Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Hackers are using fake PayPal notifications to trick users into providing their login credentials. These phishing attacks are designed to exploit remote monitoring and management (RMM) tools, which can give attackers remote access to compromised systems. Users who fall for these scams may unknowingly grant hackers the ability to control their devices, posing a significant security risk. This method of attack affects anyone who uses PayPal, especially those who may not be vigilant about verifying the authenticity of such alerts. It's crucial for users to be cautious about unsolicited emails and messages that request personal information or direct them to unfamiliar websites.

Impact: PayPal users, remote monitoring and management tools
Remediation: Users should verify the source of emails before clicking links, enable two-factor authentication on their accounts, and regularly update passwords.
Read Original

A recently discovered vulnerability known as Reprompt poses a significant risk to users of Copilot, a popular AI-powered tool. This flaw allows attackers to gain control over the Copilot interface and access sensitive user data, even after the chat session has ended. The implications of this vulnerability are serious, as it can potentially expose personal information and compromise user privacy. Users of Copilot should be aware of this issue and take necessary precautions to protect their data. Security experts recommend monitoring for any suspicious activity related to Copilot accounts until a fix is implemented.

Impact: Copilot, Microsoft products utilizing Copilot features
Remediation: Users should avoid clicking on suspicious links and monitor their accounts for unusual activity. Further details on specific patches or updates have not been provided.
Read Original

Fortinet has addressed six security flaws, two of which are critical vulnerabilities affecting its FortiFone and FortiSIEM products. These vulnerabilities could potentially allow attackers to exploit the systems without needing any authentication, which raises significant security concerns. Specifically, the flaws could lead to unauthorized access to configuration data or enable the execution of malicious code. Users of these products should prioritize applying the patches provided by Fortinet to safeguard their systems. Given the nature of these vulnerabilities, organizations using FortiFone and FortiSIEM need to act quickly to mitigate any potential risks.

Impact: FortiFone, FortiSIEM
Remediation: Fortinet has released patches to fix the vulnerabilities. Users are advised to apply these patches as soon as possible to prevent potential exploitation.
Read Original

AI agents, once simple tools for individual productivity, are now integral to various organizational processes, including security and IT operations. These agents can automate workflows across multiple systems, which raises concerns about privilege escalation paths. As they gain more access to sensitive data and systems, they could be exploited by attackers to gain unauthorized access or escalate their privileges within an organization. This shift in how AI is utilized in workplaces poses significant risks, as vulnerabilities in these agents could lead to severe security breaches. Companies need to assess their AI implementations and ensure that appropriate security measures are in place to mitigate these risks.

Impact: AI agents used in security, engineering, IT, and operations
Remediation: Companies should assess AI implementations and enhance security measures.
Read Original

A hacker has claimed to have fully breached Max Messenger, a messaging app popular in Russia, and is threatening to leak sensitive user data and backend systems unless their demands are met. This situation raises alarms for users of the app, as it could expose personal information and compromise the security of communications on the platform. The hacker's claims have not yet been verified, and the company has not publicly responded to the threat. If the breach is legitimate, it could have serious implications for user privacy and trust in the app. The incident underscores the ongoing risks associated with messaging platforms and the potential for cybercriminals to exploit vulnerabilities.

Impact: Max Messenger (Russia)
Remediation: N/A
Read Original

Predator spyware has been found to be more advanced and dangerous than previously thought, turning failed cyberattacks into valuable intelligence for future exploits. This software can collect data from targets even when initial attacks do not succeed, making it a persistent threat. Researchers have indicated that this capability allows attackers to refine their methods and strategies, increasing the likelihood of successful future breaches. The implications are significant for individuals and organizations that could be targeted, as it raises concerns about privacy and security. As this spyware evolves, it poses a greater risk to sensitive information and personal data.

Impact: N/A
Remediation: Organizations should implement robust security measures, including regular software updates, employee training on phishing attacks, and monitoring for suspicious activity.
Read Original

Fortinet has addressed a severe vulnerability in its FortiSIEM product that could allow attackers to execute arbitrary code without authentication. This flaw, known as CVE-2025-64155, has a CVSS score of 9.4, highlighting its potential impact on affected systems. The vulnerability arises from improper handling of special elements in OS commands, which could be exploited by malicious actors. Organizations using FortiSIEM should prioritize applying the latest updates to protect their systems. The existence of such vulnerabilities emphasizes the need for ongoing vigilance in maintaining security protocols and software updates.

Impact: FortiSIEM
Remediation: Users should update to the latest version of FortiSIEM as released by Fortinet to mitigate this vulnerability.
Read Original

The Department of Education in Victoria, Australia, has informed parents that hackers have accessed a database containing personal information of both current and former students. This breach raises serious concerns about the security of sensitive data, as it may include details like names, addresses, and potentially more sensitive information. The incident highlights the vulnerability of educational institutions to cyberattacks, which can compromise the privacy of thousands of students. Parents and guardians are being urged to remain vigilant and monitor for any suspicious activities related to their children's information. This situation serves as a reminder of the importance of cybersecurity measures in protecting personal data in schools.

