Veeam Software has issued patches for serious vulnerabilities in its Backup & Replication solution, including four critical remote code execution (RCE) flaws. These vulnerabilities could allow attackers to execute malicious code on affected backup servers, potentially leading to data breaches or system takeovers. Organizations using Veeam's software should prioritize applying these patches to safeguard their systems. The risks are particularly concerning for companies that rely on Veeam for data protection, as failing to address these vulnerabilities could leave sensitive data exposed. This incident serves as a reminder for all users of backup solutions to stay vigilant and ensure their software is up to date.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Authorities have dismantled a global proxy network known as SocksEscort, which had compromised routers and Internet of Things (IoT) devices across 163 countries. This botnet reportedly affected around 369,000 victims and generated approximately $5.8 million in revenue for its cybercriminal operators. The operation's scale demonstrates how widespread such threats can be, as compromised devices can facilitate various cybercrimes, including unauthorized access and data theft. The takedown is a significant step in combating the growing issue of botnets, which can put both individuals and organizations at risk. Users are advised to secure their devices and ensure they are not part of such networks.
Stryker, a medical technology company, recently faced a cyberattack attributed to Iranian hackers, exposing vulnerabilities in its disaster recovery and business continuity plans. The attack serves as a wake-up call for companies in the healthcare sector, which are often not prepared for such sophisticated threats. Affected systems may include Stryker's medical devices and software used in hospitals. This incident underlines the need for organizations to reassess their cybersecurity measures to better protect sensitive medical data and ensure operational resilience. As cyber threats evolve, maintaining robust security protocols is essential to avoid disruptions that can impact patient care.
BleepingComputer
U.S. and European law enforcement, in collaboration with private partners, have successfully disrupted the SocksEscort proxy network, which was powered by malware called AVRecon targeting Linux devices. This network primarily compromised edge devices, turning them into proxies for cybercriminal activities. The operation is significant as it demonstrates international cooperation in combating cybercrime and highlights the ongoing threat posed by malware that targets Linux systems. The disruption of SocksEscort is expected to hinder the operations of those using the network for illegal purposes, ultimately making it harder for them to execute attacks or conduct illicit activities online. This incident serves as a reminder for organizations to bolster their defenses against malware that can exploit even lesser-known platforms like Linux.
Cybersecurity officials expressed concern about growing public indifference towards the Salt Typhoon hacking group, which is known for targeting telecommunications. They believe that this apathy is undermining efforts to implement stricter security regulations in the telecom sector. The group has been linked to various cyber attacks that could compromise sensitive data and disrupt services. Officials are urging the public and industry stakeholders to recognize the seriousness of the threat posed by these hackers. Without heightened awareness and action, they fear that vital security measures may not be adopted, leaving the telecom infrastructure vulnerable to future attacks.
BleepingComputer
In 2025, Google awarded over $17 million to 747 security researchers through its Vulnerability Reward Program (VRP) for reporting various security vulnerabilities. This initiative not only incentivizes researchers to identify and report bugs but also strengthens the overall security of Google's products and services. By paying for these reports, Google is actively encouraging contributions from the security community, which helps mitigate potential threats before they can be exploited. This program is essential for maintaining user trust and safeguarding sensitive information across the company's platforms. The financial commitment reflects the increasing importance of cybersecurity in the tech industry.
Help Net Security
A criminal group operating an online fraud scheme in Germany has been dismantled, resulting in the arrest of three suspects. The operation, coordinated by Eurojust, took place on March 10, where authorities from Germany and France collaborated to apprehend the suspects. The main suspect, who was located in France, is currently in custody awaiting a court decision on whether he will be extradited to Germany. This fraud scheme is believed to have scammed victims out of approximately €1 million, raising concerns about the effectiveness of online security measures and the need for increased vigilance among internet users. The case underscores the ongoing threat of online scams and the importance of international cooperation in tackling cybercrime.
