Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

CISA has issued a warning that the 'Copy Fail' vulnerability in Linux systems is being actively exploited by attackers. This flaw was disclosed just one day prior by researchers from Theori, who also released a proof-of-concept exploit. The vulnerability allows attackers to gain root access to compromised Linux systems, putting a wide range of users and organizations at risk. System administrators and users of affected Linux distributions need to take immediate action to secure their systems against potential exploits. The rapid exploitation following the disclosure highlights the urgency for organizations to patch their systems as soon as possible.

Impact: Linux systems vulnerable to the 'Copy Fail' flaw, specifically those versions that allow for root access exploitation.
Remediation: System administrators should apply available patches for their Linux distributions or implement security configurations to mitigate the risk of exploitation. It is advisable to monitor system logs for any unusual activity and consider disabling features that may be exploited until patches are applied.
Read Original

Microsoft has acknowledged that the April 2026 security updates for Windows are causing issues with third-party backup applications that rely on the psmounterex.sys driver. This problem is affecting various backup solutions, preventing users from successfully backing up their data. The situation is significant as it could lead to data loss for individuals and businesses that depend on these backup tools for data protection. Microsoft has not yet released a specific fix or workaround for this issue, leaving users in a precarious position. Companies and users are advised to monitor for updates from Microsoft regarding this ongoing issue.

Impact: Third-party backup applications using psmounterex.sys driver
Remediation: N/A
Read Original

Researchers have identified a new phishing technique that exploits Amazon's Simple Email Service (SES) to send fraudulent emails that appear legitimate. By using this widely trusted cloud email service, attackers can bypass traditional email security measures. Victims may struggle to distinguish these phishing emails from real communications, making them more susceptible to scams. The implications are significant, as this method could lead to increased identity theft and financial loss for individuals and organizations alike. Users are advised to be vigilant and verify the authenticity of unexpected emails, especially those requesting sensitive information or prompting urgent actions.

Impact: Amazon Simple Email Service (SES), email communication systems
Remediation: Users should verify email sources and avoid providing sensitive information in response to unexpected requests. Implementing additional email filtering and security measures could also help mitigate risks.
Read Original

The article discusses the growing importance of data centers as critical infrastructure in today's digital economy, particularly due to the rising reliance on artificial intelligence. As businesses, supply chains, and national security increasingly depend on cloud services, data centers have become attractive targets for cyberattacks. The piece emphasizes that protecting these facilities is essential not just for individual companies but also for national security. It suggests that without proper safeguards, disruptions to data centers could have widespread repercussions, affecting numerous sectors and services that rely on cloud computing. The call to recognize data centers as critical infrastructure underscores the need for enhanced security measures to fend off potential threats.

Impact: Data centers, cloud services
Remediation: Implement enhanced security protocols, conduct regular vulnerability assessments, and establish incident response plans.
Read Original

The UK’s National Cyber Security Centre (NCSC) has issued a warning that advancements in artificial intelligence are leading to faster discovery of software vulnerabilities. This acceleration could result in a surge of urgent software updates, often referred to as a 'patch wave', to address these newly identified flaws. CTO Ollie Whitehouse cautioned that this trend increases the risk of large-scale exploitation by skilled attackers who could take advantage of unpatched vulnerabilities. This situation places pressure on software vendors to quickly develop and deploy fixes, highlighting the need for organizations to remain vigilant and prompt in their patching efforts. As the technology continues to evolve, the implications for cybersecurity could be significant, affecting a wide range of software products and systems across various industries.

Impact: N/A
Remediation: Organizations should prioritize timely software updates and patches as they become available, and maintain robust monitoring of their systems for vulnerabilities.
Read Original

The article discusses the challenges organizations face in transitioning to post-quantum cryptography while managing threats posed by artificial intelligence. Experts like Bobby Ford and HD Moore emphasize that traditional security measures may not suffice against AI-driven attacks, which are becoming more sophisticated and prevalent. Companies and institutions must adapt their defenses to counter these emerging risks effectively. The piece also touches on the need for collaboration among cybersecurity professionals to share knowledge and strategies in this evolving landscape. This is particularly urgent as the timeline for quantum computing advancements accelerates, potentially rendering current encryption methods obsolete.

Impact: Post-quantum cryptography systems, AI-driven security tools
Remediation: Organizations should begin adopting post-quantum cryptographic methods and enhance AI defenses.
Read Original

OpenAI is planning to broaden its Trusted Access for Cyber program, which is designed to assist cyber defenders across various government levels, including federal, state, and local agencies. This initiative aims to enhance the cybersecurity capabilities of these agencies, helping them better protect against cyber threats. By extending its program, OpenAI seeks to provide government entities with advanced tools and resources to strengthen their defenses. This move comes as cyber threats continue to evolve, underscoring the need for robust support for those tasked with safeguarding public information and infrastructure. The collaboration between tech companies like OpenAI and government bodies could lead to improved security measures that benefit all citizens.

