Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The UK government has rolled out a new cybersecurity initiative aimed at enhancing defenses across public sector institutions, investing over £210 million ($283 million) in the process. This strategy will focus on improving the security of government departments and other public services to better protect against cyber threats. The funding will support various projects, including the development of new technologies and training programs for staff. With increasing cyber attacks targeting public services, this move is seen as crucial for safeguarding sensitive data and maintaining public trust. The government emphasizes the need for a stronger defense mechanism as cyber threats continue to evolve and pose risks to national security.

Impact: Government departments, public sector institutions
Remediation: N/A
Read Original

Wegman’s supermarket chain in New York City has been reported to collect biometric information from its customers, specifically through the use of facial recognition technology. This practice raises significant privacy concerns, as many shoppers may not be aware that their images are being captured and analyzed. The implications of this surveillance include potential misuse of personal data and the erosion of trust between consumers and retailers. As more businesses adopt such technologies, it becomes crucial for customers to understand how their information is being used and to advocate for transparency in data collection practices. The issue also highlights the need for regulations governing biometric data to protect consumer rights.

Impact: Biometric data, facial recognition technology
Remediation: N/A
Read Original

Veeam has addressed a serious remote code execution (RCE) vulnerability in its Backup & Replication software, identified as CVE-2025-59470, which has a high severity score of 9.0 on the CVSS scale. This flaw allows Backup or Tape Operators to execute arbitrary code remotely as the postgres user, potentially leading to significant security breaches. Alongside this critical issue, Veeam also patched several other vulnerabilities in the same software suite. Users of Veeam Backup & Replication should prioritize applying these patches to safeguard their systems from potential exploitation. The swift response by Veeam reflects the importance of maintaining updated software to prevent unauthorized access and data breaches.

Impact: Veeam Backup & Replication software, specifically affected by CVE-2025-59470.
Remediation: Users are advised to apply the latest patches released by Veeam for Backup & Replication to address CVE-2025-59470 and other vulnerabilities.
Read Original

Cybercriminals are exploiting complex routing and misconfigurations to spoof legitimate domains in phishing attacks. By masquerading as trusted internal sources, these attackers trick users into believing the emails are from their organization, increasing the likelihood of successful scams. This tactic can lead to unauthorized access to sensitive information and financial loss for businesses. Organizations need to be vigilant about their domain configurations and educate employees on recognizing such phishing attempts. The implications of these attacks are significant, as they can compromise entire networks if not addressed promptly.

Impact: Legitimate domains, email systems
Remediation: Organizations should review and correct domain configurations, implement email authentication protocols like SPF, DKIM, and DMARC, and provide training to employees on identifying phishing attempts.
Read Original

The open-source workflow automation platform n8n has alerted users to a serious security vulnerability, identified as CVE-2026-21877, which carries a CVSS score of 10.0. This flaw could allow authenticated users to execute untrusted code remotely, posing a significant risk to both self-hosted and cloud versions of the software. Users and organizations utilizing n8n need to be aware of this vulnerability as it could lead to unauthorized access and potential data breaches. The company recommends that affected users take immediate action to secure their systems. As of now, the specific details regarding patches or updates have not been disclosed, but users should monitor official channels for further instructions.

Impact: n8n self-hosted versions, n8n cloud versions
Remediation: Users should monitor for updates from n8n regarding patches or mitigation strategies. It's advisable to restrict access to the n8n platform and review user permissions as a precaution.
Read Original

Hackers are exploiting a serious vulnerability in older D-Link DSL routers, identified as CVE-2026-0625. This flaw allows attackers to execute commands remotely, potentially compromising users' devices and networks. The vulnerability has a high severity score of 9.3, which indicates that it poses a significant risk. Users of legacy D-Link DSL routers need to be aware of this issue as it could lead to unauthorized access and control over their internet-connected devices. As attackers actively exploit this flaw, it is crucial for affected users to take immediate action to protect their systems.

Impact: Legacy D-Link DSL routers affected by CVE-2026-0625
Remediation: Users should check for firmware updates from D-Link and apply any available patches to mitigate the risk associated with this vulnerability. Additionally, changing the default credentials and disabling remote management features can help reduce exposure.
Read Original
Actively Exploited

A hacker group known as Zestix has successfully breached around 50 companies by exploiting a lack of multi-factor authentication (MFA). These breaches involved the use of infostealers, which are malicious programs designed to gather sensitive information from users. The absence of MFA made it easier for attackers to gain access to sensitive data without needing additional verification steps. This incident serves as a stark reminder for businesses to implement stronger security measures, as it shows how quickly attackers can exploit basic vulnerabilities. Organizations that haven't adopted MFA may find themselves at greater risk of data theft and financial loss.

Impact: 50 enterprises, infostealer malware
Remediation: Implement multi-factor authentication (MFA) to enhance security against unauthorized access.
Read Original

New research reveals that risks can emerge unexpectedly when artificial intelligence agents interact over time. The study shows that as these agents communicate and coordinate, they can create feedback loops and shared signals that lead to unforeseen outcomes, impacting entire technical and social systems. This means that even if individual AI agents operate within safe parameters, their collective behavior can introduce new risks. Understanding these dynamics is crucial for developers and organizations using AI, as it emphasizes the need for careful monitoring of AI interactions to prevent potential harm. This research raises important questions about the safety and reliability of multi-agent systems in various applications.

