Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A recent report by Nardello & Co highlights the growing concerns for UK companies regarding cyber breaches, compliance issues, and reputational damage as they head into 2026. The report outlines that businesses are increasingly worried about the convergence of cyber risks, which can lead to significant financial losses and undermine consumer trust. Companies of all sizes are urged to reassess their cybersecurity strategies and ensure they meet regulatory compliance to mitigate these risks. With cyber threats evolving rapidly, businesses need to prioritize their defenses and be proactive in their approach to security. The findings serve as a wake-up call for organizations to strengthen their cybersecurity measures and protect their reputations.

Impact: N/A
Remediation: Companies should reassess cybersecurity strategies and ensure regulatory compliance.
Read Original

CyberArk has reported that it successfully exploited a vulnerability in the StealC infostealer malware to gather intelligence. This malware is known for stealing sensitive information from infected systems, which can include login credentials, financial data, and personal information. By exploiting the flaw, researchers were able to collect evidence that can help understand how the malware operates and how it might be mitigated. This incident underscores the ongoing challenges posed by infostealers and the need for organizations to remain vigilant against such threats. Users and companies should ensure their systems are updated and monitor for signs of compromise, as infostealers like StealC can have serious implications for data security.

Impact: StealC infostealer malware
Remediation: Users should update their systems and implement security measures to monitor for infections.
Read Original

Researchers have identified a cross-site scripting (XSS) vulnerability in the control panel of StealC, a malware used for stealing information. This flaw allowed the researchers to monitor the activities of the threat actor behind the malware, including capturing system fingerprints and tracking active sessions. The discovery is significant as it provides a rare glimpse into the operations of cybercriminals who utilize this malware. Understanding how these operators function can aid in developing better defenses against such threats. As StealC continues to be a tool for attackers, this vulnerability highlights the ongoing risks associated with information-stealing malware.

Impact: StealC information stealer malware control panel
Remediation: N/A
Read Original

A recent study by Palo Alto Networks warns that the upcoming Milan Cortina 2026 Winter Olympic Games could attract cyber attackers looking to exploit the event's extensive digital infrastructure. With the Olympics featuring increased network traffic, new systems, and temporary partnerships, the risk of cyber incidents rises significantly. Attackers are likely to target various components of the event's digital ecosystem, including ticketing platforms and telecommunications infrastructure. This situation poses a threat not only to the event organizers but also to attendees and stakeholders who rely on these digital services. As the event approaches, it’s crucial for companies involved in the Olympics to enhance their cybersecurity measures to mitigate potential attacks.

Impact: Ticketing platforms, telecommunications infrastructure, digital services used during the Olympics
Remediation: Companies involved should enhance cybersecurity measures and prepare for potential attacks as the event approaches.
Read Original

A recent survey by Allianz shows that cyber risk is still the top concern for businesses around the world, marking its fifth consecutive year at the top of the list. The survey highlights that threats like ransomware, data breaches, service outages, and regulatory issues are major challenges that impact companies' revenues and customer trust. As businesses increasingly adopt AI technologies, they are also having to rethink their strategies for resilience and recovery in light of these ongoing cyber threats. This situation emphasizes the need for organizations to prioritize their cybersecurity measures to protect against these persistent risks.

Impact: Ransomware, data theft, service outages, regulatory compliance issues
Remediation: Prioritize cybersecurity measures, enhance resilience and recovery strategies
Read Original

Microsoft has rolled out emergency updates for Windows 10, Windows 11, and Windows Server to address issues that arose from the January Patch Tuesday updates. These out-of-band updates specifically target problems related to system shutdowns and Cloud PC functionality. Users of these operating systems may experience disruptions due to these bugs, which could impact productivity and system reliability. It's crucial for users to apply these updates promptly to ensure their systems operate smoothly and to mitigate any potential security risks that may arise from unresolved bugs.

Impact: Windows 10, Windows 11, Windows Server
Remediation: Users should apply the emergency updates provided by Microsoft to resolve the shutdown and Cloud PC issues.
Read Original

Researchers have discovered 17 malicious browser extensions associated with the GhostPoster campaign that have been installed over 840,000 times across Chrome, Firefox, and Edge stores. These extensions are designed to hijack users' browsing sessions and can potentially lead to data theft or other malicious activities. The widespread installation indicates that many users may have unknowingly compromised their security by downloading these harmful extensions. It's crucial for users to regularly check their installed extensions and remove any that seem suspicious. The incident raises concerns about the security measures in place within browser extension stores and the need for more stringent vetting processes to protect users from such threats.

Impact: Chrome, Firefox, Edge browsers
Remediation: Users should uninstall any suspicious browser extensions and regularly review their installed extensions for potential threats.
Read Original

A recent report from Infosecurity Magazine indicates that industrial technology environments are facing a significant surge in cyberattacks. The number of incidents has doubled, particularly targeting vulnerabilities in industrial control systems. This increase poses serious risks for industries reliant on these systems, as attackers may exploit weaknesses to disrupt operations or compromise sensitive data. Companies operating in sectors such as manufacturing, energy, and transportation should be particularly vigilant, as the implications of these attacks could lead to operational downtime and financial losses. The trend highlights the urgency for organizations to enhance their cybersecurity measures to protect against evolving threats.

