Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Threat intelligence experts have issued a warning that cybercriminals are actively seeking out misconfigured proxy servers to exploit access to application programming interfaces (APIs) used by various large language models (LLMs). This tactic allows attackers to manipulate these models for malicious purposes, potentially leading to unauthorized data access or the generation of harmful content. Organizations that utilize LLMs need to ensure their proxy servers are correctly configured to prevent exploitation. If left unchecked, these vulnerabilities could allow attackers to compromise sensitive information or disrupt services. It's crucial for companies to take proactive measures to secure their systems against this emerging threat.

Impact: Large language models (LLMs) and their APIs, misconfigured proxy servers.
Remediation: Ensure proper configuration of proxy servers to restrict unauthorized access to APIs.
Read Original

The Spanish National Police, in collaboration with Germany's Bavarian State Criminal Police and Europol, has dismantled a cyber fraud network linked to the notorious group Black Axe. This organization, which originated in Nigeria, is believed to have caused losses exceeding €5.93 million through various cyber-enabled fraud activities. The operation underscores the significant international effort required to combat organized cybercrime, which spans multiple countries. By targeting such networks, law enforcement aims to disrupt their operations and protect potential victims from future scams. The dismantling of Black Axe serves as a crucial step in addressing the growing threat of cyber fraud affecting individuals and businesses alike.

Impact: N/A
Remediation: N/A
Read Original

According to TRM Labs, illegal cryptocurrency transactions surged to $158 billion in 2025. This marked a significant increase in illicit flows into digital wallets, raising concerns among regulators and law enforcement agencies. The rise in illegal activities can be attributed to factors such as the growing sophistication of cybercriminals and the increasing use of cryptocurrencies for money laundering and fraud. This trend not only poses challenges for tracking and regulating cryptocurrency transactions but also amplifies risks for legitimate users who may inadvertently get caught up in these activities. The report serves as a warning sign for authorities to enhance their oversight and for users to be cautious about their cryptocurrency transactions.

Impact: Cryptocurrencies, digital wallets
Remediation: Regulatory measures and enhanced tracking of cryptocurrency transactions are suggested.
Read Original

A database containing information on over 300,000 users from BreachForums, a notorious hacking forum, has been leaked online. This breach exposes usernames, email addresses, and other personal data, putting users at risk of phishing attacks and identity theft. BreachForums has been a hub for cybercriminals, making this leak particularly concerning for those involved in illegal activities, as their identities may now be compromised. The leak not only affects the forum's users but also raises broader questions about the security of online communities where sensitive information is shared. Users are urged to change their passwords and be vigilant about any suspicious activity related to their accounts.

Impact: BreachForums user data, including usernames and email addresses
Remediation: Users should change their passwords and monitor accounts for suspicious activity
Read Original

APT28, a cyberespionage group linked to Russia, has been targeting organizations in Turkey, Europe, North Macedonia, and Uzbekistan with credential-harvesting attacks from February to September 2025. This group, also known as Fancy Bear, has focused on personnel involved in energy, nuclear sectors, and policy-making. The attacks have included attempts to steal login credentials from staff at Turkish energy and nuclear agencies, as well as from European think tanks. Such activities pose significant risks to national security and critical infrastructure, highlighting the ongoing threat posed by state-sponsored cyber actors. Organizations in the targeted regions need to enhance their cybersecurity measures to protect sensitive information from these sophisticated attacks.

Impact: Turkish energy and nuclear agencies, European think tanks, organizations in North Macedonia and Uzbekistan
Remediation: Organizations should implement strong authentication measures, conduct regular security training for staff, and monitor for unusual account activity.
Read Original

Cybersecurity researchers have identified two service providers that support online criminal networks involved in pig butchering fraud, a type of scam where victims are tricked into investing in fake businesses. This operation has been active since at least 2016, primarily involving Chinese-speaking criminal groups that have established large-scale scam centers in Southeast Asia. These centers are designed specifically for fraudulent investment schemes, allowing scammers to exploit unsuspecting users. The findings reveal a significant infrastructure that enables these scams, raising concerns about the growing sophistication of online fraud. As these criminal networks continue to operate, it becomes increasingly important for users to be vigilant and for authorities to take action against these service providers.

Impact: N/A
Remediation: Users should be cautious of unsolicited investment offers and verify the legitimacy of any investment opportunity before committing funds.
Read Original

In an interview, Hans Quivooij, the Chief Information Security Officer at Damen Shipyards Group, discusses the unique cybersecurity challenges faced by shipyards that operate on a project basis. He emphasizes that the combination of long-term industrial equipment with short-term projects and rotating contractors complicates access control and increases the threat surface. Quivooij points out that integrating IT and operational technology (OT) systems can introduce additional risks, especially in legacy environments that may lack adequate visibility. This situation is critical for shipyards as it affects their ability to secure sensitive operational data and maintain safety standards. As the shipbuilding industry evolves, understanding these complexities is essential for protecting against potential cyber threats.

Impact: Shipyards, operational technology (OT), industrial control systems (ICS)
Remediation: Implement robust access control measures, enhance visibility in legacy environments, ensure proper integration of IT and OT systems
Read Original

Instagram has recently addressed a vulnerability that enabled attackers to send mass password reset requests, which raised concerns about a potential data leak affecting over 17 million accounts. Although the company has denied that a data breach occurred, the incident has drawn attention to the security of user information on the platform. Users may have been at risk of having their account details scraped and shared online. This situation is particularly concerning as it highlights how easily attackers can exploit weaknesses in security systems to potentially access sensitive information. Instagram's prompt action to fix the issue is crucial, but it also serves as a reminder for users to secure their accounts with strong passwords and two-factor authentication.

