The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyber attacks targeting Ukrainian defense forces using a malware called PLUGGYAPE. These attacks occurred between October and December 2025 and have been linked to a Russian hacking group known as Void Blizzard. This group, also referred to as Laundry Bear or UAC-0190, has been active for several years. The use of popular messaging platforms like Signal and WhatsApp suggests that attackers are exploiting familiar tools to deliver their malware, making detection and prevention more challenging. This incident raises concerns about the cybersecurity of military organizations, especially in conflict zones, where the integrity of communications is crucial.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
In 2025, Taiwan experienced a significant increase in cyberattacks from China, with incidents targeting critical infrastructure such as energy utilities and hospitals rising by 6%. On average, Taiwan faced approximately 2.63 million cyberattacks each day. This uptick in activity poses serious risks to the nation's essential services and public safety. The ongoing assaults highlight the tense geopolitical climate and the vulnerabilities of Taiwan's digital infrastructure. As these attacks escalate, it becomes crucial for Taiwan to enhance its cybersecurity measures to protect against such threats.
AZ Monica hospital in Belgium has been hit by a cyberattack that led to the shutdown of all its servers. The attack forced the cancellation of scheduled medical procedures and required the transfer of critical patients to other facilities. The incident has raised concerns about the security of healthcare systems, especially as hospitals are increasingly targeted by cybercriminals. AZ Monica operates two campuses in Antwerp and Deurne, and the disruption could have significant implications for patient care and hospital operations. Authorities are investigating the attack to understand its impact and prevent future incidents.
BleepingComputer
From October to December 2025, Ukraine's Defense Forces were targeted by a malware campaign disguised as a charity initiative. The attackers deployed backdoor malware known as PluggyApe, which allowed them unauthorized access to sensitive systems. This incident raises concerns about the security of military communications and the potential for further cyberattacks against Ukraine amidst ongoing tensions. The use of a charity theme to lure victims highlights the evolving tactics of cybercriminals, making it crucial for organizations to remain vigilant. As the conflict continues, the implications of such attacks could extend beyond immediate data breaches, affecting national security and public trust.
Kentucky's Attorney General Russell Coleman has filed a lawsuit against Character.AI, a popular generative AI chatbot, and its founders. The lawsuit accuses them of violating the state's Consumer Data Protection Act, which was enacted at the beginning of the year. This legal action raises significant concerns regarding the handling of user data, particularly the protection of minors who may use the chatbot. As generative AI tools become more widespread, ensuring compliance with data protection laws is crucial for safeguarding user privacy. This case could set important precedents for how AI companies manage and protect consumer data, especially in relation to child safety.
SCM feed for Latest
A serious vulnerability has been identified in multiple versions of the Apache Struts 2 framework, tracked as CVE-2025-68493. This XML external entity injection flaw could allow attackers to gain unauthorized access to sensitive data, cause denial-of-service attacks, or execute server-side request forgery (SSRF) attacks. Organizations using affected versions of Apache Struts 2 are at risk, which could lead to significant data breaches and disruptions. The issue emphasizes the need for developers and system administrators to ensure their applications are updated and secure against such vulnerabilities. Immediate action is necessary to mitigate potential exploitation.
SCM feed for Latest
The Cybersecurity and Infrastructure Security Agency (CISA) has added a serious vulnerability in the open-source Git service Gogs to its Known Exploited Vulnerabilities catalog. This flaw, identified as CVE-2025-8110, is a path traversal issue that attackers are actively exploiting. Organizations using Gogs should be particularly vigilant, as this vulnerability allows unauthorized access to sensitive files on affected systems. The inclusion in CISA's catalog highlights the urgency for users to address this issue promptly, as it can lead to significant security breaches if not mitigated. Companies relying on Gogs for version control must prioritize patching this vulnerability to protect their data.
