Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The Illinois Department of Human Services (IDHS) recently reported a data breach affecting nearly 700,000 individuals. The breach resulted from misconfigured privacy settings that exposed sensitive personal and health information. IDHS became aware of the issue on September 22, 2025, when internal maps meant for internal use were inadvertently made accessible. This incident raises concerns about how government agencies handle sensitive data and the potential risks to affected residents, who may now face increased vulnerability to identity theft or other forms of misuse of their information. The IDHS is likely to face scrutiny over its data protection practices and the measures it will take to prevent future breaches.

Impact: Personal and health data of nearly 700,000 Illinois residents
Remediation: Review and correct privacy settings to ensure sensitive data is properly secured
Read Original

The FBI has reported that a North Korean hacking group known as Kimsuky is employing a tactic called 'quishing' to steal credentials from mobile devices. This technique involves using QR codes that, when scanned, lead users to malicious websites designed to harvest personal information. Kimsuky has targeted various individuals, particularly those in sectors related to national security and foreign policy. This development is concerning as it demonstrates an evolving approach to cyberattacks that exploits the increasing use of QR codes in everyday transactions. Users need to be cautious about scanning QR codes, especially from untrusted sources, to protect their personal data.

Impact: Mobile devices, QR code scanning applications, personal credentials
Remediation: Users should avoid scanning QR codes from unknown sources, verify the legitimacy of codes before scanning, and consider using security software that can detect malicious links.
Read Original

Researchers from GreyNoise have reported that their honeypots recorded over 80,000 sessions targeting large language model (LLM) endpoints in just 11 days. These sessions indicate that threat actors are actively scanning for vulnerabilities in LLM infrastructure, which could lead to potential exploitation. The spike in scanning activity raises concerns about the security of systems that utilize LLM technology, as attackers may be seeking to exploit weaknesses for malicious purposes. Companies and organizations using LLMs need to be vigilant and ensure their systems are secure against such probing activities. This incident highlights the growing interest from cybercriminals in exploiting AI technologies.

Impact: Large Language Models (LLMs) and associated infrastructure
Remediation: Organizations should review their security measures for LLM endpoints, implement rate limiting, and monitor for unusual scanning activity.
Read Original

The recent death of Aldrich Ames, a former CIA officer who turned spy for the Soviet Union, serves as a stark reminder of the dangers posed by insider threats in organizations. Ames’ actions, which led to the exposure and execution of several American agents, demonstrate how critical it is for organizations, especially in sensitive sectors like intelligence, to monitor employee behaviors and attitudes. By understanding the signs of stress and potential discontent among employees, companies can better anticipate and manage risks from insiders. This incident underscores the importance of fostering a workplace environment that addresses employee concerns before they escalate into serious security breaches. Recognizing and addressing potential insider threats can help protect sensitive information and maintain organizational integrity.

Impact: N/A
Remediation: N/A
Read Original

Hackers are actively exploiting misconfigured proxy servers to gain unauthorized access to commercial large language model (LLM) services. Researchers have identified that these attackers are specifically searching for weak points in proxy configurations, which can inadvertently grant them access to paid services that are otherwise protected. This situation raises concerns for companies utilizing LLMs, as it could lead to unauthorized data access and financial losses. Organizations need to ensure their proxy servers are properly configured and secured to prevent these types of attacks. The implications of such breaches could affect not only the companies involved but also their customers, potentially exposing sensitive information and undermining trust in these technologies.

Impact: Commercial large language model services, proxy servers
Remediation: Ensure proper configuration and security of proxy servers
Read Original

Coolify, a popular open-source self-hosting platform, has reported 11 serious security vulnerabilities that could be exploited by attackers. These flaws could allow unauthorized users to bypass authentication, execute remote code, and potentially take control of affected servers. This is a significant concern for anyone using Coolify for their hosting needs, as it puts sensitive data and server integrity at risk. The vulnerabilities highlight the importance of regular security assessments and timely updates in open-source software. Users are advised to monitor the situation closely and apply any available patches as soon as they are released.

Impact: Coolify platform
Remediation: Users should apply patches as they become available and review their security configurations.
Read Original

The OWASP Foundation has officially added software supply chain threats to its Top 10 list of cybersecurity risks, reflecting the growing concern over vulnerabilities in third-party software components. This change comes after a series of high-profile incidents where attackers exploited weaknesses in software supply chains, affecting numerous organizations across various sectors. As more companies rely on third-party libraries and open-source components, the potential for malicious code to be introduced into software products increases. This shift in focus emphasizes the need for greater transparency in software development and deployment practices. Companies are urged to take proactive measures to secure their supply chains and ensure that the software they use is free from vulnerabilities.

Impact: Third-party software components, open-source libraries
Remediation: Companies should implement software composition analysis tools, regularly update dependencies, and establish rigorous security assessments for third-party software.
Read Original

Trend Micro has addressed three vulnerabilities in its Apex Central management console that could potentially allow attackers to execute remote code or launch denial-of-service attacks. These flaws, identified as CVE-2025-69258, CVE-2025-69259, and CVE-2025-69260, were discovered by security researchers from Tenable in August 2025. The vulnerabilities were made public after Tenable released proof-of-concept code, which could enable malicious actors to exploit the weaknesses. Organizations using Apex Central should apply the patches provided by Trend Micro to prevent potential attacks. It is crucial for users to ensure their systems are updated to mitigate any risks associated with these vulnerabilities.