Impact: Industrial control systems, manufacturing systems, energy sector technologies, transportation systems
Remediation: Organizations should implement stronger security protocols, conduct regular vulnerability assessments, and ensure timely updates to industrial control systems.
Read Original
Actively Exploited

Researchers have discovered a vast network of over 18,000 command-and-control servers operated by Chinese cybercriminals, which have been used to facilitate malware attacks. These servers are spread across 48 different hosting providers and account for nearly 84% of all malicious cyber activities within Chinese hosting environments over the past three months. This extensive operation poses significant risks to businesses and individuals, as the malware can compromise systems and steal sensitive information. The scale of the operation indicates a well-organized effort that could have far-reaching implications for cybersecurity in the region and beyond. Companies need to remain vigilant and enhance their defenses against these types of threats.

Impact: N/A
Remediation: Companies should enhance their cybersecurity measures, regularly update their systems, and monitor for any suspicious activity.
Read Original

Researchers discovered a cross-site scripting (XSS) vulnerability in the web-based control panel of the StealC info-stealing malware. This flaw allowed them to monitor the malware operators' active sessions and collect data on their hardware setups. StealC is designed to steal sensitive information from users, which means this incident not only exposes the attackers but also raises concerns about the ongoing effectiveness of such malware. Understanding these vulnerabilities can help cybersecurity experts develop better defenses against similar threats. The incident serves as a reminder that even sophisticated malware can have weaknesses that researchers can exploit to gain insights into cybercriminal operations.

Impact: StealC info-stealing malware control panel
Remediation: Implement proper input validation and sanitization to mitigate XSS vulnerabilities; regularly update security protocols for web applications.
Read Original
ICE Agent Doxxing Platform was Crippled After Coordinated DDoS Attack

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

The activist website ICE List, which published personal information of U.S. Immigration and Customs Enforcement (ICE) agents, was taken offline after a significant distributed denial-of-service (DDoS) attack. This incident occurred shortly after the release of a list containing the names of 4,500 federal agents, which was linked to a shooting involving Renee Nicole Good. The DDoS attack effectively crippled the site, preventing access for users. This incident raises concerns about the safety of law enforcement personnel whose information has been exposed and the potential for further attacks on similar activist platforms. It highlights the ongoing tensions between activists and law enforcement agencies, especially in the context of online privacy and security.

Impact: ICE List website, U.S. Immigration and Customs Enforcement (ICE) agents
Remediation: N/A
Read Original

On Friday morning, users reported widespread outages on the social media platform X, with many unable to access their accounts or post updates. The issues seemed to affect various regions, leading to frustration among users who rely on the platform for communication and information sharing. While the exact cause of the outage has not been disclosed, it raises concerns about the platform's reliability and the potential impact on user engagement. Such incidents can also lead to discussions about security measures and infrastructure resilience, especially for a service that plays a significant role in public discourse. As of now, there are no indications that this outage was caused by a cyber attack, but it highlights the vulnerabilities that online services face.

Impact: X social media platform
Remediation: N/A
Read Original
Actively Exploited

Fraudsters are exploiting PayPal's features to scam users by creating fake business accounts and sending fraudulent invoices. They utilize the 'Money Request' and 'Invoice' functions to make their scams appear legitimate, often using the blue tick verification to mislead victims into believing they are dealing with a trusted entity. This scam can target both individuals and businesses, leading to financial losses and eroding trust in the PayPal platform. Users should be cautious when receiving unexpected invoices and verify the sender's identity before making any payments. This incident underlines the need for increased vigilance in online transactions, especially with widely used payment platforms.

Impact: PayPal accounts, users receiving invoices
Remediation: Users should verify the sender's identity before making payments and report any suspicious invoices to PayPal.
Read Original

Last week, Verizon experienced a nationwide wireless outage that affected many of its customers. In response to the disruption, the company has started issuing $20 account credits to users who were impacted. Customers will receive text messages with instructions on how to claim the credit, providing some compensation for the inconvenience caused by the outage. Such disruptions can significantly affect communication, especially for those relying on their phones for work or emergencies. By offering these credits, Verizon aims to address customer dissatisfaction and maintain trust after the incident.

Impact: Verizon wireless services
Remediation: Issuing $20 account credits to affected customers
Read Original

A federal court has dismissed a lawsuit from the Trump administration's Department of Justice that sought unredacted voter data from California. Judge David Carter criticized the government's demands as 'unprecedented and illegal,' indicating that such requests for voter information could violate privacy rights. The case centers around concerns that the DOJ was attempting to obtain sensitive voter data without proper justification. This ruling is significant because it reinforces the legal protections surrounding voter information and could impact similar future requests from federal agencies. The decision reflects ongoing tensions between state protections of voter data and federal interests in election integrity.

Impact: California voter data
Remediation: N/A
Read Original
PreviousPage 40 of 100Next