Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Actively Exploited

Email continues to be the main entry point for cyber attackers, with significant increases in various types of email threats. Malware delivered through email surged by over 130% year-over-year, while phishing scams rose by more than 20% and other scams increased by 30%. These alarming trends expose vulnerabilities across different industries, indicating that many security teams are still missing critical gaps in their defenses. As attackers increasingly exploit email for impersonation and account takeover, companies must reassess their email security strategies to better protect sensitive information and prevent breaches. The growing reliance on email as a communication tool makes it essential for organizations to prioritize security measures in this area.

Impact: Email systems and users across various industries
Remediation: Strengthen email security protocols, implement multi-factor authentication, and conduct regular employee training on phishing awareness.
Read Original

A threat actor named Zestix has reportedly stolen corporate data from numerous companies after breaching their cloud file-sharing services, specifically ShareFile, Nextcloud, and OwnCloud. This attack highlights the vulnerabilities present in these platforms, which are widely used for storing and sharing sensitive business information. Companies that rely on these services should be particularly vigilant, as the stolen data is being offered for sale on dark web forums. The incident raises concerns about the security measures in place for protecting corporate data in cloud environments. Organizations are urged to review their security protocols and consider additional protections to safeguard against similar attacks.

Impact: ShareFile, Nextcloud, OwnCloud
Remediation: Companies should review and enhance their security measures for cloud file-sharing services, implement stronger access controls, and consider data encryption.
Read Original

A new social engineering attack called ClickFix is targeting the hospitality industry in Europe by using fake Windows Blue Screen of Death (BSOD) screens. This scheme tricks users into believing their systems have crashed, prompting them to manually compile and run malicious software. The attackers are specifically focusing on employees in hotels and related businesses, making this a significant threat to sensitive customer data and operational continuity. Companies in this sector need to raise awareness among staff and implement training to recognize such scams. The use of a familiar error screen is particularly deceptive, as it plays on users' fears of system failures, leading them to take harmful actions without realizing the risks.

Impact: Hospitality sector systems, Windows operating systems
Remediation: Users should be trained to recognize social engineering tactics and avoid executing unknown programs. Regular software updates and security patches for operating systems should be applied. Implementing endpoint protection solutions may help detect and block malicious activities.
Read Original

A serious security flaw known as 'MongoBleed' has been identified in MongoDB servers, allowing attackers who are not authenticated to access sensitive information like passwords and tokens. This vulnerability is currently being exploited in the wild, raising significant concerns for organizations using MongoDB. The issue stems from a memory leak that can be exploited by attackers to extract confidential data directly from the servers. Companies running affected versions of MongoDB should prioritize patching their systems to mitigate the risk of unauthorized data access. Given the potential for serious data breaches, immediate action is essential for any organization relying on MongoDB for data storage.

Impact: MongoDB servers
Remediation: Patch MongoDB servers immediately to the latest version to address the vulnerability.
Read Original

Ilya Lichtenstein, who was convicted for laundering Bitcoin stolen from the 2016 Bitfinex hack, has been released from prison after serving less than a year of his five-year sentence. His early release is attributed to a change in the law during the Trump administration that allows for reduced sentences for certain non-violent offenders. Lichtenstein and his wife were arrested in 2022 after authorities uncovered a significant amount of Bitcoin linked to the stolen funds. This release raises questions about the effectiveness of current laws in deterring cybercrime and the broader implications for cryptocurrency regulation. It also highlights the ongoing challenges law enforcement faces in addressing financial crimes related to digital currencies.

Impact: N/A
Remediation: N/A
Read Original

A group of hackers known as UAC-0184, believed to be aligned with Russia, has been targeting Ukrainian military and government organizations by using the Viber messaging app. They are sending malicious ZIP files that likely contain malware designed for espionage. According to the 360 Threat Intelligence Center, these activities have been ongoing and are part of a broader strategy to gather intelligence on Ukraine's military operations. This incident highlights the ongoing cyber warfare between Russia and Ukraine, emphasizing the need for heightened security measures within government and military communications. As the conflict continues, the use of widely used messaging platforms for cyber attacks poses significant risks to sensitive information.

Impact: Ukrainian military and government entities, Viber messaging platform
Remediation: Users should exercise caution when receiving ZIP files from unknown sources and consider enhancing security protocols for messaging applications.
Read Original

Flights in Greece were grounded for several hours due to a communication issue reported on multiple air traffic control channels. Initially, there were concerns about a potential cyberattack causing the disruption, but authorities have since deemed that scenario unlikely. The noise interference led to significant delays and cancellations, affecting travelers across the country. The incident raises questions about the reliability of air traffic communication systems and the importance of maintaining secure and functional infrastructure. While the immediate cause was not linked to malicious activity, it serves as a reminder of the vulnerabilities within critical communication networks.

Impact: Air traffic communication systems in Greece
Remediation: N/A
Read Original
Actively Exploited

Brightspeed is currently investigating a cyberattack attributed to the hacking group Crimson Collective, which has reportedly stolen personal information of more than 1 million customers. This breach raises serious concerns about the security of sensitive data, as the stolen information could potentially be used for identity theft or fraud. Brightspeed has not disclosed specific details about the data compromised or how the attackers gained access. The incident emphasizes the ongoing risks faced by telecom companies and their customers in the digital age. Users affected by the breach should be vigilant about potential phishing attempts and monitor their accounts for unusual activity.