Impact: N/A
Remediation: N/A
Read Original

A major international operation has led to the arrest of at least 276 individuals involved in cryptocurrency investment scams that targeted American citizens. The crackdown was spearheaded by Dubai Police, in collaboration with the U.S. Federal authorities, and resulted in the closure of nine scam centers. These operations had reportedly caused millions of dollars in losses to unsuspecting investors. This coordinated effort underscores the growing issue of cryptocurrency fraud, which has become increasingly prevalent as more people engage in digital investments. The significant amount seized, totaling $701 million, indicates the scale of these scams and the need for ongoing vigilance in the crypto space.

Impact: Cryptocurrency investment scams
Remediation: Increased awareness and vigilance against cryptocurrency scams; reporting suspicious investment opportunities to authorities.
Read Original

CrowdStrike recently conducted technical risk assessments that revealed common exposure patterns among various organizations. Their findings suggest that many companies share similar vulnerabilities, which could be exploited by cyber attackers. This information is crucial for businesses to understand where they may be at risk and to take proactive steps to secure their systems. By identifying these patterns, CrowdStrike aims to help organizations bolster their defenses and minimize the likelihood of a successful cyber attack. The assessments encourage companies to assess their security measures and address any weaknesses found.

Impact: N/A
Remediation: Companies should assess their security measures and address identified vulnerabilities.
Read Original

Instructure, an educational technology company, has confirmed that it suffered a data breach after a cyberattack. The ShinyHunters group, known for its extortion tactics, claims responsibility for the attack. Users of Instructure's platforms, which include tools like Canvas, may have had their personal data compromised. This incident raises concerns about the security of educational technologies and the potential risks to students and educators. As cyberattacks on educational institutions become more frequent, stakeholders need to ensure that proper security measures are in place to protect sensitive information.

Impact: Instructure's Canvas platform and potentially other educational tools
Remediation: Users should change their passwords and enable two-factor authentication where possible. Instructure is likely to provide further guidance on securing accounts.
Read Original

In April 2026, Sistemi Informativi, an IBM Italy subsidiary responsible for IT infrastructure management for various public and private institutions, suffered a significant breach. This incident is believed to be linked to the Chinese cyber operation known as Salt Typhoon. The breach raises alarms about the vulnerability of European digital defenses, especially as it targets a company managing critical infrastructure. The attack underscores the ongoing risks posed by state-sponsored cyber activities and highlights the need for enhanced cybersecurity measures across Europe. Organizations that rely on Sistemi Informativi for IT services may face increased risks as a result of this incident, prompting a review of their security protocols and defenses.

Impact: Sistemi Informativi (IBM Italy), public and private institutions relying on IT infrastructure management services.
Remediation: Organizations should review and strengthen their cybersecurity measures, particularly those relying on Sistemi Informativi for services.
Read Original
Paying Ransom Won’t Help as VECT 2.0 Ransomware Destroys Data Irreversibly

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

VECT 2.0 ransomware is a new and dangerous strain that has been discovered to have serious flaws that can irreversibly destroy files. Victims of this ransomware will find that paying the ransom is futile, as the data is lost permanently, making recovery impossible. This situation poses a significant risk to individuals and organizations worldwide, as it undermines the traditional hope of recovering data through ransom payments. The emergence of VECT 2.0 highlights the evolving tactics of cybercriminals and the need for better preventive measures. Users and organizations are urged to strengthen their cybersecurity defenses to avoid falling victim to this destructive ransomware.

Impact: N/A
Remediation: Users should implement strong data backup solutions and maintain updated antivirus software to protect against such threats.
Read Original

Recent research has revealed that scammers are exploiting Telegram's Mini App feature to conduct crypto scams and distribute Android malware. These operations involve impersonating reputable brands to trick users into providing personal information or investing in fraudulent schemes. The use of Telegram's platform allows these scams to reach a wide audience, putting many users at risk of financial loss and malware infections. This situation raises concerns about the security measures in place on social media platforms and highlights the need for users to be cautious when engaging with unfamiliar applications or links. Overall, this incident serves as a reminder for users to verify the legitimacy of offers and be vigilant against potential scams online.

Impact: Telegram Mini Apps, Android devices
Remediation: Users should avoid interacting with unknown Mini Apps on Telegram, verify the legitimacy of brands before engaging, and ensure their devices have updated security software.
Read Original

In a recent development, two U.S. cybersecurity experts have been sentenced for their involvement in a ransomware case. Their actions contributed to the growing issue of ransomware attacks that have been plaguing various sectors, highlighting the ongoing struggles law enforcement faces in combating cybercrime. A third individual connected to the case is awaiting a ruling scheduled for July. Additionally, Trellix has disclosed a breach that raises concerns about the security of its systems, though specific details about the breach have not been shared. These incidents serve as a reminder of the persistent threats in the cybersecurity landscape and the need for organizations to bolster their defenses against such attacks.

Impact: Trellix systems
Remediation: N/A
Read Original

Trellix has reported a security breach involving unauthorized access to a portion of its source code repository. The company has stated that there are no indications of the compromised code being misused. In response to the incident, Trellix quickly initiated an investigation with forensic experts and has notified law enforcement to assist in the matter. While the breach raises concerns about the security of the company’s intellectual property, Trellix assures that no customer data has been affected. This incident serves as a reminder for companies to continually monitor and secure their source code environments to prevent potential exploitation in the future.

Impact: Trellix source code repository
Remediation: N/A
Read Original
PreviousPage 5 of 187Next