Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Meta has addressed a vulnerability in Instagram that allowed unauthorized parties to send password reset emails. This flaw raised concerns about potential account takeovers, as attackers could exploit it to gain access to user accounts. Despite claims of leaked data, Meta has denied any data breach, stating they have only fixed the reset issue. Users should be aware of this vulnerability, especially if they received unexpected password reset emails, as it indicates the possibility of malicious activity. It's important for users to enable additional security measures, such as two-factor authentication, to further protect their accounts.

Impact: Instagram accounts
Remediation: The vulnerability has been fixed by Meta, but specific patch numbers or updates were not provided.
Read Original

In August 2025, the University of Hawaii's Cancer Center experienced a ransomware attack that compromised sensitive data belonging to study participants. The breach included historical documents dating back to the 1990s, which contained Social Security numbers. This incident raises significant concerns about the protection of personal information in medical research, particularly as the stolen data can be used for identity theft and fraud. The university is now facing the challenge of addressing the fallout from this breach, including notifying affected individuals and enhancing their cybersecurity measures to prevent future incidents. As healthcare institutions increasingly rely on digital systems, the need for robust data protection strategies has never been more critical.

Impact: University of Hawaii Cancer Center data, study participant information, Social Security numbers
Remediation: N/A
Read Original

Hackers have claimed to have stolen internal source code from Target Corporation, publishing a sample of the code on a public software development platform. Following a notification from BleepingComputer, Target took immediate action by taking the files offline and making its developer Git server inaccessible. This incident raises significant concerns about the security of Target's internal systems and the potential implications for the company's operations and customer data. The breach could lead to further attacks or exploitation if the stolen code contains vulnerabilities or sensitive information. As of now, the full extent of the breach and the hackers' intentions remain unclear.

Impact: Target Corporation's internal source code and developer Git server
Remediation: Target has taken its developer Git server offline to prevent further access to the stolen code.
Read Original

Palo Alto Networks' research team, Unit 42, has released a new framework focused on the security governance of vibe coding tools. This framework includes a series of recommended security controls aimed at helping organizations better manage the risks associated with these tools. Vibe coding, which can involve various programming and coding practices, is increasingly being adopted across industries. The introduction of this framework is timely, as it addresses the growing need for secure coding practices, particularly in environments where collaboration and rapid development are common. Companies that utilize vibe coding tools should consider implementing these recommendations to enhance their security posture and protect against potential vulnerabilities.

Impact: Vibe coding tools
Remediation: Organizations should implement the recommended security controls outlined in the Vibe Coding Security Governance Framework.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has officially retired ten Emergency Directives that were put in place between 2019 and 2024. These directives were aimed at addressing various federal cybersecurity risks. By closing these directives, CISA is signaling a shift in its approach to managing cybersecurity threats within the federal government. This could indicate that the agency believes the underlying issues have been resolved or that new strategies are being adopted. The closure of these directives may impact how federal agencies prioritize and respond to cyber threats moving forward, as they adapt to evolving security challenges.

Impact: Federal cybersecurity protocols and practices.
Remediation: N/A
Read Original
Everest Ransomware Claims Breach at Nissan, Says 900GB of Data Stolen

Hackread – Cybersecurity News, Data Breaches, AI, and More

The Everest ransomware group has claimed responsibility for a significant data breach at Nissan Motor Corporation, stating that they have stolen 900GB of sensitive internal information. This data reportedly includes various documents and screenshots, which raises concerns about the potential exposure of proprietary information and internal communications. Ransomware attacks like this can have serious implications for companies, including operational disruptions and reputational damage. As attackers continue to target major corporations, it underscores the necessity for robust cybersecurity measures to protect sensitive data. Nissan has not yet publicly confirmed the breach or the specifics of the stolen data, but the incident highlights the ongoing risks companies face from cybercriminals.

Impact: Nissan Motor Corporation, internal data including documents and screenshots
Remediation: N/A
Read Original

Endesa, a major Spanish energy company, has informed its customers of a data breach that has compromised sensitive information. Hackers gained access to the company’s systems, allowing them to view contract-related details, which likely include personal data of customers. This incident raises concerns about the security of customer information in the energy sector, as compromised data can lead to identity theft or fraud. Endesa's Energía XXI operator is actively notifying affected individuals, emphasizing the need for vigilance among customers regarding their personal information. This breach serves as a reminder of the ongoing risks companies face from cyberattacks and the importance of robust security measures to protect customer data.

Impact: Customer personal information and contract-related details
Remediation: Customers are advised to monitor their accounts and report any suspicious activity.
Read Original

Recent research has identified two separate campaigns that targeted public large language model (LLM) endpoints. In total, there were 91,403 sessions aimed at exploiting these services, with attackers looking to uncover leaks in how organizations utilize AI. This activity indicates a growing interest in mapping vulnerabilities associated with AI technologies. Companies using exposed LLM services should be particularly vigilant, as the findings suggest that their AI systems could be at risk for data leaks or other security issues. The targeting of these services raises concerns about the broader implications for organizations relying on AI, emphasizing the need for enhanced security measures.

