The Illinois Department of Human Services (IDHS) recently reported a data breach affecting nearly 700,000 individuals. The breach resulted from misconfigured privacy settings that exposed sensitive personal and health information. IDHS became aware of the issue on September 22, 2025, when internal maps meant for internal use were inadvertently made accessible. This incident raises concerns about how government agencies handle sensitive data and the potential risks to affected residents, who may now face increased vulnerability to identity theft or other forms of misuse of their information. The IDHS is likely to face scrutiny over its data protection practices and the measures it will take to prevent future breaches.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
SCM feed for Latest
The FBI has reported that a North Korean hacking group known as Kimsuky is employing a tactic called 'quishing' to steal credentials from mobile devices. This technique involves using QR codes that, when scanned, lead users to malicious websites designed to harvest personal information. Kimsuky has targeted various individuals, particularly those in sectors related to national security and foreign policy. This development is concerning as it demonstrates an evolving approach to cyberattacks that exploits the increasing use of QR codes in everyday transactions. Users need to be cautious about scanning QR codes, especially from untrusted sources, to protect their personal data.
SCM feed for Latest
Researchers from GreyNoise have reported that their honeypots recorded over 80,000 sessions targeting large language model (LLM) endpoints in just 11 days. These sessions indicate that threat actors are actively scanning for vulnerabilities in LLM infrastructure, which could lead to potential exploitation. The spike in scanning activity raises concerns about the security of systems that utilize LLM technology, as attackers may be seeking to exploit weaknesses for malicious purposes. Companies and organizations using LLMs need to be vigilant and ensure their systems are secure against such probing activities. This incident highlights the growing interest from cybercriminals in exploiting AI technologies.
The recent death of Aldrich Ames, a former CIA officer who turned spy for the Soviet Union, serves as a stark reminder of the dangers posed by insider threats in organizations. Ames’ actions, which led to the exposure and execution of several American agents, demonstrate how critical it is for organizations, especially in sensitive sectors like intelligence, to monitor employee behaviors and attitudes. By understanding the signs of stress and potential discontent among employees, companies can better anticipate and manage risks from insiders. This incident underscores the importance of fostering a workplace environment that addresses employee concerns before they escalate into serious security breaches. Recognizing and addressing potential insider threats can help protect sensitive information and maintain organizational integrity.
BleepingComputer
Hackers are actively exploiting misconfigured proxy servers to gain unauthorized access to commercial large language model (LLM) services. Researchers have identified that these attackers are specifically searching for weak points in proxy configurations, which can inadvertently grant them access to paid services that are otherwise protected. This situation raises concerns for companies utilizing LLMs, as it could lead to unauthorized data access and financial losses. Organizations need to ensure their proxy servers are properly configured and secured to prevent these types of attacks. The implications of such breaches could affect not only the companies involved but also their customers, potentially exposing sensitive information and undermining trust in these technologies.
SCM feed for Latest
Coolify, a popular open-source self-hosting platform, has reported 11 serious security vulnerabilities that could be exploited by attackers. These flaws could allow unauthorized users to bypass authentication, execute remote code, and potentially take control of affected servers. This is a significant concern for anyone using Coolify for their hosting needs, as it puts sensitive data and server integrity at risk. The vulnerabilities highlight the importance of regular security assessments and timely updates in open-source software. Users are advised to monitor the situation closely and apply any available patches as soon as they are released.
SCM feed for Latest
The OWASP Foundation has officially added software supply chain threats to its Top 10 list of cybersecurity risks, reflecting the growing concern over vulnerabilities in third-party software components. This change comes after a series of high-profile incidents where attackers exploited weaknesses in software supply chains, affecting numerous organizations across various sectors. As more companies rely on third-party libraries and open-source components, the potential for malicious code to be introduced into software products increases. This shift in focus emphasizes the need for greater transparency in software development and deployment practices. Companies are urged to take proactive measures to secure their supply chains and ensure that the software they use is free from vulnerabilities.
