Japan and Britain are stepping up their collaboration on cybersecurity and the supply of critical minerals in response to growing concerns over China's influence in the region. This partnership aims to enhance both countries' resilience against potential cyber threats and secure essential resources that are vital for technology and defense sectors. The agreement comes amid increasing geopolitical tensions and highlights the need for nations to work together to protect their infrastructure and supply chains. By sharing expertise and resources, Japan and Britain aim to bolster their defenses and ensure a stable supply of critical minerals, which are crucial for various industries, including electronics and renewable energy.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Infosecurity Magazine
Bitdefender has identified a new Android malware campaign that uses Hugging Face, a platform typically associated with artificial intelligence and machine learning. This malware, classified as a Remote Access Trojan (RAT), is designed to gain unauthorized access to Android devices, potentially compromising user data and privacy. The campaign raises concerns as it exploits a legitimate platform to distribute malicious software, making it harder for users to detect the threat. Users of Android devices should be particularly cautious and ensure they download apps only from trusted sources to avoid falling victim to this malware. The implications are significant, especially for those who may unknowingly install infected applications, leading to data theft or device control by attackers.
BleepingComputer
NationStates, a popular multiplayer browser game, has confirmed a data breach, prompting the site to go offline for an investigation. The security incident occurred earlier this week, although specific details about the breach and the data compromised have not been disclosed. Players of the game may be affected, as their personal information could be at risk. The shutdown of the site serves as a precautionary measure while the developers work to understand the extent of the breach and implement necessary fixes. This incident raises concerns about the security of online gaming platforms and the protection of user data in such environments.
The article discusses the evolving nature of cyberattacks and emphasizes the importance of understanding modern attack flows. It highlights how attackers are increasingly using sophisticated methods to breach defenses, targeting both individuals and organizations. Researchers have observed a rise in tactics that exploit vulnerabilities across various systems, which can lead to significant data breaches and financial losses. This trend is concerning for companies that need to stay vigilant and implement robust security measures to protect sensitive information. The article stresses that organizations must adapt their cybersecurity strategies to counter these emerging threats effectively.
The latest edition of the Security Affairs newsletter covers several significant cybersecurity developments. Notably, the Department of Justice has released information about a skilled hacker allegedly working for Jeffrey Epstein, raising concerns about the implications of such associations for cybersecurity. Additionally, cyberattacks have disrupted communication systems at Wind and Solar companies, highlighting vulnerabilities in critical infrastructure. These incidents underscore the ongoing risks that hackers pose to both individuals and organizations, particularly in sectors that are essential for energy generation and distribution. As these stories unfold, they serve as a reminder for companies to enhance their security measures and for users to remain vigilant against potential threats.
Help Net Security
Recent developments in open-source AI tools for penetration testing have shown significant advancements in their capabilities. Researchers tested three tools—BugTrace-AI, Shannon, and CAI—in a controlled lab environment against real-world targets. The results indicated that these tools can effectively simulate human testers, improving the efficiency of security assessments. This progress raises concerns about the potential for misuse, as these tools could be exploited by malicious actors to conduct more sophisticated attacks. The implications for organizations are substantial, as they may need to reassess their security measures to counteract these evolving AI-driven techniques.
A new wave of automated data extortion attacks is targeting exposed MongoDB instances. Cybercriminals are scanning for these unsecured databases and demanding low ransoms from their owners to restore access to the data. This trend raises concerns for businesses and individuals who may not have secured their databases properly, leaving them vulnerable to these attacks. The attackers exploit the lack of security measures in place, making it crucial for database administrators to implement proper configurations and safeguards. Without these protections, organizations risk losing important data and facing financial repercussions from ransom demands.
Help Net Security
Last week, Microsoft addressed a serious vulnerability in its Office software, which was being actively exploited by attackers. This zero-day flaw could allow unauthorized access to user systems, putting sensitive information at risk. Users of Microsoft Office should ensure they install the latest updates to protect themselves from potential attacks. Additionally, Fortinet released patches for a flaw in its FortiCloud single sign-on (SSO) service, which could have allowed unauthorized access to user accounts. Organizations using FortiCloud should prioritize applying these updates to safeguard their systems from exploitation.