Impact: N/A
Remediation: N/A
Read Original

A recent report from Kiteworks reveals that European security and compliance teams are facing significant challenges in implementing regulatory frameworks effectively. Although organizations have established strong regulations, particularly around GDPR and forthcoming AI regulations, they struggle with operationalizing these rules in real-world scenarios. This gap is particularly evident in areas like AI incident response and supply chain visibility. The report suggests that without better systems to put regulations into practice, organizations may be vulnerable to compliance failures and security incidents. This situation is concerning for businesses that need to align their operations with legal requirements while ensuring effective security measures are in place.

Impact: N/A
Remediation: Organizations should focus on improving operational systems to align with regulatory frameworks and enhance incident response capabilities.
Read Original

A serious security vulnerability has been identified in legacy D-Link DSL gateway routers, specifically affecting the 'dnscfg.cgi' endpoint. This flaw, known as CVE-2026-0625, has a high severity score of 9.3 and allows unauthenticated remote attackers to execute commands through improper handling of user-provided DNS configuration inputs. Current reports indicate that this vulnerability is actively being exploited in the wild, putting users of these older routers at risk. It is crucial for individuals and organizations using these devices to be aware of the potential for unauthorized access and control. The situation underscores the need for users to assess their network security and consider upgrading their hardware to mitigate these risks.

Impact: D-Link DSL gateway routers (specific models not specified)
Remediation: Users should upgrade to the latest firmware provided by D-Link for their specific router models. If firmware is not available, consider replacing the router with a newer model that has active support and security updates.
Read Original

The Federal Communications Commission (FCC) has introduced new penalties aimed at combatting robocalls, particularly after a notable incident involving President Joe Biden's voice being cloned. Under these new regulations, telecom companies will face fines of $10,000 for submitting false or late caller identification information. This move is part of a broader effort to hold telecom providers accountable for the robocall epidemic that has frustrated consumers and undermined trust in phone communications. These penalties are expected to encourage telecom companies to improve their caller ID systems and take more responsibility for the calls that originate from their networks. This regulatory change is significant as it directly impacts how telecom companies operate and could lead to a decrease in fraudulent calls that misuse caller information.

Impact: Telecom companies, caller ID systems
Remediation: Telecom companies need to ensure accurate and timely submission of caller identification information.
Read Original

Taiwan's National Security Bureau has reported a significant increase in cyberattacks from China targeting its energy sector, with incidents rising tenfold in 2025 compared to the previous year. This surge in attacks raises serious concerns about the security of Taiwan's critical infrastructure, particularly as tensions between the two nations continue to escalate. The energy sector is vital for maintaining the country's operations, and disruptions could have widespread implications for both the economy and public safety. Taiwan's government is likely to enhance its cybersecurity measures to protect against these aggressive tactics. This situation highlights the ongoing cyber conflict in the region and the need for robust defenses against state-sponsored threats.

Impact: Taiwan's energy sector
Remediation: Enhance cybersecurity measures, monitor network traffic for unusual activity, conduct regular security audits
Read Original

CERT/CC has issued a warning about a serious vulnerability in the TOTOLINK EX200 Wi-Fi range extender, identified as CVE-2025-65606. This flaw allows a remote authenticated attacker to take complete control of the device, posing a significant risk to users. As this vulnerability remains unpatched, anyone using the TOTOLINK EX200 is advised to take immediate action to secure their networks. The potential for exploitation means that attackers could manipulate settings, access sensitive data, or use the device as a foothold into larger networks. Users need to be aware of this threat and consider alternative security measures while awaiting a fix.

Impact: TOTOLINK EX200 Wi-Fi range extender
Remediation: Users should immediately change default credentials, disable remote management features, and monitor network activity for any unauthorized access. It's also advisable to look for any firmware updates from TOTOLINK and apply them as soon as they are released.
Read Original

Researchers set a trap for members of the Lapsus$ hacking group, also known as ShinyHunters, by creating a realistic but mostly fake dataset. This honeypot successfully attracted these cybercriminals, allowing the researchers to gather insights into their tactics and methods. The operation demonstrates the ongoing challenges that cybersecurity professionals face as they try to outsmart sophisticated attackers. By luring in these hackers, the researchers hope to better understand their strategies and potentially mitigate future attacks. This incident serves as a reminder of the persistent threat posed by groups like Lapsus$, which have been involved in high-profile breaches targeting major organizations around the world.

Impact: N/A
Remediation: N/A
Read Original

Recent reports indicate that attackers are actively exploiting a command injection vulnerability in several D-Link DSL gateway routers. These devices, which are considered legacy products, have not received support for years, making them particularly vulnerable. Users of affected routers may face unauthorized access to their networks, potentially allowing attackers to execute malicious commands. The exploitation of this vulnerability highlights the risks associated with using unsupported hardware. D-Link has not specified any patches or updates, leaving users with few options other than to replace these outdated routers to protect their networks.

Impact: D-Link DSL gateway routers (specific models not mentioned), legacy products no longer supported by D-Link.
Remediation: Users should replace unsupported D-Link DSL routers with more secure, current models. No patches or updates are provided for the affected devices.
Read Original
PreviousPage 55 of 101Next