Security Affairs
Trend Micro has addressed three vulnerabilities in its Apex Central management console that could potentially allow attackers to execute remote code or launch denial-of-service attacks. These flaws, identified as CVE-2025-69258, CVE-2025-69259, and CVE-2025-69260, were discovered by security researchers from Tenable in August 2025. The vulnerabilities were made public after Tenable released proof-of-concept code, which could enable malicious actors to exploit the weaknesses. Organizations using Apex Central should apply the patches provided by Trend Micro to prevent potential attacks. It is crucial for users to ensure their systems are updated to mitigate any risks associated with these vulnerabilities.
SCM feed for Latest
Cisco has released updates to address a medium-severity vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector, identified as CVE-2026-20029. This flaw was brought to light following the publication of a proof-of-concept exploit, raising concerns about its potential exploitation. Organizations using these Cisco products are at risk, as the vulnerability could allow unauthorized access or manipulation of identity services. It’s crucial for affected users to apply the updates promptly to safeguard their networks and data from possible attacks. The quick response from Cisco highlights the ongoing need for vigilance in cybersecurity practices.
In 2025, transactions involving cryptocurrencies linked to cybercriminal activities soared, primarily driven by actions from countries under sanctions, notably Russia and Iran. This surge in illicit crypto transactions has raised concerns about the role of nation-states in facilitating cybercrime, as they increasingly turn to digital currencies to bypass financial restrictions. The billions generated through these activities not only enrich criminal organizations but also pose significant challenges for law enforcement and regulatory bodies trying to combat financial crime. As these countries engage more in the crypto economy, the implications for global security and financial systems could be profound, complicating efforts to track and mitigate cyber threats. This trend underscores the need for enhanced monitoring and regulatory measures in the cryptocurrency space to prevent misuse.
Hackread – Cybersecurity News, Data Breaches, AI, and More
A hacker is claiming to sell nearly 40 million user records from Condé Nast, the parent company of several well-known brands, after previously leaking data from Wired.com. This incident raises significant concerns about the security of user information across multiple major brands that fall under Condé Nast’s umbrella, including Vogue, The New Yorker, and Vanity Fair. The hacker's actions suggest a serious breach of data protection protocols, putting many users at risk of identity theft and other cybercrimes. The sale of such a vast database highlights the ongoing challenges companies face in safeguarding customer data. As the situation develops, it’s crucial for affected users to monitor their accounts for any suspicious activity and for companies to enhance their security measures to prevent future breaches.
The Illinois Department of Human Services (IDHS) has reported a significant data breach that exposed the personal and health information of nearly 700,000 residents. This incident occurred due to incorrect privacy settings, which inadvertently made sensitive data accessible. Affected individuals may have had their names, addresses, and health records compromised, raising concerns about identity theft and privacy violations. It is crucial for those impacted to monitor their accounts and consider taking steps to protect their information. This breach underscores the importance of proper data management and security protocols within government agencies.
The article discusses the limitations of using click rates as a measure of email security effectiveness. It argues that focusing solely on how many users click on phishing links overlooks a significant risk: what happens after an attacker gains access to an email account. Material Security emphasizes the importance of containment strategies and understanding the potential impact of a compromised mailbox. By shifting the focus from click rates to post-compromise scenarios, organizations can better protect sensitive information and reduce the overall risk of a security breach. This perspective is crucial for companies looking to enhance their email security measures and safeguard against evolving threats.
Trend Micro has released patches for a significant code execution vulnerability in its Apex Central product. This flaw could allow attackers to execute arbitrary code, putting systems at risk. Tenable has since provided proof-of-concept code and technical details, which could assist malicious actors in exploiting the vulnerability if users do not update their systems promptly. Companies using Apex Central need to apply the patches to protect their networks from potential attacks. The urgency of this update is underscored by the fact that vulnerabilities of this nature can lead to serious breaches if left unaddressed.
An Illinois man has been charged with running a phishing scheme that targeted nearly 600 women to hack their Snapchat accounts. He allegedly stole private photos, including nude images, and sold them online. This operation raises serious concerns about online privacy and the lengths to which hackers will go to exploit individuals for personal gain. The victims, primarily women, faced not only the invasion of their privacy but also the potential for further exploitation of their images. This case underscores the ongoing risks of phishing attacks, particularly on social media platforms, where users may not be fully aware of the security vulnerabilities.