Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The jsPDF library, widely used for generating PDF documents in JavaScript applications, has a critical vulnerability that allows attackers to access sensitive data from a user's local filesystem. This flaw enables malicious actors to embed local files into generated PDFs, potentially leading to data breaches. Developers using jsPDF in their applications should be particularly vigilant, as this could affect any application relying on this library for PDF generation. The implications are serious, as sensitive information could be easily extracted without user consent. Users of applications built with jsPDF need to be aware of this risk and ensure that they update to the latest version as soon as a fix is available.

Impact: jsPDF library
Remediation: Update to the latest version of jsPDF once a patch is available.
Read Original

A serious vulnerability in n8n, known as Ni8mare (CVE-2026-21858), has been identified, allowing attackers to gain full control over affected instances without any authentication. This flaw has a maximum severity score of 10.0, indicating a high level of risk for users. Researchers from Cyera discovered this vulnerability, raising concerns about the security of workflow automation processes that many organizations rely on. If exploited, this could lead to unauthorized access, data breaches, and significant operational disruptions. Users and companies utilizing n8n should take immediate steps to secure their systems to prevent potential exploitation.

Impact: n8n workflow automation platform, all affected instances without authentication
Remediation: Users should apply any available patches from n8n, review their configurations, and consider implementing additional security measures such as restricting access to instances and monitoring for unusual activity.
Read Original

Logitech's Options+ and G Hub applications for macOS have stopped functioning due to an expired code-signing certificate. This issue means that users are unable to launch these applications on their Apple systems, impacting those who rely on them for device customization and management. The problem arose suddenly, leaving many users without access to essential features. While this isn't a security vulnerability or breach, it does highlight the importance of maintaining valid certificates for software integrity and user access. Logitech will need to address this promptly to restore functionality for affected users.

Impact: Logitech Options+, Logitech G Hub, macOS systems
Remediation: Users should check for updates from Logitech to obtain a renewed code-signing certificate or follow any instructions provided by Logitech for restoring functionality.
Read Original

A serious security flaw known as 'Ni8mare' has been discovered in the N8N workflow automation platform, which could allow attackers to remotely take control of servers running the software. This vulnerability is particularly concerning as it does not require any authentication, making it easier for malicious actors to exploit. Users of N8N should be alarmed, as the flaw affects all locally deployed instances. Companies and individuals using this platform need to prioritize patching their systems to avoid potential breaches. The implications are significant, as a successful attack could lead to unauthorized access to sensitive workflows and data.

Impact: N8N workflow automation platform, locally deployed instances
Remediation: Users should apply available patches from N8N as soon as possible to secure their instances against this vulnerability.
Read Original

Taiwan's National Security Bureau has reported a significant increase in daily cyber intrusion attempts, attributing the surge to what they describe as a Chinese 'cyber army.' The number of attacks rose by 6% in 2025, with the energy and healthcare sectors experiencing the most substantial impacts. This uptick raises concerns about the security of critical infrastructure and sensitive data in Taiwan, especially as these sectors are vital for public welfare and national stability. The situation underscores the ongoing cyber tensions between Taiwan and China, highlighting the need for enhanced cybersecurity measures in the face of persistent threats. Taiwanese authorities are likely to heighten their defenses to safeguard against these intrusions.

Impact: Energy and healthcare sectors in Taiwan
Remediation: Strengthen cybersecurity measures, increase monitoring of critical infrastructure, implement advanced threat detection systems.
Read Original
Lone Hacker Used Infostealers to Access Data at 50 Global Companies

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A recent report from Hudson Rock has revealed that an Iranian hacker, known as Zestix, successfully breached 50 global companies, including Iberia Airlines and Pickett & Associates. The hacker gained access by exploiting stolen passwords and taking advantage of the companies' failure to implement multi-factor authentication (MFA). This incident raises concerns about the security practices of major organizations, especially as Zestix's activities highlight vulnerabilities that could be easily mitigated. The breaches not only compromise sensitive data but also pose a significant risk to the reputation and trustworthiness of the affected companies. Organizations should reassess their security measures to prevent similar attacks in the future.

Impact: Iberia Airlines, Pickett & Associates, and 48 other global companies
Remediation: Companies should implement multi-factor authentication and regularly update password policies to enhance security.
Read Original

Attackers are taking advantage of misconfigured email routing to send phishing emails that appear to come from within an organization. This tactic involves using Platforms as a Service (PhaaS), such as Tycoon2FA, to create these deceptive messages aimed at stealing user credentials. The vulnerability lies in the complex routing scenarios and inadequate spoof protections that companies have in place, making it easier for these phishing attempts to bypass security measures. Organizations need to be vigilant about their email configurations and ensure that their spoof protections are properly set up to prevent these types of attacks. Without proper safeguards, employees may unknowingly provide sensitive information to attackers posing as internal communications.

Impact: Email systems, internal communication platforms
Remediation: Companies should review and correct email routing configurations and enhance spoof protection measures.
Read Original

ownCloud, a popular file-sharing platform, has issued a warning to its users about potential credential theft that could lead to unauthorized data access. The company emphasized the importance of enabling multi-factor authentication (MFA) as a crucial step to protect accounts from attackers who may have obtained user credentials. This alert comes amid reports of compromised accounts, which can lead to significant data breaches if not addressed promptly. Users are urged to take immediate action to secure their accounts, as the risk of exploitation remains high. This incident serves as a reminder of the vulnerabilities associated with relying solely on passwords for account security.