Impact: Database containing personal information of current and former students
Remediation: N/A
Read Original
Hackers Launch Over 91,000 Attacks on AI Systems Using Fake Ollama Servers

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A recent investigation by GreyNoise has uncovered over 91,000 attacks aimed at AI systems, particularly targeting tools like Ollama and OpenAI. Researchers indicate that these attacks are part of a reconnaissance effort, where hackers are probing enterprise AI systems for weaknesses. This surge in attacks raises concerns about the security of AI technologies, which are increasingly integrated into various business operations. Companies using these AI tools should be vigilant and assess their security measures to protect against potential breaches. The findings emphasize the need for enhanced security protocols as reliance on AI continues to grow.

Impact: Ollama, OpenAI
Remediation: Companies should review and strengthen their security measures for AI systems, implement monitoring for unusual activity, and conduct vulnerability assessments.
Read Original

According to a new estimate from Chainalysis, impersonation fraud in the cryptocurrency space is projected to lead to losses of around $17 billion by 2025. This alarming figure is largely influenced by the increasing sophistication of scams, particularly as artificial intelligence technology becomes more prevalent. Scammers are using advanced tactics to impersonate legitimate businesses and individuals, tricking unsuspecting users into giving up their digital assets. The rise in these scams poses a significant risk not only to individual investors but also to the overall credibility and stability of the cryptocurrency market. As these threats evolve, it's crucial for users to remain vigilant and skeptical of unsolicited communications and offers in the crypto space.

Impact: Cryptocurrency, digital assets, Chainalysis estimates
Remediation: Users should verify the authenticity of communications and offers, employ two-factor authentication, and remain cautious of unsolicited requests.
Read Original

Recent updates to Chrome and Firefox have patched 26 security flaws, including several high-severity vulnerabilities that could allow attackers to execute arbitrary code. Chrome version 144 and Firefox version 147 are now available, and users are strongly encouraged to update their browsers to protect against potential exploits. These vulnerabilities can affect a wide range of users, making it crucial for individuals and organizations to stay current with software updates. Ignoring these patches could leave systems open to attacks that might compromise sensitive data or disrupt operations. The updates not only fix the bugs but also enhance overall browser security, which is vital in today’s digital landscape.

Impact: Chrome 144, Firefox 147
Remediation: Update to Chrome 144 or Firefox 147
Read Original
How Cybercrime Markets Launder Breach Proceeds and What Security Teams Miss

Hackread – Cybersecurity News, Data Breaches, AI, and More

The article examines how cybercriminals exploit markets to convert stolen data into laundered money, primarily using dollar-pegged assets like stablecoins, mixers, and cryptocurrency exchanges. Researchers emphasize the importance of monitoring the price of Bitcoin against Tether (BTC/USDT) and the flow of stablecoins to help security, fraud, and anti-money laundering (AML) teams combat these activities. By understanding these financial movements, organizations can better track illicit transactions and potentially recover lost assets. This issue is particularly relevant as more companies face the fallout from data breaches and the rising sophistication of cybercrime. As a result, security teams are urged to adapt their strategies to include financial monitoring in their defense mechanisms.

Impact: N/A
Remediation: Organizations should implement financial monitoring tools and strategies to track cryptocurrency transactions, especially focusing on stablecoin flows and the BTC/USDT price.
Read Original

Node.js has issued urgent updates to address a serious vulnerability that affects nearly all production applications using the platform. The flaw, related to the async_hooks module, can lead to a stack overflow, resulting in a denial-of-service (DoS) condition. This means that if attackers exploit this vulnerability, they could crash servers running affected applications, disrupting services. Developers and companies using Node.js should prioritize applying these patches to maintain service availability and prevent potential outages. The vulnerability is especially concerning because it touches on core functionality that many frameworks rely on for stability.

Impact: Node.js applications, specifically those using async_hooks
Remediation: Node.js has released updates; specific version numbers or patch details are not mentioned.
Read Original

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyber attacks targeting Ukrainian defense forces using a malware called PLUGGYAPE. These attacks occurred between October and December 2025 and have been linked to a Russian hacking group known as Void Blizzard. This group, also referred to as Laundry Bear or UAC-0190, has been active for several years. The use of popular messaging platforms like Signal and WhatsApp suggests that attackers are exploiting familiar tools to deliver their malware, making detection and prevention more challenging. This incident raises concerns about the cybersecurity of military organizations, especially in conflict zones, where the integrity of communications is crucial.

Impact: Ukrainian defense forces, Signal, WhatsApp
Remediation: Users should implement security best practices such as updating all software, using strong, unique passwords, and enabling two-factor authentication on messaging apps.
Read Original

In 2025, Taiwan experienced a significant increase in cyberattacks from China, with incidents targeting critical infrastructure such as energy utilities and hospitals rising by 6%. On average, Taiwan faced approximately 2.63 million cyberattacks each day. This uptick in activity poses serious risks to the nation's essential services and public safety. The ongoing assaults highlight the tense geopolitical climate and the vulnerabilities of Taiwan's digital infrastructure. As these attacks escalate, it becomes crucial for Taiwan to enhance its cybersecurity measures to protect against such threats.

Impact: Critical infrastructure including energy utilities and hospitals in Taiwan.
Remediation: Strengthening cybersecurity measures, increasing defenses against DDoS attacks, and improving incident response capabilities.
Read Original
PreviousPage 45 of 100Next