Hackread – Cybersecurity News, Data Breaches, AI, and More
A new form of malware, known as Pulsar RAT, is being used by hackers to conduct live chat sessions with victims while simultaneously stealing sensitive data. This malware operates on Windows systems, allowing attackers to engage with users in real-time, making it more personal and deceptive. The presence of live chat functionality means that victims may not realize they are being compromised until it's too late. Researchers are warning that this method poses a significant risk to both individuals and organizations, as it can lead to the unauthorized access of personal and financial information. Users are urged to remain vigilant and ensure their systems are secure against such threats.
BleepingComputer
A recent scam campaign targeting cloud storage users has been making waves worldwide. Over the past few months, attackers have been flooding inboxes with fake emails that warn recipients their accounts, photos, and files are at risk of deletion due to non-payment. These messages are designed to create panic, prompting users to click on malicious links or provide sensitive information. The scam affects individuals who use various cloud storage services, as the emails often mimic legitimate notices from well-known providers. This incident serves as a reminder for users to remain vigilant about email communications and to verify the authenticity of any messages regarding account issues.
BleepingComputer
Mandiant has reported a rise in data theft attacks by the hacking group ShinyHunters, which are now being facilitated by targeted voice phishing (vishing) and fraudulent company-branded phishing websites. These attacks aim to capture single sign-on (SSO) credentials and multi-factor authentication (MFA) codes from unsuspecting users. Organizations that utilize SSO for accessing cloud services are particularly at risk, as attackers exploit these systems to gain unauthorized access to sensitive data. This trend is concerning for companies that rely on cloud platforms for their operations, as it highlights the dangers of social engineering tactics and the importance of securing user credentials. Businesses should be vigilant and enhance their security measures to protect against these types of threats.
Hackers have successfully compromised an update server belonging to MicroWorld Technologies, the company behind eScan Antivirus. This breach allowed attackers to inject malicious files into updates that were sent to eScan customers, effectively turning the antivirus software into a delivery mechanism for malware. Users who updated their eScan software during this incident may have inadvertently installed harmful files on their systems. This incident raises significant concerns about the security of software supply chains, highlighting how even trusted software can be weaponized. Users are advised to remain vigilant and consider checking their systems for any signs of compromise.
A researcher has found that some private Instagram accounts were inadvertently allowing access to their photo links by users who weren't logged in. This issue raised concerns about user privacy, as it meant that photos intended for private viewing could be seen by anyone with the link. Although Meta, Instagram's parent company, addressed the problem, they classified the report as not applicable and did not respond to requests for further information. This incident highlights ongoing challenges in protecting user data on social media platforms, emphasizing the need for companies to prioritize security and privacy measures to safeguard their users' content.
Hackread – Cybersecurity News, Data Breaches, AI, and More
U.S. authorities have seized over $400 million in cryptocurrency, cash, and property linked to Helix, a prominent Bitcoin mixing service operating on the dark web. This service was widely used by drug markets to obscure the origins of their cryptocurrency transactions, making it difficult for law enforcement to trace illegal funds. The seizure is part of a broader crackdown on illicit activities associated with dark web platforms. By targeting Helix, authorities aim to disrupt the financial networks that support drug trafficking and other criminal enterprises. This action not only affects the operators of Helix but also sends a strong message to other similar services that law enforcement is actively pursuing financial crimes in the digital currency space.
A new cyber campaign known as RedKitten is believed to be launched by a Farsi-speaking group linked to the Iranian government. This campaign specifically targets non-governmental organizations and activists who are documenting human rights abuses in Iran, particularly during the ongoing unrest that began in late 2025. Observed by HarfangLab in January 2026, the attacks aim to disrupt the efforts of those advocating for human rights and may involve various forms of cyber espionage or harassment. This targeting of NGOs poses significant risks not only to the organizations themselves but also to the broader landscape of human rights advocacy, as it can deter individuals and groups from speaking out against abuses. The situation underscores the challenges faced by activists in oppressive regimes and raises alarms about the potential for increased state-sponsored cyber activities against dissenters.