Angelo Martino, a former negotiator for DigitalMint, is accused of running ransomware attacks while simultaneously negotiating on behalf of his employer. The U.S. government claims he extorted around $75 million through these actions, effectively playing both sides of the fence. This case raises serious concerns about insider threats within organizations that deal with cryptocurrency, as it highlights the potential for employees to exploit their positions for personal gain. The implications are significant, as it calls into question the security measures companies have in place to protect against such dual-role employees. The incident also emphasizes the ongoing challenges in combating ransomware, particularly when insiders are involved.
A serious SQL injection vulnerability (CVE-2026-2413) has been discovered in the Ally plugin for WordPress, which is currently used on over 400,000 websites. This flaw allows attackers to exploit the plugin without needing any authentication, potentially enabling them to access and steal sensitive data from affected sites. The vulnerability has a CVSS score of 7.5, indicating a high severity level. Security researchers at Acquia, including Drew Webber, identified this issue, raising concerns for site administrators who may not be aware of the risks. It's crucial for users of the Ally plugin to take immediate action to protect their sites from potential attacks.
Meta has taken significant action against scam operations by disabling over 150,000 accounts linked to scam centers in Asia. This initiative is part of a broader effort to combat online fraud, which has increasingly targeted users on social media platforms. By disrupting these centers, Meta aims to protect its users from scams that can lead to financial loss and identity theft. The company also launched new protection tools to enhance user safety and prevent future scams. This response reflects the growing challenge of online scams and the need for tech companies to actively safeguard their platforms.
This week's security bulletin covers several emerging threats that could impact users and organizations. A new OAuth vulnerability has been identified, which could allow attackers to hijack user sessions without their knowledge. Additionally, researchers have discovered a new phishing scheme targeting Signal users, which exploits the app's encryption features to trick individuals into revealing sensitive information. Another threat involves a technique dubbed 'Zombie ZIP,' where attackers use ZIP files to bypass security measures. Finally, an AI platform has been hacked, raising concerns about the security of machine learning systems. These incidents underline the need for vigilance and updated security practices to protect against evolving attack methods.
A vulnerability in the Ally WordPress plugin has exposed over 200,000 websites to potential attacks. This flaw allows attackers to inject SQL queries, which can lead to unauthorized access and extraction of sensitive information from the website's database. The vulnerability is particularly concerning for site owners who rely on the plugin for various functionalities. Users are urged to take immediate action to secure their sites to prevent possible data breaches. Website administrators should monitor their systems closely and apply any available patches as soon as possible to mitigate the risk.
SecurityWeek
Splunk and Zoom recently addressed serious vulnerabilities in their software that could allow attackers to execute arbitrary shell commands or gain elevated privileges. These flaws are categorized as critical and high-severity, posing significant risks to users and organizations using these platforms. The vulnerabilities could potentially enable unauthorized access and control over systems, which is particularly concerning for businesses that rely on these tools for communication and data analysis. Users are urged to update their software immediately to mitigate these risks. Both companies have released patches to fix the issues, and it’s crucial for affected users to implement these updates as soon as possible.
SCM feed for Latest
The rise of artificial intelligence is transforming the landscape of fraud, making it easier for scammers to execute sophisticated schemes. With advancements in technology, fraudsters are now using deepfakes, automated bots, and other AI tools to scale their operations rapidly. This shift means that traditional security measures might not be enough to combat these evolving threats. As AI continues to develop, it poses significant risks not only to individuals but also to businesses and organizations that can be targeted more easily. Understanding and adapting to these new methods of fraud is crucial for anyone involved in cybersecurity.
Infosecurity Magazine
Police Scotland has been fined by the Information Commissioner's Office (ICO) for a serious data breach involving a victim's phone data. The police force mistakenly shared the entire contents of a victim's phone with her alleged attacker, compromising her privacy and safety. This incident raises significant concerns about how law enforcement handles sensitive information, particularly in cases involving victims of crime. The ICO emphasized the need for organizations to prioritize data protection and ensure that such breaches do not occur in the future. The fine serves as a reminder for all institutions to be vigilant in their data handling practices to protect individuals' rights and safety.