Researchers have uncovered a significant web skimming campaign that has been stealing credit card information from online checkout pages since January 2022. This attack primarily targets major payment networks, including American Express, Mastercard, and UnionPay, affecting enterprise organizations that use these payment services. The skimming malware is designed to capture sensitive payment information as users enter it during online transactions. As a result, customers of these affected enterprises may be at risk of fraud and identity theft. It’s crucial for businesses to enhance their security measures and for users to monitor their financial statements for any suspicious activity.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
The GoBruteforcer botnet is currently targeting cryptocurrency and blockchain projects by exploiting weak passwords and outdated web technologies. Researchers have identified that the botnet spreads through automated server deployments that are poorly secured. This means that many organizations within the crypto space could be at risk, as attackers can gain unauthorized access to their systems. The use of AI in the propagation of this botnet raises concerns about the evolving tactics of cybercriminals, making it crucial for affected companies to strengthen their security measures. As the cryptocurrency sector continues to grow, the potential impact of such attacks could be significant, leading to financial losses and data breaches.
SCM feed for Latest
India's Financial Intelligence Unit (FIU-IND) has implemented new regulations aimed at tightening oversight of cryptocurrency activities within the country. These guidelines require all crypto businesses catering to Indian users, including those based offshore, to register with the FIU. Additionally, these entities must disclose key details such as their officers, business locations, and ownership structures. This move is part of India's broader effort to combat financial crimes linked to cryptocurrencies, which have been increasingly scrutinized due to their potential for misuse in money laundering and other illicit activities. By enforcing these regulations, the Indian government aims to enhance transparency and accountability in the crypto sector, which could have significant implications for how these businesses operate and for investor protection.
SCM feed for Latest
Hackers have reportedly leaked parts of Target's internal source code and developer documentation on Gitea, a self-hosted Git service. The threat actor created multiple repositories that allegedly contain sensitive information related to Target's operations. This incident raises significant concerns about the security of Target's systems and the potential misuse of the leaked code. If the claims are verified, it could lead to increased vulnerability for Target and its customers, as attackers may exploit the leaked information to launch further attacks or create malicious software. Companies need to be vigilant about their internal data security to prevent such leaks from occurring.
SCM feed for Latest
A recent survey by the World Economic Forum indicates a significant concern regarding the impact of artificial intelligence on cybersecurity. According to the Global Cybersecurity Outlook 2026, 94% of cybersecurity professionals believe that AI will drive major changes in the field by 2026. Additionally, 87% of respondents recognized that vulnerabilities related to AI are on the rise. This suggests that as AI technology becomes more integrated into various systems, it also opens new avenues for cyber attacks. Organizations need to be aware of these evolving risks and adapt their security measures accordingly to protect against potential breaches.
ServiceNow has addressed a significant flaw in its AI platform that could allow attackers to impersonate users. The company claims there is no evidence that this vulnerability was exploited before the patch was released in October. However, security researchers warn that the configuration of AI agents could still lead to prompt-injection style abuses, which could potentially compromise user accounts. This situation raises concerns about the security of AI systems and the risks they pose if not properly configured. Organizations using ServiceNow's AI features should ensure they implement the latest updates to mitigate any potential risks.
BleepingComputer
Scammers are targeting LinkedIn users with a new phishing tactic that involves fake comments appearing as replies to legitimate posts. These comments, which resemble official LinkedIn notifications, falsely warn users about policy violations and encourage them to click on malicious external links. Some attackers are even using LinkedIn's own lnkd.in URL shortener, making it more difficult for users to recognize these attempts as scams. This tactic is particularly concerning as it exploits the trust users have in the platform, potentially compromising personal and professional information. LinkedIn users should be cautious and verify the authenticity of comments before clicking on any links.