SCM feed for Latest
Recently, over 100,000 records containing valid PayPal credentials were claimed to have been leaked by cybercriminals. However, researchers from Cybernews have dismissed these claims, stating that the data appears to be outdated and likely sourced from previous infostealer logs rather than a new breach. This situation raises concerns for users who might worry about the security of their PayPal accounts, even though the current evidence suggests there is no fresh compromise. It's important for individuals to remain vigilant and regularly update their passwords, regardless of the validity of this specific claim. The incident serves as a reminder of the ongoing risks associated with credential theft and the necessity for users to use strong, unique passwords for their accounts.
SCM feed for Latest
A recent security incident involves eight malicious npm packages masquerading as integrations for the n8n workflow automation platform. These packages have been used to steal OAuth tokens from developers, compromising their accounts and potentially exposing sensitive information. The attack exploits community nodes within the n8n ecosystem, indicating a significant supply chain risk. Developers who have installed these packages may be at risk, as their stolen OAuth tokens could grant attackers unauthorized access to their applications. This incident underscores the need for developers to be cautious about the packages they use and to regularly review their OAuth token security.
ServiceNow has revealed a significant vulnerability linked to its legacy chatbot, which has recently been upgraded with agentic AI capabilities. This flaw has put customer data and connected systems at risk, potentially allowing unauthorized access and exploitation. The issue arises from the integration of AI into an older system that lacked adequate security measures. As a result, businesses using ServiceNow's platform may face serious data breaches if the vulnerability is not addressed promptly. This incident serves as a crucial reminder for companies to continually assess the security of their systems, especially when implementing new technologies.
SCM feed for Latest
A new phishing campaign is targeting employees by exploiting their anxiety around performance reviews. The attackers are sending emails that impersonate management or HR, claiming to discuss performance evaluations scheduled for October 2025 and falsely hinting at potential layoffs. This tactic aims to create urgency and fear, prompting recipients to click on malicious links or download malware. Companies and employees need to be vigilant, as these scams can lead to data breaches or financial loss. The incident highlights the need for better cybersecurity awareness and training, especially during sensitive times like performance review periods.
Central Maine Healthcare (CMH) suffered a significant data breach last year, compromising the personal information of over 145,000 individuals. The breach exposed sensitive data, including names, birth dates, Social Security numbers, and medical records, raising concerns about identity theft and privacy violations. CMH has stated that they are taking steps to enhance their security measures, but the incident underscores the vulnerability of healthcare organizations to cyber attacks. Affected individuals have been advised to monitor their accounts for any suspicious activity. This breach serves as a reminder of the importance of robust data protection in the healthcare sector, where sensitive information is frequently targeted by cybercriminals.
BleepingComputer
AZ Monica, a hospital in Belgium, has had to shut down all its servers following a cyberattack that forced the cancellation of scheduled procedures and the transfer of critical patients. The incident raises serious concerns about the impact of cyber threats on healthcare facilities, which are often vulnerable targets. Hospitals rely heavily on their IT systems for patient care, and disruptions can lead to significant risks for patient safety and treatment continuity. This attack not only affects the immediate operations of AZ Monica but also serves as a reminder of the growing threats facing healthcare institutions worldwide. The situation is still developing as the hospital works to assess the damage and restore its systems.
Endesa, a Spanish energy company, has reported a significant data breach affecting its customers. Attackers gained access to sensitive customer information, including full names, contact details, national ID numbers, and payment information. This incident raises serious concerns about the security of personal data in the energy sector, especially as such information can be used for identity theft and fraud. Endesa has expressed regret over the incident and is likely to face scrutiny from both customers and regulators regarding its data protection practices. Customers of Endesa should monitor their accounts for any suspicious activity and consider taking steps to protect their personal information.
Researchers have uncovered a significant web skimming campaign that has been stealing credit card information from online checkout pages since January 2022. This attack primarily targets major payment networks, including American Express, Mastercard, and UnionPay, affecting enterprise organizations that use these payment services. The skimming malware is designed to capture sensitive payment information as users enter it during online transactions. As a result, customers of these affected enterprises may be at risk of fraud and identity theft. It’s crucial for businesses to enhance their security measures and for users to monitor their financial statements for any suspicious activity.