Impact: Public large language model (LLM) endpoints
Remediation: Organizations should secure their LLM endpoints, implement access controls, and monitor for unusual activity on their AI services.
Read Original

Law enforcement agencies have successfully dismantled the Black Axe network, a significant criminal organization with roots in Nigeria and around 30,000 members worldwide. This group is infamous for a range of serious crimes, including human trafficking, armed robbery, and particularly advanced online fraud schemes. The operation marks a major step in combating organized crime that exploits digital platforms for illicit activities. The impact of this crackdown could disrupt many ongoing fraudulent operations and potentially protect countless victims from scams. Authorities are emphasizing the importance of international cooperation in addressing such complex criminal networks.

Impact: Black Axe network and its members
Remediation: N/A
Read Original

Instagram recently addressed a vulnerability that allowed unauthorized third parties to send password reset emails to users. This issue raised concerns about user security and the potential for unauthorized access to accounts, which could lead to data breaches or identity theft. The platform has confirmed that they have fixed the flaw, but the incident highlights ongoing risks associated with account management and security on social media. Users are urged to remain vigilant and consider changing their passwords regularly to enhance their security. This incident serves as a reminder of the importance of robust security measures in protecting personal information online.

Impact: Instagram accounts
Remediation: Vulnerability patched by Instagram; users should change passwords as a precaution.
Read Original

A significant security vulnerability, known as 'Ni8mare', has been discovered affecting nearly 60,000 instances of n8n, an open-source workflow automation tool. This flaw is classified as maximum severity, meaning it poses a serious risk to users who have not yet applied the necessary patches. The vulnerability could potentially allow attackers to exploit exposed instances, leading to unauthorized access or data breaches. As of now, many users remain unprotected, which raises concerns about the security of their automated workflows and sensitive data. It’s crucial for n8n users to address this issue immediately to prevent possible exploitation.

Impact: n8n instances
Remediation: Users should apply the latest patches provided by n8n to secure their instances against the Ni8mare vulnerability.
Read Original

APT28, a Russian cyber espionage group, has been observed targeting entities involved in energy research and defense collaboration. The group has employed tactics that involve impersonating well-known webmail and VPN services, including Microsoft OWA, Google, and Sophos VPN portals, to deceive users into revealing sensitive information. This attack is significant as it aims to infiltrate organizations that play a critical role in energy security and defense, potentially leading to the theft of valuable research and intelligence. The ongoing nature of these attacks poses a serious risk to national security and the integrity of the affected sectors, highlighting the need for organizations to enhance their cybersecurity measures. Users should be cautious and verify the authenticity of services before entering any sensitive information.

Impact: Microsoft OWA, Google services, Sophos VPN
Remediation: Organizations should implement multi-factor authentication, educate users on recognizing phishing attempts, and ensure that all software is up to date with the latest security patches.
Read Original

Europol, in collaboration with Spanish police and Bavarian authorities, has arrested 34 individuals suspected of being part of the Black Axe criminal network, a group known for its involvement in various forms of organized crime, including cybercrime. Most of the arrests took place in Seville, Spain, highlighting the international effort to dismantle this network. The operation underscores the ongoing battle against organized crime in Europe, as law enforcement agencies work together to combat illicit activities that often extend beyond national borders. The arrests could disrupt the operations of Black Axe, which has been linked to numerous criminal activities, including fraud and human trafficking. This crackdown is a significant step in addressing the broader issues tied to organized crime and its impact on communities across Europe.

Impact: N/A
Remediation: N/A
Read Original
New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A new scam known as OPCOPRO is using artificial intelligence and fake WhatsApp groups to deceive victims into providing personal information. This scheme operates by creating a false environment reminiscent of 'The Truman Show', where unsuspecting individuals are lured into giving their IDs through fake Know Your Customer (KYC) processes and investment opportunities. The scam exploits the trust users place in social media platforms and messaging apps, making it easier for attackers to manipulate potential victims. As this type of fraudulent activity becomes more sophisticated, it raises serious concerns about privacy and the security of personal data. Victims of such scams can face identity theft and financial loss, highlighting the need for increased awareness and caution when sharing personal information online.

Impact: WhatsApp, KYC processes, investment platforms
Remediation: Users should be wary of unsolicited messages and verify the legitimacy of any requests for personal information. It's advisable to use official channels for financial transactions and to report suspicious activities to the relevant platforms.
Read Original

Threat intelligence experts have issued a warning that cybercriminals are actively seeking out misconfigured proxy servers to exploit access to application programming interfaces (APIs) used by various large language models (LLMs). This tactic allows attackers to manipulate these models for malicious purposes, potentially leading to unauthorized data access or the generation of harmful content. Organizations that utilize LLMs need to ensure their proxy servers are correctly configured to prevent exploitation. If left unchecked, these vulnerabilities could allow attackers to compromise sensitive information or disrupt services. It's crucial for companies to take proactive measures to secure their systems against this emerging threat.

Impact: Large language models (LLMs) and their APIs, misconfigured proxy servers.
Remediation: Ensure proper configuration of proxy servers to restrict unauthorized access to APIs.
Read Original
PreviousPage 49 of 101Next