Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Recent reports confirm that internal source code and documentation from Target Corporation has been exposed on the public software development platform Gitea. Current and former employees verified the authenticity of the leaked materials, raising concerns about potential security vulnerabilities and misuse of sensitive information. The exposure of this source code could allow malicious actors to exploit weaknesses in Target's systems, potentially leading to data breaches or other security incidents. This situation not only affects Target but also raises alarms for customers and partners who rely on the company for secure transactions. It highlights the ongoing risks associated with software development platforms and the importance of securing proprietary code.

Impact: Target Corporation internal source code and documentation
Remediation: N/A
Read Original

The U.S. is calling on United Nations member states to strengthen sanctions against North Korea, particularly targeting its IT worker scheme and cryptocurrency thefts. These activities are believed to finance North Korea’s nuclear and ballistic missile programs. By pressuring other nations to take action, the U.S. aims to limit North Korea's ability to fund its military ambitions through cybercrime. This situation raises concerns among international cybersecurity experts, as North Korean cyber operations have become increasingly sophisticated and threatening. The focus on sanctions reflects a broader strategy to curb the regime's funding sources and deter its aggressive military posture.

Impact: North Korea's IT worker scheme, cryptocurrency platforms
Remediation: Strengthen sanctions against North Korea, monitor cryptocurrency transactions linked to North Korean actors
Read Original

Researchers have identified a malware campaign utilizing AsyncRAT, a remote access tool, which is being cleverly masked by cybercriminals through Cloudflare's services. By using Cloudflare’s free-tier offerings and TryCloudflare tunneling domains, attackers are able to host malicious WebDAV servers. This tactic allows them to hide their operations behind a trusted infrastructure, making detection more difficult. The campaign raises significant concerns for organizations relying on Cloudflare, as it shows how legitimate services can be exploited for malicious purposes. Companies must remain vigilant and enhance their security measures to counteract such deceptive tactics that can lead to unauthorized access and data breaches.

Impact: Cloudflare services, AsyncRAT malware
Remediation: Organizations should monitor their Cloudflare configurations and traffic for unusual activity, implement strict access controls, and consider additional security measures such as intrusion detection systems.
Read Original

The Kyowon Group, a major South Korean conglomerate, has confirmed that it fell victim to a ransomware attack that has significantly disrupted its operations. During this incident, customer information may have been compromised, raising concerns about potential identity theft and fraud. The company is currently investigating the extent of the data breach and working to restore its systems. This attack not only affects Kyowon’s business operations but also puts its customers at risk as their personal data might be exposed. As cyberattacks become more frequent and sophisticated, businesses must prioritize cybersecurity measures to protect sensitive information.

Impact: Customer information, operational systems
Remediation: N/A
Read Original

In 2022, businesses in Australia, New Zealand, and the South Pacific, particularly in retail and construction, faced a surge in cyberattacks, outpacing incidents in critical sectors such as healthcare and utilities. This trend indicates that smaller, Main Street businesses are increasingly becoming targets for cybercriminals, who often view them as more vulnerable due to their limited resources for cybersecurity. The rise in attacks could lead to significant financial losses, operational disruptions, and compromise of customer data, which would have lasting impacts on these businesses and their clients. As cyber threats evolve, it’s crucial for these industries to strengthen their defenses and adopt better security practices to protect against future breaches.

Impact: Retail and construction businesses in Australia, New Zealand, and the South Pacific
Remediation: Companies should enhance their cybersecurity measures, including employee training, regular software updates, and implementing strong access controls.
Read Original

The Department of Homeland Security (DHS) is working to establish a new council called ANCHOR, aimed at improving communication and collaboration between government entities and the private sector regarding critical infrastructure security. This initiative comes after the previous council was disbanded and will include discussions on liability and other key areas. The goal is to enhance the nation's resilience against cyber threats and secure vital services that impact everyday life. By fostering dialogue between different stakeholders, the DHS hopes to create a more unified approach to safeguarding critical infrastructure. This development is important as it reflects an ongoing commitment to addressing vulnerabilities in sectors like energy, transportation, and communication.

Impact: N/A
Remediation: N/A
Read Original

Verizon users across the U.S. have been experiencing a widespread network outage, causing disruptions in service for millions. Many customers are seeing an 'SOS' indicator on their phones, which typically means their devices cannot connect to the network. This issue may prevent users from making calls or accessing data services. Verizon has acknowledged the outage and is working to resolve it, but many users are left without reliable communication. As the situation develops, users are advised to stay updated through Verizon's official channels for further information on restoration timelines.

Impact: Verizon wireless network services
Remediation: N/A
Read Original

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyberattacks targeting Ukraine's defense forces, utilizing a malware known as PLUGGYAPE. These attacks are believed to be linked to the Russian cyber group Void Blizzard, also referred to as Laundry Bear or UAC-0190. The attacks come amidst ongoing tensions and conflict in the region, raising concerns about the security of military operations in Ukraine. Given the group’s history and capabilities, these incidents could pose significant risks to the integrity of defense communications and operations. The situation underscores the continuing cyber warfare component of the conflict, as nation-states increasingly rely on digital tactics alongside traditional military strategies.

