Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Recent findings from Veza reveal that companies are struggling to manage a rapidly expanding identity attack surface. The number of permissions—essentially access rights for users—has grown at a pace that outstrips the ability of security teams to monitor them. Veza's data shows over 230 billion permissions are currently in use, creating significant blind spots in security oversight. This situation poses a risk as enterprises attempt to manage access requests and audits with inadequate visibility into who can do what within their systems. As non-human identities, such as bots and automated processes, become more prevalent, the challenges around identity security are intensifying, making it crucial for organizations to rethink their access management strategies.

Impact: N/A
Remediation: Companies should enhance their identity management systems to improve visibility and control over permissions.
Read Original

Sax, a major US accounting firm, has revealed a data breach that has affected around 220,000 individuals. The breach was detected over a year ago, but the firm took considerable time to investigate the incident thoroughly. While specific details about how the breach occurred have not been disclosed, it raises significant concerns about the security of sensitive financial information. Affected individuals may need to monitor their accounts closely for any signs of unauthorized activity. This incident highlights the ongoing vulnerability of even well-established firms in protecting client data against cyber threats.

Impact: Personal data of approximately 220,000 individuals, including financial information.
Remediation: N/A
Read Original

Korean Air reported a data breach linked to a cyberattack on its catering and duty-free supplier, KC&D. This incident has compromised the personal information of approximately 30,000 employees. The breach originated from KC&D, which provides in-flight catering services and operates a duty-free shop for Korean Air. As a result, sensitive data, likely including names and possibly other personal details, may be at risk. This incident raises concerns about the security of third-party vendors and the potential for further exploitation of the leaked data.

Impact: Personal data of approximately 30,000 Korean Air employees
Remediation: Korean Air and KC&D are likely reviewing their security measures and may implement stricter access controls and monitoring; specific remediation steps were not disclosed.
Read Original

On December 26, 2023, the Oltenia Energy Complex, Romania's largest coal-based energy producer, fell victim to a ransomware attack attributed to the Gentlemen ransomware group. The attack severely disrupted the company's IT infrastructure, impacting its ability to operate effectively. Although specific details about the extent of the damage or data breaches have not been disclosed, the incident raises concerns about the vulnerability of critical infrastructure to cyber threats. As energy providers are essential for public services, such attacks can significantly affect energy supply and operational stability. Authorities and cybersecurity experts are likely to investigate the incident further to understand its implications and improve defenses against similar attacks in the future.

Impact: Oltenia Energy Complex IT infrastructure
Remediation: N/A
Read Original

A former customer support agent at Coinbase has been arrested in India after allegedly assisting hackers in stealing sensitive customer data from the company's database. The individual reportedly provided login credentials and other confidential information, which allowed the hackers to access customer accounts. This incident raises concerns about insider threats within companies that handle sensitive financial information. Coinbase, a major cryptocurrency exchange, is now facing scrutiny regarding its internal security measures and employee vetting processes. The breach could undermine customer trust and highlights the importance of robust security protocols to protect user data from both external and internal threats.

Impact: Coinbase customer database, customer accounts
Remediation: N/A
Read Original
Actively Exploited

In 2025, several significant cybersecurity threats emerged, most notably the global attacks attributed to a group known as Salt Typhoon. These attacks targeted multiple sectors, causing widespread concern among businesses and government agencies alike. Additionally, the discovery of a vulnerability named React2Shell raised alarms due to its potential impact on systems using React framework, which is widely adopted in web development. Researchers emphasized that this vulnerability could allow attackers to execute arbitrary code, putting countless applications at risk. Organizations are urged to review their security measures and apply necessary updates to safeguard against these evolving threats.

Impact: React framework applications, various organizations targeted by Salt Typhoon
Remediation: Apply security patches for React framework; enhance monitoring and incident response plans for organizations targeted by Salt Typhoon.
Read Original

Korean Air has reported a data breach that has compromised the personal information of thousands of its employees. The incident occurred due to a cyberattack on Korean Air Catering & Duty-Free (KC&D), a supplier that was previously a subsidiary of the airline. While the exact details of the data exposed have not been disclosed, such breaches can lead to serious privacy risks for those affected. This incident raises concerns about the security measures in place at third-party vendors and the potential ripple effects on employee trust and company reputation. As companies increasingly rely on external partners, ensuring robust cybersecurity across the supply chain is crucial.

Impact: Korean Air employees' personal data, including potentially sensitive information.
Remediation: N/A
Read Original

Fortinet has issued a warning about ongoing attacks that exploit an old vulnerability in its FortiOS software, identified as CVE-2020-12812. This flaw allows attackers to bypass two-factor authentication, which can significantly compromise the security of affected systems. Organizations using FortiOS should be particularly vigilant, as this vulnerability has resurfaced in active attacks. The potential for unauthorized access puts sensitive data at risk, making it critical for users to address this issue promptly. Cybersecurity teams are urged to review their systems and implement necessary updates to safeguard against these threats.

