Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A recent global study by Trellix reveals that enterprise security teams are adapting their strategies to cope with constant disruptions in the cybersecurity landscape. The study indicates that resilience is no longer just a long-term goal but a necessary part of the security framework for Chief Information Security Officers (CISOs). As organizations increasingly adopt hybrid infrastructure—which integrates cloud, on-premises, and isolated systems—they must rethink their operational strategies and infrastructure design. The use of artificial intelligence is also reshaping how companies prepare for ongoing threats and regulatory pressures. This shift towards automation is prompting security teams to reassess their approaches to ensure they can withstand evolving challenges.

Impact: N/A
Remediation: N/A
Read Original

A serious vulnerability known as MongoBleed (CVE-2025-14847) is currently being exploited, exposing over 80,000 MongoDB servers on the public internet. This flaw affects multiple versions of MongoDB, allowing attackers to potentially access sensitive information stored on these servers. The scale of the exposure raises significant security concerns, as many organizations may not be aware that their databases are at risk. Companies using affected MongoDB versions should take immediate action to secure their data and prevent unauthorized access. Failure to address this vulnerability could lead to severe data breaches and loss of sensitive information.

Impact: MongoDB versions affected include all versions with the MongoBleed vulnerability; specific versions are not detailed.
Remediation: Organizations should immediately update to the latest MongoDB version that addresses the MongoBleed vulnerability. Additionally, they should implement strict access controls and monitor their servers for any suspicious activity. Regularly auditing configurations and applying security patches as they become available is also recommended.
Read Original

Condé Nast has reported a significant data breach involving the personal information of 2.3 million subscribers from WIRED.com. The hacker, known as 'Lovely', posted the leaked data on December 20, 2025, on a hacking forum called Breach Stars. In addition to the WIRED records, the hacker claims to have access to data from up to 40 million more users associated with other Condé Nast brands. This breach raises serious concerns about the security of personal information held by major publishers and the potential for further exposure of sensitive data. Users affected by this incident may face risks such as identity theft and phishing attacks, emphasizing the need for vigilance in monitoring their accounts and personal information.

Impact: WIRED.com subscriber records, potential data from 40 million additional Condé Nast brand users
Remediation: Users should monitor their accounts for unusual activity, change passwords, and consider using identity theft protection services.
Read Original

The 2022 LastPass breach continues to pose risks, as attackers are still able to crack encrypted vault backups using weak master passwords. This vulnerability allows for potential cryptocurrency theft, with experts from TRM Labs warning that such thefts could occur as late as 2025. Users who stored sensitive information in LastPass and have not changed their passwords are particularly at risk. This incident emphasizes the importance of using strong, unique passwords and regularly updating them, especially after a security breach. As the situation evolves, individuals and businesses using LastPass should remain vigilant and consider additional security measures.

Impact: LastPass vault backups, cryptocurrency accounts
Remediation: Users should change their master passwords to strong, unique passwords and consider enabling two-factor authentication for added security.
Read Original

Last week, WatchGuard Firebox firewalls were targeted in a significant cyber attack. These firewalls are widely used in various organizations for network security. Attackers exploited vulnerabilities to gain unauthorized access, which could lead to data breaches or disruptions in network operations. In a related incident, cybersecurity enthusiasts were misled by fake proof-of-concept (PoC) exploits, potentially compromising their research and learning efforts. This situation underscores the ongoing risks that cybersecurity professionals face from both direct attacks and misinformation in the community. Organizations using WatchGuard Firebox devices should ensure their systems are updated and monitor for any suspicious activity.

Impact: WatchGuard Firebox firewalls
Remediation: Ensure systems are updated and monitor for suspicious activity.
Read Original

Ubisoft's popular game Rainbow Six Siege experienced a significant security breach that allowed hackers to manipulate internal systems. This breach enabled unauthorized users to ban and unban players, alter in-game moderation feeds, and distribute vast amounts of in-game currency and cosmetic items to accounts globally. As a result, many players found their accounts flooded with billions of credits, raising concerns about the integrity of the game's economy. This incident not only affects players but also poses a serious challenge for Ubisoft in maintaining trust and security within their gaming community. The company will need to address these vulnerabilities to prevent further exploitation and restore player confidence.

Impact: Rainbow Six Siege
Remediation: Ubisoft should implement stricter security measures, including monitoring internal systems for unauthorized access and reviewing account security protocols. Players are advised to change their passwords and enable two-factor authentication where available.
Read Original

A serious vulnerability has been found in LangChain Core, a key Python package used for developing applications that utilize large language models (LLMs). This flaw, identified as CVE-2025-68664 and assigned a CVSS score of 9.3, could enable attackers to perform prompt injection attacks, which may lead to the theft of sensitive data and manipulation of LLM responses. Organizations using LangChain Core for their applications are at risk, as this vulnerability allows malicious actors to exploit the package to access confidential information. It's critical for developers and companies utilizing this software to take immediate action to secure their systems and protect user data from potential breaches.

Impact: LangChain Core (langchain-core), Python applications built on LangChain ecosystem
Remediation: Update LangChain Core to the latest version that addresses this vulnerability. Review and harden input handling to prevent prompt injection attacks.
Read Original
Hacker Leaks 2.3M Wired.com Records, Claims 40M-User Condé Nast Breach

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A hacker known as 'Lovely' has leaked personal data from over 2.3 million Wired.com accounts, claiming to have access to a larger trove of data that includes 40 million user records from Condé Nast, the parent company of Wired. This breach raises significant concerns for users who may have had their sensitive information exposed, including email addresses and potentially other personal details. The hacker shared the leaked data on a dark web forum, which poses serious risks for identity theft and phishing attacks. Companies like Condé Nast must take immediate action to investigate the claims and ensure the security of their systems to protect users. The incident serves as a reminder of the ongoing vulnerabilities that exist in the digital landscape and the need for robust security measures.

