Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Cybersecurity researchers have identified two malicious Chrome extensions that have collectively attracted over 900,000 users. These extensions, named 'Chat GPT for Chrome with GPT-5' and 'Claude Sonnet & DeepSeek AI,' are designed to steal conversations from OpenAI's ChatGPT and DeepSeek, along with users' browsing data. The stolen information is sent to servers controlled by the attackers. This incident raises significant concerns about user privacy and data security, as many individuals may unknowingly be exposing sensitive information through these extensions. Users are urged to remove these extensions immediately and review their online security practices to protect their data.

Impact: ChatGPT, DeepSeek, Chrome Web Store
Remediation: Users should remove the malicious extensions from their browsers and monitor their accounts for any unusual activity.
Read Original
Ledger Confirms Global-e Breach, Warns Users of Phishing Attempts

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Ledger has confirmed a data breach linked to its partner Global-e, which has resulted in the exposure of customer information. While sensitive data such as passwords and crypto recovery phrases were not compromised, users are now facing active phishing attempts that may target them using the leaked information. This incident raises concerns about the security of personal data in the cryptocurrency space and serves as a reminder for users to remain vigilant against phishing scams. Ledger is advising its customers to be cautious and verify any communications they receive that claim to be from the company or its partners. Staying alert is crucial as scammers may use this data to trick users into revealing more sensitive information.

Impact: Ledger customers, Global-e users
Remediation: Users are advised to be cautious about phishing attempts and verify communications from Ledger and Global-e.
Read Original

A new malware campaign known as PHALT#BLYX ClickFix is targeting the hospitality sector, exploiting social engineering tactics and the MSBuild.exe tool. This multi-stage attack has been specifically designed to infiltrate hospitality organizations, putting sensitive data and operations at risk. Researchers have noted that the campaign employs deceptive strategies to trick users into executing malicious code. As a result, affected companies could face significant disruptions and potential data breaches, making it crucial for hospitality organizations to remain vigilant and enhance their cybersecurity measures. The ongoing threat emphasizes the need for robust employee training and awareness to combat social engineering tactics effectively.

Impact: Hospitality organizations, MSBuild.exe
Remediation: Organizations should implement employee training on social engineering, enhance email filtering, and monitor MSBuild.exe usage. Regular updates and security patches should be applied to all systems.
Read Original

SentinelLABS' research for 2025 reveals significant trends in cybersecurity, particularly the adaptation of ransomware for espionage activities and the growing exploitation of cloud platforms. This shift indicates that attackers are increasingly targeting sensitive information stored in cloud environments, which could put numerous enterprises at risk. Companies using cloud services need to be vigilant and enhance their security measures to protect against these evolving threats. The report suggests that the landscape of cybercrime is becoming more sophisticated, making it essential for organizations to stay informed and prepared. Understanding these trends can help enterprises better defend their systems and data against potential breaches.

Impact: Ransomware, cloud platforms
Remediation: Companies should enhance security measures for cloud services and monitor for unusual activities.
Read Original
Actively Exploited

A serious security vulnerability has been discovered in Open WebUI Direct Connections, which could allow attackers to take over user accounts and compromise servers. This flaw poses a significant risk to organizations using the platform, as it could lead to unauthorized access and data breaches. Users of Open WebUI should be especially cautious, as the vulnerability may be actively exploited. It’s crucial for those affected to stay informed about updates and patches from the developers. Companies relying on this software need to prioritize security measures to protect their systems and data from potential attacks.

Impact: Open WebUI Direct Connections
Remediation: Users should apply any available patches from the Open WebUI developers and review their security configurations to mitigate risks.
Read Original

Researchers have successfully set up a honeypot to attract members of the Lapsus$ hacking group, which has been known for its high-profile cyberattacks. By creating fake accounts and using synthetic data, they were able to gather valuable information about the hackers' infrastructure and tactics. This operation sheds light on the methods used by Lapsus$ and provides insights that could help in defending against their future attacks. The findings may be useful for cybersecurity professionals looking to enhance their defenses against similar threats. Overall, this initiative illustrates the ongoing cat-and-mouse game between hackers and security researchers.

Impact: N/A
Remediation: N/A
Read Original

AI coding assistants, like the one integrated with Claude Code, are starting to manage software dependencies through plugins, which has raised new concerns about supply-chain security. When these automation tools are compromised, attackers could manipulate the dependencies that developers rely on, potentially injecting malicious code into software projects. This situation poses a significant risk for developers and companies that use these AI tools, as they might unknowingly include vulnerable or harmful libraries in their applications. The implications extend beyond individual developers to the broader software ecosystem, making it crucial for teams to stay vigilant and assess the security of their dependencies regularly. As reliance on AI tools grows, so does the need for heightened awareness of these emerging risks.

Impact: AI coding assistants, Claude Code, software dependencies
Remediation: Developers should regularly audit their dependencies for vulnerabilities and maintain up-to-date security practices when using AI coding tools.
Read Original

Resecurity has published extensive documentation related to John Erin Binns, a hacker with ongoing activities who remains at large. The release includes over 1,000 messages that reveal Binns' communications with a woman in Turkey and an associate known as 'S.M.' This information could provide valuable insights into his operations and potential targets. The fact that Binns is not currently in U.S. custody raises concerns about the effectiveness of law enforcement efforts to track and capture cybercriminals. Resecurity’s actions may help inform other cybersecurity professionals and law enforcement about the methods and connections used by hackers, potentially leading to better prevention strategies against similar threats.