Impact: FortiOS versions that are vulnerable to CVE-2020-12812, particularly those configured with two-factor authentication.
Remediation: Users should apply the latest patches for FortiOS as provided by Fortinet. It is also recommended to review and strengthen two-factor authentication configurations and monitor system access logs for any suspicious activities.
Read Original
Critical 0day flaw Exposes 70k XSpeeder Devices as Vendor Ignores Alert

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers have identified a critical unpatched vulnerability, designated CVE-2025-54322, in XSpeeder networking devices, which are widely used in industrial and branch environments. Approximately 70,000 devices are affected, leaving them open to potential exploitation. The flaw was discovered by AI agents, but the vendor has not addressed the alert, raising concerns about the security of these devices. This situation poses a significant risk, as attackers could exploit the vulnerability to gain unauthorized access or disrupt operations. Companies using XSpeeder devices should take immediate action to assess their security posture and implement necessary safeguards to protect their networks.

Impact: XSpeeder networking devices, approximately 70,000 units in industrial and branch settings.
Remediation: Companies should evaluate their XSpeeder devices for potential exposure and consider implementing network segmentation and monitoring to mitigate risks. Regularly updating security protocols and reviewing access controls can also help protect against exploitation until a patch is made available.
Read Original

Coupang, a major ecommerce platform, is responding to a significant data breach that has affected approximately 33.7 million users. In an effort to compensate for the breach, the company plans to issue $1.17 billion in purchase vouchers to those impacted. This incident raises concerns about the security of personal data in the ecommerce sector and the potential risks users face when their information is compromised. The breach highlights the ongoing challenges that large online retailers encounter in safeguarding customer data. Users should remain vigilant about their personal information and monitor their accounts for any unusual activity.

Impact: Coupang ecommerce platform, 33.7 million user accounts
Remediation: Issuing purchase vouchers to affected users
Read Original

Fortinet has issued a warning about a vulnerability in FortiOS that has been around for five years but is still being exploited by attackers. This flaw allows unauthorized users to bypass two-factor authentication (2FA) on FortiGate firewalls, which are widely used by organizations to secure their networks. The continued exploitation of this vulnerability poses a significant risk to companies relying on these firewalls, as it can lead to unauthorized access and potential data breaches. Users of FortiGate firewalls are urged to take immediate action to protect their systems by applying available security updates. This situation serves as a reminder of the importance of keeping software up to date and addressing known vulnerabilities promptly.

Impact: FortiGate firewalls running FortiOS
Remediation: Users should apply the latest security patches from Fortinet to mitigate this vulnerability.
Read Original

Kaspersky has reported on a new campaign from the HoneyMyte APT group, also known as Mustang Panda or Bronze President, which has evolved to use a sophisticated kernel-mode rootkit. This rootkit is designed to deploy and secure a backdoor known as ToneShell, which allows attackers to maintain persistent access to compromised systems. The implications of this development are significant, as it enhances the group’s ability to infiltrate networks and evade detection. Organizations need to be vigilant against these advanced tactics to protect sensitive data and maintain system integrity. This campaign highlights the ongoing threats posed by state-sponsored hacking groups and the need for robust cybersecurity measures.

Impact: Kernel-mode rootkit, ToneShell backdoor, potentially various operating systems affected by the rootkit.
Remediation: Organizations should implement advanced endpoint detection and response solutions, regularly update their systems, and conduct thorough security audits to detect and mitigate such threats.
Read Original

A newly discovered vulnerability in MongoDB, referred to as MongoBleed, poses a significant risk by allowing remote attackers to extract sensitive information from affected servers without authentication. This flaw has been exploited in real-world attacks, raising alarms among organizations that utilize MongoDB for their data management. The vulnerability's ability to leak data could expose sensitive customer information, business secrets, and other critical data. Companies using MongoDB should prioritize patching their servers to mitigate potential breaches. It's crucial for users to remain vigilant and ensure their systems are secure against this emerging threat.

Impact: MongoDB servers
Remediation: Organizations should apply security patches provided by MongoDB and follow best practices for securing their databases.
Read Original

A Chinese cyberespionage group known as Evasive Panda has been using a technique called DNS poisoning to install a backdoor known as MgBot on targeted systems in Türkiye, China, and India. Kaspersky researchers identified this campaign, which shows the group's focus on espionage activities against specific entities in these countries. DNS poisoning allows attackers to redirect victims to malicious servers without their knowledge, facilitating the installation of the backdoor. This incident raises concerns about the security of sensitive information, as the MgBot backdoor can provide attackers with ongoing access to compromised systems. Organizations in the affected regions should be vigilant and strengthen their cybersecurity measures to protect against such sophisticated attacks.

Impact: N/A
Remediation: Organizations should implement DNS security measures, monitor for unusual network activity, and ensure systems are updated with the latest security patches.
Read Original

A serious vulnerability in MongoDB, designated as CVE-2025-14847 and known as MongoBleed, is currently being exploited globally. This flaw, which has a CVSS score of 8.7, allows attackers to access sensitive data stored in the server's memory without needing authentication. Researchers have identified over 87,000 instances of MongoDB that could be affected by this issue. The potential for data leakage poses a significant risk to organizations using this database technology, making it critical for them to address the vulnerability promptly. Companies should assess their systems and implement necessary security measures to safeguard against this ongoing threat.

Impact: MongoDB servers, version not specified
Remediation: Organizations should immediately review their MongoDB configurations and apply any available security patches. It is advisable to implement access controls and monitor server activity for any unauthorized access attempts. Users should also consider upgrading to the latest version of MongoDB that addresses this vulnerability.
Read Original
PreviousPage 61 of 101Next