Impact: Personal information of Brightspeed customers
Remediation: Customers should monitor their accounts for suspicious activity and consider changing passwords.
Read Original

Sedgwick has confirmed that hackers have breached a file transfer system within its subsidiary that caters to government agencies. This compromise raises serious concerns about the security of sensitive data handled by the subsidiary, as it primarily deals with information from various government entities. The incident highlights ongoing vulnerabilities in systems that support critical infrastructure and public services. As investigations continue, the extent of data accessed or stolen remains unclear. This attack serves as a reminder for organizations, especially those dealing with government contracts, to bolster their cybersecurity measures to protect against similar threats.

Impact: Sedgwick's file transfer system used by government agencies
Remediation: Organizations should review their file transfer protocols and strengthen access controls. Regular audits and security assessments are recommended to identify potential vulnerabilities.
Read Original

Ilya Lichtenstein, who was convicted for his role in the high-profile 2016 Bitfinex hack, has been released from prison and is now under home confinement. The hack resulted in the theft of approximately 120,000 Bitcoin, valued at around $70 million at the time, making it one of the largest cryptocurrency heists in history. Lichtenstein's early release raises questions about the legal and ethical implications surrounding cybercrime sentencing. His case highlights ongoing challenges in prosecuting individuals involved in cryptocurrency-related crimes and the complexities of law enforcement in the digital age. This incident serves as a reminder of the vulnerabilities within cryptocurrency exchanges and the potential for significant financial losses due to cyberattacks.

Impact: Bitfinex, cryptocurrency exchanges
Remediation: N/A
Read Original

A significant data breach involving Manage My Health has potentially compromised the sensitive information of over 120,000 patients in New Zealand. The breach raises serious concerns about the security measures in place to protect personal health data. Authorities have ordered a review to understand the extent of the breach and to prevent future incidents. This situation highlights the vulnerability of health information systems and the need for stronger protections to safeguard patient data. Patients affected by this incident may face risks related to identity theft and privacy violations, making it crucial for healthcare providers to enhance their cybersecurity practices.

Impact: Manage My Health health data systems
Remediation: N/A
Read Original

Ledger has informed some of its customers that their personal information was compromised due to a breach at Global-e, a third-party payment processor. The breach has raised concerns as it potentially exposes sensitive data like names, email addresses, and other identifying details. While Ledger itself was not directly attacked, the incident underscores the risks associated with relying on third-party services for payment processing. Customers affected by this breach should remain vigilant about their accounts and consider monitoring their financial statements for any suspicious activity. The incident also serves as a reminder for companies to ensure their third-party vendors maintain strong security practices to protect consumer data.

Impact: Ledger customers, Global-e payment processing system
Remediation: Customers should monitor their accounts and change passwords as a precaution.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) catalog by 20% in 2025, now listing a total of 1,484 vulnerabilities. Among these, 24 new vulnerabilities have been identified as being actively exploited by ransomware groups. This expansion is significant as it highlights the ongoing risk posed by these vulnerabilities to various software and hardware systems. Organizations that rely on affected products need to take immediate action to secure their systems, as these vulnerabilities can lead to severe security breaches if left unaddressed. The increase in vulnerabilities also reflects the evolving tactics of cybercriminals, making it crucial for companies to stay informed and proactive in their cybersecurity efforts.

Impact: Software and hardware flaws listed in CISA's KEV catalog, including specific products yet to be detailed.
Remediation: Organizations should review the KEV catalog and apply relevant patches or updates to affected systems as soon as possible.
Read Original

The Kimwolf Android botnet has expanded significantly, now comprising around 2 million devices. This botnet primarily targets residential proxy networks, allowing its operators to profit through various means, including launching Distributed Denial of Service (DDoS) attacks, installing applications without user consent, and selling proxy bandwidth. The growth of this botnet poses serious risks to users, as it can lead to unauthorized use of their devices and potential data breaches. It also raises concerns for internet service providers and businesses that may be targeted by DDoS attacks. The situation highlights the ongoing challenges in securing IoT devices and the need for users to be vigilant about their device security.

Impact: Android devices, residential proxy networks
Remediation: Users should ensure their devices are secured with up-to-date software, avoid installing unverified applications, and consider using security solutions that can detect and mitigate botnet activities.
Read Original

The article discusses ongoing cyber espionage activities by China and Russia targeting the United States' critical infrastructure and government networks. China is reportedly stealing sensitive information and embedding tools into key systems, allowing for future leverage against the U.S. Similarly, Russia is ramping up its operations to test the resilience of American infrastructure. This situation poses significant risks not only to national security but also to the integrity of essential services that millions of people rely on. Experts emphasize the urgent need for stronger cybersecurity measures to protect against these persistent threats.

Impact: United States critical infrastructure, federal government networks
Remediation: Strengthening cybersecurity protocols, increasing monitoring of critical systems, and implementing advanced threat detection solutions.
Read Original
PreviousPage 57 of 101Next