A Dutch appeals court has sentenced a 44-year-old hacker to seven years in prison for his role in hacking port systems to facilitate the smuggling of cocaine through European logistics hubs. The hacker exploited vulnerabilities in port networks to help traffickers move drugs into the Netherlands, highlighting a significant intersection of cybersecurity and organized crime. This case underscores the potential dangers of cyber intrusions in critical infrastructure, as they can be manipulated for illegal activities. The ruling reflects growing legal actions against cybercriminals and aims to deter similar offenses in the future. The incident raises awareness about the importance of securing logistical and transportation networks against cyber threats, which can have far-reaching implications beyond just financial losses.
SCM feed for Latest
A Dutch court has sentenced a 44-year-old man to seven years in prison for his role in a hacking operation that facilitated drug trafficking. The individual was found guilty of targeting computer systems in major ports, including Rotterdam and Antwerp, allowing shipments of illegal drugs to enter without detection. This case illustrates how cybercrime can intersect with drug trafficking, raising concerns about port security and the potential for similar attacks in other regions. The ruling serves as a warning to hackers involved in organized crime that law enforcement is increasingly able to track and prosecute cybercriminal activities.
Target is facing a significant security incident after leaked source code samples were confirmed by multiple current and former employees to match internal systems. This revelation came shortly after the company implemented an 'accelerated' lockdown of its Git server, which now requires VPN access for additional security. The lockdown was initiated a day after BleepingComputer reached out to Target about the leaked code. This incident raises concerns about the potential exposure of sensitive internal information, which could be exploited by attackers. The company’s swift response indicates the seriousness of the threat and the need for enhanced security measures.
BleepingComputer
Recent reports confirm that leaked source code from Target is authentic, as verified by multiple current and former employees. This source code, which is linked to Target's internal systems, was shared by a threat actor, raising significant security concerns. In response, Target has implemented an expedited lockdown of its Git server, now requiring VPN access to enhance security. This incident highlights the risks companies face when sensitive internal information is compromised, potentially exposing them to further attacks or vulnerabilities. The implications for Target and its customers could be serious, as such leaks can lead to unauthorized access and exploitation of systems.
SCM feed for Latest
Experts are warning that power outages in IT and operational technology (OT) systems could lead to significant cybersecurity issues by 2026. These power gaps may turn minor outages into major crises, affecting the reliability and security of critical infrastructure. Companies that rely heavily on interconnected IT and OT systems should be particularly concerned, as the potential for cyberattacks increases during power failures. If attackers take advantage of these vulnerabilities, they could disrupt services, compromise data, or even cause physical damage. This situation highlights the need for organizations to bolster their cybersecurity measures and prepare for the challenges posed by electrical failures.
SCM feed for Latest
Experts are sounding the alarm about potential cybersecurity issues expected in 2026, particularly focusing on agent-driven breaches, misuse of National Health Information (NHI), and the rising threat of deepfakes. These agent-driven breaches could involve automated systems being exploited by attackers to gain unauthorized access to sensitive data. The misuse of NHI data could lead to serious privacy violations, affecting individuals' personal health information. Additionally, deepfakes may erode trust in digital communications, making it harder for users to discern between real and fabricated content. As these technologies evolve, companies and individuals must prepare for the implications on privacy and security, making proactive measures essential to protect sensitive information.
In 2025, cybersecurity experts observed that many effective attacks have not changed significantly from a decade ago. Attackers are still exploiting traditional vulnerabilities, focusing on the basics rather than the latest trends. This suggests that while the security industry is preoccupied with emerging threats like AI and quantum computing, the foundational issues remain a major concern. Organizations need to revisit their security practices and patch common vulnerabilities to defend against these familiar attack vectors. As attackers optimize their approaches, defenders must also strengthen their basic security measures to protect sensitive data effectively.
SecurityWeek
A 44-year-old man has been sentenced to prison for installing remote access malware on the systems of a logistics company in the Netherlands. He was able to carry out this cyberattack with assistance from some employees of the firm. The malware allowed him to gain unauthorized access to sensitive information, raising serious concerns about insider threats and the security of critical infrastructure. This incident serves as a reminder for companies to strengthen their cybersecurity measures and ensure that employees are aware of the risks associated with insider collaboration. The case highlights the increasing need for vigilance in protecting sensitive systems from both external and internal threats.