Impact: Trend Micro Apex Central management console (specific versions not mentioned)
Remediation: Trend Micro has released patches for CVE-2025-69258, CVE-2025-69259, and CVE-2025-69260. Users should apply these patches to secure their systems.
Read Original

Cisco has released updates to address a medium-severity vulnerability in its Identity Services Engine (ISE) and ISE Passive Identity Connector, identified as CVE-2026-20029. This flaw was brought to light following the publication of a proof-of-concept exploit, raising concerns about its potential exploitation. Organizations using these Cisco products are at risk, as the vulnerability could allow unauthorized access or manipulation of identity services. It’s crucial for affected users to apply the updates promptly to safeguard their networks and data from possible attacks. The quick response from Cisco highlights the ongoing need for vigilance in cybersecurity practices.

Impact: Cisco Identity Services Engine (ISE), Cisco ISE Passive Identity Connector (ISE-PIC)
Remediation: Apply the latest updates provided by Cisco to fix the CVE-2026-20029 vulnerability.
Read Original

In 2025, transactions involving cryptocurrencies linked to cybercriminal activities soared, primarily driven by actions from countries under sanctions, notably Russia and Iran. This surge in illicit crypto transactions has raised concerns about the role of nation-states in facilitating cybercrime, as they increasingly turn to digital currencies to bypass financial restrictions. The billions generated through these activities not only enrich criminal organizations but also pose significant challenges for law enforcement and regulatory bodies trying to combat financial crime. As these countries engage more in the crypto economy, the implications for global security and financial systems could be profound, complicating efforts to track and mitigate cyber threats. This trend underscores the need for enhanced monitoring and regulatory measures in the cryptocurrency space to prevent misuse.

Impact: Cryptocurrencies, financial systems
Remediation: Enhanced monitoring and regulatory measures in cryptocurrency
Read Original
Hacker Behind Wired.com Leak Now Selling Full 40M Condé Nast Records

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A hacker is claiming to sell nearly 40 million user records from Condé Nast, the parent company of several well-known brands, after previously leaking data from Wired.com. This incident raises significant concerns about the security of user information across multiple major brands that fall under Condé Nast’s umbrella, including Vogue, The New Yorker, and Vanity Fair. The hacker's actions suggest a serious breach of data protection protocols, putting many users at risk of identity theft and other cybercrimes. The sale of such a vast database highlights the ongoing challenges companies face in safeguarding customer data. As the situation develops, it’s crucial for affected users to monitor their accounts for any suspicious activity and for companies to enhance their security measures to prevent future breaches.

Impact: Condé Nast user records, including data from brands like Wired, Vogue, The New Yorker, Vanity Fair
Remediation: Users should monitor their accounts for unusual activity and consider changing passwords. Companies should review security protocols and implement stronger data protection measures.
Read Original

The Illinois Department of Human Services (IDHS) has reported a significant data breach that exposed the personal and health information of nearly 700,000 residents. This incident occurred due to incorrect privacy settings, which inadvertently made sensitive data accessible. Affected individuals may have had their names, addresses, and health records compromised, raising concerns about identity theft and privacy violations. It is crucial for those impacted to monitor their accounts and consider taking steps to protect their information. This breach underscores the importance of proper data management and security protocols within government agencies.

Impact: Personal and health data of Illinois residents
Remediation: Review and correct privacy settings; enhance data security measures
Read Original

The article discusses the limitations of using click rates as a measure of email security effectiveness. It argues that focusing solely on how many users click on phishing links overlooks a significant risk: what happens after an attacker gains access to an email account. Material Security emphasizes the importance of containment strategies and understanding the potential impact of a compromised mailbox. By shifting the focus from click rates to post-compromise scenarios, organizations can better protect sensitive information and reduce the overall risk of a security breach. This perspective is crucial for companies looking to enhance their email security measures and safeguard against evolving threats.

Impact: Email security systems, phishing metrics
Remediation: Implement stronger email authentication protocols, conduct regular security awareness training, and develop incident response plans for compromised accounts.
Read Original

Trend Micro has released patches for a significant code execution vulnerability in its Apex Central product. This flaw could allow attackers to execute arbitrary code, putting systems at risk. Tenable has since provided proof-of-concept code and technical details, which could assist malicious actors in exploiting the vulnerability if users do not update their systems promptly. Companies using Apex Central need to apply the patches to protect their networks from potential attacks. The urgency of this update is underscored by the fact that vulnerabilities of this nature can lead to serious breaches if left unaddressed.

Impact: Apex Central
Remediation: Patches available from Trend Micro for the vulnerabilities in Apex Central.
Read Original

An Illinois man has been charged with running a phishing scheme that targeted nearly 600 women to hack their Snapchat accounts. He allegedly stole private photos, including nude images, and sold them online. This operation raises serious concerns about online privacy and the lengths to which hackers will go to exploit individuals for personal gain. The victims, primarily women, faced not only the invasion of their privacy but also the potential for further exploitation of their images. This case underscores the ongoing risks of phishing attacks, particularly on social media platforms, where users may not be fully aware of the security vulnerabilities.

Impact: Snapchat accounts of nearly 600 women
Remediation: Users should enable two-factor authentication on their accounts and be cautious of phishing attempts, such as unsolicited messages asking for personal information.
Read Original
PreviousPage 51 of 101Next