and implement stronger security measures against automated attacks.
Read Original

Researchers have uncovered a toolkit used by the Beast Ransomware group, detailing their methods from initial reconnaissance to the final encryption of files. This toolkit includes various tools that allow the attackers to gather intelligence on their targets, exploit vulnerabilities, and encrypt victims' data for ransom. The discovery is significant because it provides insight into the operational techniques of the group, potentially helping organizations bolster their defenses against future attacks. Companies in sectors that typically face ransomware threats should pay close attention to these findings and review their security measures accordingly. The information also serves as a reminder of the ongoing risks posed by ransomware actors, who continue to evolve their tactics.

Impact: N/A
Remediation: Organizations should enhance their cybersecurity protocols, conduct regular security assessments, and implement robust backup solutions to mitigate the impact of potential ransomware attacks.
Read Original
Fake Windsurf IDE Extension Uses Solana Blockchain to Steal Developer Data

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Researchers at Bitdefender have uncovered a malicious extension for the Windsurf IDE that exploits the Solana blockchain to steal developer credentials. This fraudulent extension targets developers who may unknowingly install it, putting their sensitive information at risk. The use of blockchain technology in this attack makes it particularly concerning, as it could allow for more sophisticated tracking and data theft. Developers need to be vigilant about the extensions they install, as this incident highlights the potential dangers associated with seemingly innocuous tools. The implications of such attacks can be significant, affecting not only individual developers but also the broader ecosystem of software development.

Impact: Windsurf IDE, developer credentials
Remediation: Developers should avoid installing unverified extensions and regularly review their development tools for any suspicious activity.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) is advising U.S. organizations to take immediate steps to secure their Microsoft Intune systems. This warning comes after a cyberattack targeted Stryker, a major medical technology company, exploiting vulnerabilities in the Intune endpoint management tool. The breach led to significant disruptions in Stryker's operations, raising concerns about the security of similar systems across various organizations. CISA recommends that users follow Microsoft's security guidance to bolster their defenses against potential attacks. This incident highlights the need for vigilance in managing endpoint systems, particularly in sectors that handle sensitive data.

Impact: Microsoft Intune, Stryker systems
Remediation: Organizations should follow Microsoft guidance to strengthen Intune configurations.
Read Original

The UK's Financial Conduct Authority (FCA) has introduced new rules aimed at simplifying the process of reporting cyber incidents and issues related to third-party vendors. These updates are designed to provide clearer guidelines for financial firms, ensuring that they report incidents promptly and transparently. This move comes in response to the increasing frequency and complexity of cyber threats facing the financial sector. By establishing more straightforward reporting protocols, the FCA hopes to enhance the overall security posture of financial institutions and improve their ability to manage risks associated with third-party relationships. This change will affect all regulated firms within the UK’s financial services industry, emphasizing the importance of robust incident management practices.

Impact: UK financial firms and their third-party vendors
Remediation: N/A
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about active exploitation of a recently patched vulnerability in SharePoint, identified as CVE-2026-20963. This remote code execution flaw allows attackers to run malicious code on affected systems, posing a significant risk to organizations using the software. Microsoft released a patch for this vulnerability back in January, but the discovery of in-the-wild exploitation suggests that some users may not have applied the update. Organizations using SharePoint should prioritize implementing the latest security updates to protect against potential breaches. Failing to address this vulnerability could lead to unauthorized access and data compromise, making it crucial for companies to stay vigilant and proactive in their cybersecurity practices.

Impact: SharePoint, affected versions unspecified.
Remediation: Organizations should apply the Microsoft patch released in January 2026 for CVE-2026-20963 to mitigate the risk of exploitation.
Read Original
PreviousPage 4 of 121Next