Impact: Ukraine's defense forces
Remediation: N/A
Read Original

The Black Lotus Labs team at Lumen Technologies has taken significant action against the AISURU and Kimwolf botnets by null-routing over 550 command-and-control (C2) servers since early October 2025. These botnets have gained notoriety for their ability to commandeer devices and use them in distributed denial-of-service (DDoS) attacks. By cutting off access to these C2 nodes, researchers aim to disrupt the operations of these botnets, which primarily target Android devices. This move is crucial as it not only protects potential victims from being exploited but also highlights the ongoing battle against cybercriminals who leverage such networks for malicious activities. The impact of these botnets underscores the need for continued vigilance in cybersecurity practices, especially for users of vulnerable devices.

Impact: Android devices, AISURU botnet, Kimwolf botnet
Remediation: Null-routed traffic to command-and-control nodes; users should ensure their devices are updated and secure.
Read Original

A serious vulnerability has been discovered in Fortinet's Security Information and Event Management (SIEM) solution, FortiSIEM, which allows remote, unauthenticated attackers to execute arbitrary commands. This flaw, classified as a command injection vulnerability, poses a significant risk as it can be exploited without needing any prior access. Researchers have released technical details and exploit code, raising concerns about the potential for widespread attacks. Companies using FortiSIEM should take immediate action to secure their systems, as the implications of this vulnerability could lead to unauthorized access and data breaches. It's crucial for users to stay informed and apply any necessary patches or updates as they become available.

Impact: FortiSIEM
Remediation: Organizations should implement available patches and updates for FortiSIEM as soon as possible to mitigate the risk of exploitation.
Read Original

Verizon Wireless is currently experiencing a significant outage across the United States, leaving many customers unable to make calls or access mobile data. Reports indicate that affected users are seeing their phones stuck in SOS mode, which typically indicates a lack of network connectivity. This disruption is impacting a wide range of customers, from everyday users to businesses that rely on mobile communication for their operations. As the issue persists, many are left without a reliable means of communication, raising concerns about the potential consequences for emergency services and daily activities. Verizon has not yet provided a timeline for when service will be restored.

Impact: Verizon Wireless cellular service
Remediation: N/A
Read Original

Many smartphones continue to send data back to their manufacturers even when the devices are not in use. This includes information about location, usage patterns, and more, which can raise privacy concerns among users. Research from NordVPN highlights that this ongoing data transmission can happen without the user's explicit consent or knowledge. Users should be aware of the potential for their personal information to be shared and take steps to limit this data flow. Adjusting privacy settings and disabling certain features can help users regain control over their data and enhance their privacy.

Impact: Smartphones from various manufacturers
Remediation: Adjust privacy settings, disable location services, and limit data sharing features
Read Original

A judge has dismissed a lawsuit against CrowdStrike related to an outage that affected the company's services. The plaintiffs, who were investors, claimed that the outage was a result of fraudulent actions by CrowdStrike, but the court found no evidence to support the allegation of intent to deceive. This ruling means that CrowdStrike will not face legal repercussions for the incident, which impacted its stock value at the time. The decision is significant for the company and its investors as it clears the way for CrowdStrike to focus on its operations without the distraction of legal battles. For investors, the outcome reinforces the importance of clear evidence when pursuing claims against a publicly traded company.

Impact: CrowdStrike services
Remediation: N/A
Read Original

A new malware campaign known as PluggyApe has been targeting defense officials in Ukraine. The attackers have been using a charity theme to lure victims into clicking on links that lead to a fake charitable foundation website. This tactic involves sending instant messages through platforms like Signal and WhatsApp, making it appear as though the outreach is legitimate. The campaign's focus on defense personnel raises concerns about the potential for sensitive information to be compromised, especially given the ongoing conflict in the region. As cyber threats continue to evolve, this incident serves as a reminder of the need for vigilance among individuals and organizations against social engineering tactics.

Impact: Ukrainian defense officials
Remediation: Users should be cautious of unsolicited messages, verify the authenticity of links before clicking, and maintain updated security software.
Read Original

Central Maine Healthcare experienced a data breach that affected over 145,000 individuals, including patients and current or former employees. The incident took place between March 19 and June 1 of last year, impacting a healthcare system that serves about 400,000 people in the region. This breach raises concerns about the security of personal and medical information, as sensitive data could be exposed to unauthorized individuals. The healthcare sector is often targeted due to the valuable nature of the data they hold, making it crucial for organizations to enhance their cybersecurity measures. Affected individuals should be vigilant about potential identity theft or phishing attempts following the breach.

Impact: Patient records, employee data, Central Maine Healthcare systems
Remediation: N/A
Read Original
PreviousPage 44 of 100Next