Impact: Instagram accounts
Remediation: Instagram has fixed the bug that allowed mass password reset requests.
Read Original

The California Privacy Protection Agency (CalPrivacy) has taken action against a marketing firm, Datamasters, for selling the health and personal data of millions of individuals without the necessary registration as a data broker. This violation raises serious concerns about privacy and data protection, particularly given the sensitive nature of health information. The agency's enforcement highlights the ongoing issues around data brokers and the lack of regulation in how personal data is handled. This incident affects millions of consumers whose data was sold without their consent, emphasizing the need for stricter oversight in the data brokerage industry. The ruling serves as a reminder for companies to comply with privacy laws to safeguard user data.

Impact: Health and personal data of millions of users
Remediation: N/A
Read Original
Europol Raids Disrupt Black Axe Cybercrime Ring in Spain

Hackread – Cybersecurity News, Data Breaches, AI, and More

In a significant law enforcement operation, Europol announced the arrest of 34 members of the Black Axe gang in Spain. This criminal group has been implicated in extensive online romance scams and email fraud schemes, which have reportedly defrauded victims of millions of Euros. The arrests are part of a broader effort to combat organized cybercrime that targets individuals through deceptive online tactics. The operation not only disrupts the gang's activities but also sends a strong message about international cooperation in tackling cybercriminals. Authorities emphasized the importance of vigilance among internet users, especially those engaging in online dating, to avoid falling victim to such scams.

Impact: Online romance scams, email fraud
Remediation: Users are advised to be cautious when engaging in online relationships and to report any suspicious activity to authorities.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter covers a range of malware-related issues affecting users and organizations globally. One notable threat is the VVS Discord Stealer, which employs Pyarmor to obfuscate its code and evade detection. Additionally, researchers are raising alarms about malicious NPM packages that deliver the NodeCordRAT, a remote access tool that can compromise systems. The newsletter also discusses a new campaign linked to the Astaroth worm, which is being spread through WhatsApp in Brazil. These findings highlight the ongoing challenges in malware detection and the evolving tactics used by cybercriminals, putting many users at risk.

Impact: VVS Discord, NodeCordRAT, Astaroth worm, NPM packages, WhatsApp
Remediation: Users should be cautious of suspicious downloads and update their security software to the latest versions. It's also advised to monitor NPM packages for any known vulnerabilities and to avoid clicking on unverified links in messaging apps.
Read Original

A significant data breach has exposed the personal information of 17.5 million Instagram users. The breach is attributed to a North Korea-linked hacking group known as Kimsuky, which has been involved in various cyberattacks, including a new tactic called 'quishing.' This method combines phishing with QR codes, making it easier for attackers to deceive victims into revealing sensitive information. The scale of the breach raises concerns about user privacy and security, particularly for those whose data has been compromised. Users are urged to change their passwords and enable two-factor authentication to enhance their security.

Impact: Instagram users, specifically 17.5 million accounts
Remediation: Users should change their passwords and enable two-factor authentication.
Read Original

BreachForums, a well-known hacking forum, has experienced a significant data breach, resulting in the leak of its user database containing information from approximately 324,000 accounts. This breach raises concerns for users whose personal data may now be exposed to cybercriminals. The leaked data could potentially include usernames, emails, and passwords, making it easier for attackers to exploit affected users. Given the nature of BreachForums, which is often used for illicit activities, this incident highlights the ongoing risks associated with participating in such online communities. Users are urged to take immediate action to secure their accounts and monitor for any suspicious activity.

Impact: BreachForums user accounts, including usernames, emails, and passwords.
Remediation: Affected users should change their passwords immediately and enable two-factor authentication where possible. Monitoring for unusual account activity is also recommended.
Read Original

Spanish authorities have arrested 34 suspects believed to be part of a criminal network associated with the Black Axe group, which has been implicated in various cyber fraud activities across Europe. This group is notorious for its involvement in organized cybercrime, including scams that target individuals and businesses. The arrests are part of a broader effort to dismantle networks responsible for significant financial losses due to online fraud. The implications of this operation are substantial, as it aims to disrupt the operations of a group that has been linked to numerous cybercrime incidents affecting multiple countries. This action not only showcases the commitment of law enforcement to combat cybercrime but also serves as a warning to other criminal organizations operating online.

Impact: N/A
Remediation: N/A
Read Original

MuddyWater, an Iranian hacking group, has launched a spear-phishing campaign targeting various sectors in the Middle East, including diplomatic, maritime, financial, and telecom organizations. The attackers are using malicious Word documents that employ icon spoofing to trick users into activating a Rust-based remote access tool (RAT) known as RustyWater. This malware allows for asynchronous command and control, registry persistence, and anti-analysis capabilities, making it difficult for victims to detect and remove. The implications of this campaign are significant, as it could compromise sensitive information and disrupt critical infrastructure in the affected sectors. Organizations in these areas should be vigilant and enhance their cybersecurity measures to protect against such targeted attacks.

Impact: Diplomatic, maritime, financial, and telecom sectors in the Middle East
Remediation: Organizations should implement strong email filtering, conduct security awareness training for employees, and ensure that all systems are up to date with the latest security patches.
Read Original
PreviousPage 50 of 101Next