Impact: ownCloud file-sharing platform
Remediation: Users should enable multi-factor authentication (MFA) on their accounts.
Read Original
Why Legitimate Bot Traffic Is a Growing Security Blind Spot

Hackread – Cybersecurity News, Data Breaches, AI, and More

Security teams have made significant advancements in identifying and blocking harmful bots, but a new concern is emerging: legitimate bot traffic. This type of traffic, often used for various business functions, is becoming a security blind spot. While these bots can enhance user experience, they also pose risks as they can be exploited by attackers to bypass security measures. Companies may inadvertently allow these bots to operate unchecked, leaving systems vulnerable to abuse. As organizations increasingly rely on automation and bots, it's crucial for them to improve their detection capabilities to differentiate between helpful and harmful bot activity.

Impact: N/A
Remediation: Companies should enhance their bot detection mechanisms and implement stricter monitoring protocols.
Read Original

The article discusses the potential use of cyberattacks as part of a military operation in Venezuela, referencing comments made by former President Trump about the ability to disrupt the power grid in Caracas. While the specifics of any cyber operations remain unclear, the notion that cyber capabilities could be employed in military actions raises significant concerns. This could affect not only Venezuela but also signal a shift in how nations might integrate cyber warfare into conventional military strategies. The implications of such actions could lead to increased tensions and instability in the region, as well as a reevaluation of cybersecurity measures by nations monitoring these developments.

Impact: N/A
Remediation: N/A
Read Original

In 2025, Taiwan reported an alarming increase in cyber intrusion attempts on its critical infrastructure, averaging 2.63 million per day, primarily attributed to Chinese attackers. This surge has raised significant concerns about the security of Taiwan's energy sector and other vital systems, as such attacks could lead to disruptions in services and pose risks to national security. The frequency and intensity of these cyber intrusions suggest a coordinated effort to undermine Taiwan's infrastructure, which could have serious implications for the region's stability. As the situation evolves, it is crucial for Taiwanese authorities and organizations to bolster their defenses against these persistent cyber threats to protect their critical assets.

Impact: Critical infrastructure in Taiwan, specifically the energy sector
Remediation: Enhance cybersecurity measures, regular security audits, employee training on phishing and social engineering attacks
Read Original

Researchers have identified a severe vulnerability in n8n, a widely-used workflow automation platform, allowing unauthenticated attackers to take full control of affected instances. This flaw, tracked as CVE-2026-21858 and given a maximum CVSS score of 10.0, has been named Ni8mare by Cyera Research Labs. The issue poses a significant risk as it could enable attackers to manipulate workflows and access sensitive data without any authentication. Users of n8n need to take this threat seriously, as the implications of such a breach could be extensive, impacting data integrity and privacy. Immediate action is recommended to safeguard systems until a patch is made available.

Impact: n8n workflow automation platform, all versions vulnerable to CVE-2026-21858
Remediation: Users should look for updates from n8n to patch the vulnerability once available. In the meantime, it is advisable to restrict access to n8n instances and monitor for any unauthorized activity.
Read Original

Veeam Backup & Replication has recently patched four vulnerabilities that could allow attackers to execute arbitrary code. These flaws affect users of the Veeam Backup & Replication software, which is widely used for data backup and recovery. If exploited, these vulnerabilities could lead to unauthorized access or manipulation of backup data, posing significant risks to data integrity and security. Users are strongly encouraged to update to the latest version of the software to close these security gaps and protect their systems from potential attacks. Keeping software up to date is crucial for maintaining a secure environment, especially for applications that handle sensitive data.

Impact: Veeam Backup & Replication
Remediation: Users should update to the latest version of Veeam Backup & Replication to apply the patches addressing these vulnerabilities.
Read Original

Veeam has issued security updates to address several vulnerabilities in its Backup & Replication software, including a significant remote code execution (RCE) flaw. This critical vulnerability could allow attackers to gain control over backup servers, posing a serious risk to organizations relying on this software for data protection. The flaws affect various versions of the Backup & Replication software, potentially exposing many users to exploitation if they do not update promptly. This situation is concerning as backup servers are vital for data recovery and integrity, and any compromise could lead to severe operational disruptions. Users are urged to apply the latest patches to safeguard their systems.

Impact: Veeam Backup & Replication software (specific versions not specified)
Remediation: Users should apply the latest security updates released by Veeam to mitigate the vulnerabilities.
Read Original

A newly discovered vulnerability in discontinued D-Link devices poses a serious risk, allowing attackers to execute arbitrary shell commands without authentication. This critical-severity flaw affects users of these outdated devices, which may still be in use despite not being supported or receiving updates from the manufacturer. The fact that the vulnerability is being actively exploited means that users should take immediate action to safeguard their networks. If left unaddressed, this could allow attackers to gain control over affected devices, potentially leading to larger network breaches. Users of D-Link products are advised to assess their device usage and consider replacing unsupported hardware to mitigate these risks.

Impact: D-Link devices (specific models not specified)
Remediation: Users should replace discontinued D-Link devices with supported models to avoid exploitation.
Read Original
PreviousPage 54 of 101Next