Impact: N/A
Remediation: N/A
Read Original

A serious vulnerability in Dolby's software for Android devices has been identified, tracked as CVE-2025-54957. Discovered by Google researchers in October 2025, this flaw could potentially allow attackers to exploit the Dolby audio processing capabilities on affected devices. Users of Android devices utilizing Dolby technology should be particularly cautious, as the vulnerability poses risks to their audio functionality and overall device security. Immediate action is recommended to ensure that devices are updated to the latest software versions that include the necessary patches to fix this issue. This discovery emphasizes the need for regular updates and vigilance among users and security teams alike.

Impact: Android devices using Dolby audio processing technology.
Remediation: Users should update their Android devices to the latest versions that include patches for CVE-2025-54957. Regularly checking for software updates is advised to mitigate the risk associated with this vulnerability.
Read Original

The UK government has launched a new Cyber Action plan aimed at strengthening the nation's defenses against cyber threats. This initiative is designed to offer more direct support for organizations in protecting themselves from cyber incidents and improving their response strategies. The plan emphasizes collaboration between public and private sectors, ensuring that resources and expertise are shared effectively. This move responds to the increasing frequency and sophistication of cyberattacks, which pose risks to both national security and the economy. By enhancing the country's cyber resilience, the government aims to better protect businesses and individuals from potential breaches and disruptions.

Impact: N/A
Remediation: N/A
Read Original

A single threat actor, identified as an initial access broker (IAB), has been linked to numerous significant data breaches across various organizations. This actor uses stolen credentials obtained through information stealers to gain unauthorized access to systems. Many companies are at risk as these breaches can lead to extensive data exposure and financial loss. Security researchers are urging organizations to bolster their defenses against credential theft, as the actor's methods highlight vulnerabilities that can be exploited. The widespread nature of these breaches emphasizes the need for improved security protocols and user awareness to protect sensitive information.

Impact: Organizations with compromised credentials, specific vendors not mentioned
Remediation: Organizations should implement stronger password policies, enable multi-factor authentication, and regularly monitor for suspicious login attempts.
Read Original

Cybersecurity researchers at Securonix have reported a new campaign targeting the European hospitality sector, known as PHALT#BLYX. This campaign uses fake booking emails to trick hotel staff into clicking on links that lead to counterfeit blue screen of death (BSoD) error pages. By doing so, attackers aim to install a remote access trojan called DCRat on the victims' systems. This type of malware allows hackers to gain unauthorized access to sensitive information and control over the infected devices. The incident underscores the need for heightened vigilance among hotel employees regarding suspicious emails and links, as these tactics can lead to severe security breaches.

Impact: European hospitality sector, hotel staff, systems infected with DCRat
Remediation: Employees should be trained to recognize phishing attempts and avoid clicking on suspicious links. Implementing email filtering and security software can help block malicious emails.
Read Original

Microsoft has responded to concerns raised by a security engineer regarding potential prompt injection vulnerabilities in its Copilot AI assistant. The engineer pointed out issues related to how the AI processes inputs, which could allow malicious prompts to bypass security measures. However, Microsoft disagrees, stating that these issues do not qualify as vulnerabilities. This disagreement reflects a broader debate between tech companies and security researchers about what constitutes a risk in generative AI systems. As AI technology becomes more integrated into various applications, understanding these distinctions is crucial for both developers and users, as it impacts how security measures are implemented and perceived.

Impact: Microsoft Copilot AI assistant
Remediation: N/A
Read Original

A serious vulnerability has been found in n8n, an open-source workflow automation platform, which could allow authenticated users to run arbitrary system commands on the server. This vulnerability, identified as CVE-2025-68668, has a high severity score of 9.9 according to the CVSS system, indicating a significant risk. It stems from a failure in the protection mechanisms that should keep the system secure. Users of n8n should be particularly concerned as this issue could lead to unauthorized control over their systems. The affected versions include all versions prior to the patch that addresses this vulnerability, making it crucial for users to update their installations promptly to prevent potential exploitation.

Impact: n8n (all versions prior to patch)
Remediation: Users are urged to update to the latest version of n8n to mitigate this vulnerability. Specific patch details were not provided in the article, but users should ensure they are running the most recent version to safeguard against this issue.
Read Original
Actively Exploited

Email continues to be the main entry point for cyber attackers, with significant increases in various types of email threats. Malware delivered through email surged by over 130% year-over-year, while phishing scams rose by more than 20% and other scams increased by 30%. These alarming trends expose vulnerabilities across different industries, indicating that many security teams are still missing critical gaps in their defenses. As attackers increasingly exploit email for impersonation and account takeover, companies must reassess their email security strategies to better protect sensitive information and prevent breaches. The growing reliance on email as a communication tool makes it essential for organizations to prioritize security measures in this area.

Impact: Email systems and users across various industries
Remediation: Strengthen email security protocols, implement multi-factor authentication, and conduct regular employee training on phishing awareness.
Read Original
PreviousPage 56 of 101Next