Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Disney Fined $10M for Violating Children’s Privacy Laws on YouTube

Hackread – Cybersecurity News, Data Breaches, AI, and More

Disney has agreed to pay a $10 million settlement with the Department of Justice (DOJ) and the Federal Trade Commission (FTC) for violating children's privacy laws on YouTube. The charges stem from breaches of the Children's Online Privacy Protection Act (COPPA), which mandates strict guidelines on how companies can collect and manage data from children under 13. This settlement is significant as it not only holds Disney accountable but also emphasizes the importance of protecting children's data online. In response to these violations, Disney is implementing new rules to ensure compliance with COPPA and better safeguard children's privacy. This incident serves as a reminder to all companies about the critical need to adhere to privacy regulations, especially when dealing with vulnerable populations like children.

Impact: YouTube, Disney's online platforms
Remediation: Disney is implementing new rules to comply with COPPA and better protect children's privacy.
Read Original

The European Space Agency (ESA) has confirmed that an external server breach occurred recently, although specific details about the nature of the security issue remain vague. The agency has stated that it is investigating the incident to understand the extent of the breach and what data might have been affected. This incident raises concerns about the security of sensitive information related to space missions and research, especially given the increasing reliance on digital infrastructure in the aerospace sector. The ESA's acknowledgment of the breach underscores the vulnerability of even highly specialized organizations to cyber threats. As investigations continue, stakeholders and the public will be watching closely for updates on the implications of this breach.

Impact: External servers used by the European Space Agency
Remediation: N/A
Read Original

Ilya Lichtenstein, who was convicted for his involvement in the 2016 hack of cryptocurrency exchange Bitfinex, has been released from prison earlier than expected. Lichtenstein was sentenced last year for money laundering related to the theft of nearly $70 million in Bitcoin during the hack. He announced his release on social media, attributing it to the First Step Act, a law aimed at reducing sentences for certain non-violent offenders. This incident serves as a reminder of the ongoing challenges in securing cryptocurrency exchanges and the lasting impact of cybercrime on the financial sector. Lichtenstein's early release may raise concerns about accountability in the crypto space, especially as the industry continues to grow.

Impact: Bitfinex cryptocurrency exchange, Bitcoin
Remediation: N/A
Read Original
Actively Exploited

A report from TRM Labs has traced $35 million in stolen cryptocurrency back to a breach of LastPass that occurred in 2022. The breach reportedly led to attackers draining funds from users' wallets, raising significant concerns about the security of password management systems. LastPass has faced scrutiny due to this incident, as it underscores the potential risks for users relying on such services to safeguard sensitive information. This situation serves as a reminder for individuals to remain vigilant about their online security practices, especially when it comes to managing passwords and sensitive financial data. Users are encouraged to review their wallet security and consider additional protective measures.

Impact: LastPass, cryptocurrency wallets
Remediation: Users should review their wallet security, change passwords, enable two-factor authentication, and monitor for unauthorized transactions.
Read Original

VVS Stealer is a new type of malware written in Python that specifically targets Discord users by stealing their credentials and tokens. Discovered by researchers at Palo Alto Networks, this malware has been available for purchase on Telegram since at least April 2025. The ease of access to this tool poses a significant risk to Discord users, as attackers can use stolen credentials to hijack accounts, potentially leading to further scams or unauthorized activities within the platform. This incident raises concerns about the security measures in place for popular communication tools like Discord, and users are urged to be vigilant about their account security. Protecting accounts with strong, unique passwords and enabling two-factor authentication can help mitigate some of the risks associated with such malware.

Impact: Discord credentials and tokens
Remediation: Users should enable two-factor authentication and use strong, unique passwords for their Discord accounts.
Read Original

A recent study suggests that many risks associated with artificial intelligence (AI) extend beyond technical issues. Researchers from various universities and institutions argue that cultural assumptions, uneven development, and gaps in data play significant roles in how AI systems operate and fail. These factors can influence who is most affected by AI-related harms, indicating that security teams need to consider not just vulnerabilities but also the broader context in which AI systems are developed and deployed. This perspective emphasizes the importance of understanding the societal implications of AI technology, as well as the need for more equitable development practices. As AI continues to evolve, addressing these deeper cultural and developmental factors could help mitigate risks more effectively.

Impact: N/A
Remediation: N/A
Read Original
Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol

Hackread – Cybersecurity News, Data Breaches, AI, and More

At the Chaos Communication Congress (CCC) 2025, a security researcher known as 'Martha Root' took a bold step by deleting white supremacist dating sites during a live presentation. In this act, she leaked approximately 8,000 user profiles and around 100GB of data from these sites, which included sensitive information. The action aimed to expose the activities and ideologies of these platforms, raising awareness about the dangers of online hate groups. This incident not only highlights the ongoing issue of hate groups using technology for recruitment but also raises questions about data privacy and the ethical responsibilities of researchers. The leaked data could potentially lead to real-world consequences for individuals involved, and it underscores the need for stronger measures against such platforms.

Impact: White supremacist dating sites, user profiles
Remediation: N/A
Read Original
Actively Exploited

Resecurity recently caught a group known as ShinyHunters, also referred to as Scattered Lapsus$ Hunters, using decoy accounts to target various sectors including airlines, telecommunications, and law enforcement in September 2025. This detection took place through a honeypot operation, where fake accounts were set up to lure attackers. The activities of ShinyHunters are concerning as they indicate a growing trend of sophisticated cyber attacks aimed at critical industries. The group is known for stealing sensitive data and selling it on the dark web, which poses significant risks to both organizations and individuals. Resecurity's findings emphasize the need for enhanced cybersecurity measures across these sectors to prevent future breaches.