Impact: Wired.com, Condé Nast
Remediation: Companies should investigate the breach, notify affected users, and implement stronger security protocols to prevent future incidents.
Read Original
Everest Ransomware Group Claims Theft of Over 1TB of Chrysler Data

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

On December 25, the Everest ransomware group claimed to have stolen over 1 terabyte of data from Chrysler. This incident raises significant concerns about the security of sensitive information, as the attackers have threatened to release this data publicly if their demands are not met. Chrysler, part of the larger automotive industry, is now facing pressure to respond to the breach and protect its customers and business operations. Ransomware attacks like this not only disrupt companies but also put personal data at risk, affecting countless individuals. The situation is a stark reminder of the ongoing cyber threats facing major corporations, especially during times when security may be less prioritized, such as during holiday periods.

Impact: Chrysler, automotive data, customer information
Remediation: Companies should review their cybersecurity measures, enhance data protection protocols, and consider employee training on recognizing phishing attempts.
Read Original

Aflac has confirmed that a data breach in June affected the personal information of over 22 million customers. The company detected suspicious activity on some of its systems, which led to the discovery of the breach. While Aflac has not disclosed specific details on how the breach occurred, affected customers may be vulnerable to identity theft or fraud due to the exposure of their personal data. This incident raises concerns about data security practices and the potential risks for millions of individuals whose information is now at risk. Aflac has not yet provided information on the steps it will take to mitigate the impact of this breach.

Impact: Personal information of Aflac customers
Remediation: N/A
Read Original
IoT Hack

Schneier on Security

An Italian ferry was recently compromised by malware, which appears to have been installed by someone on board rather than through a remote attack. This incident raises concerns about the security of Internet of Things (IoT) devices used on ferries and similar vessels. The exact nature of the malware and its intentions remain unclear, but the breach underscores vulnerabilities that could potentially impact passenger safety and operational integrity. As more transportation systems integrate IoT technology, the need for robust security measures becomes increasingly important to prevent such unauthorized access in the future.

Impact: Italian ferry systems, IoT devices onboard ferries
Remediation: Strengthening onboard security protocols, conducting regular security audits, and ensuring IoT devices have the latest security updates.
Read Original

Spotify has taken action against the open-source group Anna's Archive after they scraped and published data on 86 million songs from the platform. Following this incident, Spotify disabled several user accounts linked to the scraping activity. Anna's Archive claimed to have discovered a method to extract song files from Spotify, which they then compiled into a database. This situation raises concerns about data privacy and the unauthorized use of content, highlighting the ongoing challenges platforms face in protecting their intellectual property from scraping. The incident serves as a reminder for users and companies alike about the importance of safeguarding their data and the potential legal repercussions of scraping activities.

Impact: Spotify platform, Anna's Archive database
Remediation: Spotify disabled accounts involved in scraping; users should adhere to platform policies to avoid account suspension.
Read Original

Users of the Trust Wallet Chrome extension have reported significant cryptocurrency losses after a malicious update was released on December 24. This compromised update allowed attackers to drain wallets, leading to millions in losses for affected individuals. In conjunction with this incident, researchers discovered a phishing domain set up by the hackers, further indicating a coordinated effort to exploit Trust Wallet users. The company has responded urgently, advising users to take precautions and remain vigilant to avoid further losses. This incident serves as a stark reminder of the risks associated with browser extensions and the importance of ensuring that software updates are legitimate and secure.

Impact: Trust Wallet Chrome extension
Remediation: Users are advised to uninstall the compromised extension and monitor their wallets for unauthorized transactions.
Read Original

A serious vulnerability has been found in LangChain Core, a Python package that serves as a key part of the LangChain ecosystem. This flaw allows attackers to potentially steal sensitive information and manipulate responses from large language models through a method known as serialization injection. The issue raises significant concerns for developers and companies using LangChain, as it can compromise the integrity of applications relying on these models. Users of LangChain Core should take immediate precautions to safeguard their systems, especially given the potential for exploitation. The situation underscores the need for timely updates and vigilant security practices in software development.

Impact: LangChain Core (langchain-core)
Remediation: Developers are advised to apply security patches as they become available and review their implementations for potential vulnerabilities related to serialization.
Read Original

Fortinet has alerted users about the active exploitation of a five-year-old vulnerability in its FortiOS SSL VPN, identified as CVE-2020-12812. This flaw, which has a CVSS score of 5.2, involves improper authentication and is particularly dangerous under specific configurations. Researchers have recently observed this vulnerability being abused in real-world attacks, which means organizations using affected versions of FortiOS SSL VPN should take immediate action to secure their systems. The ongoing exploitation of such an outdated vulnerability underscores the need for companies to regularly update their security measures and ensure proper configuration to protect against potential attacks.

Impact: FortiOS SSL VPN versions affected by CVE-2020-12812.
Remediation: Fortinet recommends updating to the latest version of FortiOS SSL VPN to mitigate this vulnerability. Users should also review their configurations to ensure that they are not exposing themselves to exploitation of this flaw.
Read Original
PreviousPage 62 of 101Next