Impact: Airlines, telecommunications, law enforcement agencies
Remediation: Organizations should implement advanced monitoring systems to detect decoy account usage and enhance security protocols to protect sensitive data.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter outlines several concerning cybersecurity incidents. Notably, the Evasive Panda APT group has been reported to poison DNS requests to deploy MgBot, a type of malware. Additionally, there is a spear-phishing campaign that targets U.S. and allied manufacturing and healthcare organizations by exploiting vulnerabilities in the npm registry. Furthermore, details have emerged about a supply chain incident involving EmEditor, where information-stealing malware has been distributed. These incidents demonstrate the ongoing threat posed by sophisticated cyber actors, particularly in sectors critical to national security and public health.

Impact: MgBot malware, npm registry, EmEditor software
Remediation: Organizations should enhance their email filtering, monitor DNS traffic for unusual activities, and ensure software is updated to the latest versions. Specific patches or updates were not mentioned.
Read Original

French authorities are currently investigating a concerning trend involving AI-generated deepfakes that are being used to create explicit images of individuals without their consent. This situation has raised significant alarm, as it poses serious privacy and security issues for those affected. The technology behind these deepfakes can manipulate images to make it appear as though someone is in a compromising situation, which not only harms reputations but can also lead to harassment. Authorities are looking into the implications of this misuse of AI and how it can be regulated to protect individuals. As the use of such technology increases, it becomes crucial to establish clear guidelines and laws to prevent exploitation and misuse.

Impact: Individuals depicted in AI-generated deepfakes, particularly on social media platforms like X (formerly Twitter)
Remediation: N/A
Read Original

The hacking group ShinyHunters claims to have breached the cybersecurity firm Resecurity, alleging that they stole internal data. However, Resecurity has countered these claims, stating that the attackers only accessed a honeypot—a decoy system designed to lure in hackers and monitor their activities. This situation raises questions about the effectiveness of security measures and the tactics used by both attackers and defenders. If true, this incident illustrates the ongoing cat-and-mouse game in cybersecurity, where firms must stay vigilant against potential breaches while also employing strategies to detect and analyze threats. The outcome of this dispute could have implications for how companies approach cybersecurity defenses and incident reporting.

Impact: N/A
Remediation: N/A
Read Original

The hacking group known as ShinyHunters has claimed responsibility for breaching the cybersecurity firm Resecurity and stealing internal data. However, Resecurity disputes this claim, stating that the attackers only managed to access a honeypot—a decoy system intentionally set up to contain fake information. This honeypot was designed to track and analyze the activities of potential attackers. The incident raises questions about the effectiveness of cybersecurity measures and the tactics used by hackers. While Resecurity maintains that no real data was compromised, the event serves as a reminder of the ongoing challenges in cybersecurity and the importance of vigilance against potential threats.

Impact: N/A
Remediation: N/A
Read Original
Finnish Authorities Detain Crew After Undersea Internet Cable Severed

Hackread – Cybersecurity News, Data Breaches, AI, and More

A cargo ship named Fitburg has been detained by Finnish authorities following the severing of an undersea internet cable connecting Finland and Estonia. Two crew members were arrested after investigators discovered sanctioned steel on board. Authorities are now looking into whether the cable break was a result of an accident or a deliberate act that could be linked to hybrid warfare tactics. This incident raises concerns about potential threats to critical infrastructure and the security of internet communications in the region, highlighting the vulnerabilities of undersea cables that are essential for global connectivity.

Impact: Undersea internet cable between Finland and Estonia
Remediation: N/A
Read Original
Resecurity Says ShinyHunters Fell for Honeypot After Breach Claim

Hackread – Cybersecurity News, Data Breaches, AI, and More

Resecurity has responded to claims from the hacking group ShinyHunters, asserting that the attackers did not breach any real systems or access customer data. Instead, Resecurity says the hackers interacted with a honeypot designed to capture malicious activity, which contained only fake information. This incident underscores the ongoing challenges in cybersecurity, as groups like ShinyHunters may attempt to exploit vulnerabilities or claim breaches that aren't genuine. For companies, this serves as a reminder to monitor their security measures and ensure they are prepared for potential threats, even if they turn out to be misdirected. The situation illustrates the importance of having robust security practices in place to counteract both real and perceived threats.

Impact: N/A
Remediation: N/A
Read Original
ShinyHunters Claim Breach of US Cybersecurity Firm Resecurity (Updated)

Hackread – Cybersecurity News, Data Breaches, AI, and More

The hacking group known as ShinyHunters claims to have breached Resecurity, a US cybersecurity firm. They reportedly accessed sensitive data, although specific details about the type of information compromised have not been disclosed yet. Resecurity has acknowledged the incident and provided an update, although it remains unclear how many users or entities may be affected by this breach. This incident raises concerns about the security measures in place at cybersecurity firms themselves, as they are expected to be leaders in protecting sensitive data. The implications of such a breach could significantly undermine trust in the industry.

Impact: Resecurity's data and potentially client information
Remediation: N/A
Read Original
PreviousPage 58 of 101Next