Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

In Q3 2025, researchers reported a range of cybersecurity threats targeting industrial automation systems, specifically noting the prevalence of miners, ransomware, and spyware on ICS computers. These threats pose significant risks to critical infrastructure, potentially disrupting operations and compromising sensitive data. The report underscores the ongoing challenges faced by organizations in safeguarding their industrial systems against increasingly sophisticated attacks. Companies operating in this space need to remain vigilant and proactive in their cybersecurity measures to mitigate these risks. The findings serve as a reminder that industrial environments are not immune to the growing tide of cyber threats.

Impact: Industrial Control Systems (ICS), various vendors of automation equipment
Remediation: Implement robust security measures, conduct regular system audits, and ensure timely updates to software and security protocols.
Read Original

Fortinet has reported that a five-year-old vulnerability in its FortiOS SSL VPN is being actively exploited. This flaw, identified as CVE-2020-12812, allows attackers to bypass two-factor authentication under specific configurations, enabling unauthorized access to systems. Organizations using affected versions of FortiOS SSL VPN should be particularly vigilant, as this vulnerability could lead to significant security breaches. The issue emphasizes the need for users to ensure their VPN configurations are secure and up-to-date. Fortinet's warning serves as a critical reminder of the importance of addressing known vulnerabilities, even those that have been around for several years.

Impact: FortiOS SSL VPN (specifically affected configurations), Fortinet products utilizing this version
Remediation: Users should apply the latest patches provided by Fortinet for FortiOS. Additionally, they should review and adjust their SSL VPN configurations to ensure that two-factor authentication is enforced correctly.
Read Original

The U.S. Securities and Exchange Commission (SEC) has filed charges against multiple cryptocurrency platforms and investment clubs for allegedly scamming investors out of more than $14 million. These entities misled U.S. investors, promising high returns on investments in crypto-related schemes. The SEC's action aims to protect investors and maintain market integrity by holding these firms accountable for their fraudulent activities. This case underscores the ongoing risks in the cryptocurrency space, where scams can thrive amid a lack of regulation and oversight. Investors should remain vigilant and conduct thorough research before engaging with any investment platform.

Impact: Crypto platforms and investment clubs
Remediation: Investors should verify the legitimacy of investment opportunities and report suspicious activities to regulators.
Read Original

On Monday, the French national postal service, La Poste, experienced a significant disruption due to a Distributed Denial of Service (DDoS) attack. The attack caused central computer systems to go offline, impacting operations across the postal service. Pro-Russian hacker groups have claimed responsibility for the incident, raising concerns about the motivations behind such attacks amid ongoing geopolitical tensions. This incident not only disrupts postal services but also highlights the vulnerability of critical infrastructure to cyber threats. As La Poste works to restore services, this event serves as a reminder of the increasing frequency and severity of cyberattacks targeting essential services.

Impact: La Poste's central computer systems
Remediation: N/A
Read Original

In 2025, small and medium-sized businesses (SMBs) faced a surge in cyberattacks that challenged assumptions about which sectors were at risk. Cybercriminals increasingly targeted these businesses, breaching networks to steal sensitive data and sell it on the dark web, leading to significant financial losses. As the tactics used by attackers evolve, businesses need to rethink their security strategies to protect themselves from these threats. The article outlines three key measures companies should adopt to safeguard their operations in 2026. This shift in focus to SMBs is crucial, as many may not have the resources to defend against sophisticated attacks, making them more vulnerable.

Impact: N/A
Remediation: Companies should enhance their cybersecurity protocols, invest in employee training, and implement advanced threat detection systems.
Read Original
Eurostar Accused Researchers of Blackmail for Reporting AI Chatbot Flaws

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers have identified significant vulnerabilities in Eurostar's AI chatbot, including issues like prompt injection and HTML injection. These flaws could potentially allow attackers to manipulate the chatbot's responses or access sensitive information. Instead of addressing these concerns, Eurostar accused the researchers of blackmail, raising questions about the company's approach to cybersecurity and transparency. This incident highlights the ongoing challenges companies face in securing their AI technologies and the importance of open communication with researchers who uncover vulnerabilities. Users of the chatbot may be at risk if these issues are not addressed promptly.

Impact: Eurostar AI chatbot
Remediation: N/A
Read Original
Actively Exploited

The French postal service, La Poste, has been facing significant disruptions due to a major DDoS (Distributed Denial of Service) attack. This incident, which occurred just before Christmas, has rendered their online services largely inaccessible, impacting both customers and businesses that rely on postal services during the holiday season. La Poste acknowledged the situation and described it as a 'major network incident.' As the postal service works to restore functionality, users may experience delays and challenges in sending and receiving packages, which is particularly concerning during this busy time of year. The attack raises important questions about the security of critical infrastructure and the potential for further disruptions in similar sectors.

Impact: La Poste's online services
Remediation: N/A
Read Original

Kaspersky's GReAT team has released findings on a sophisticated attack by a group known as Evasive Panda APT. This group employs a technique that poisons DNS requests to deploy a malicious implant called MgBot. The attack chain includes the use of shellcode that is encrypted with DPAPI and RC5, making it harder to detect. This method poses a significant risk as it can compromise systems and networks by redirecting legitimate traffic to malicious sites. Organizations need to be aware of these tactics to prevent potential breaches and protect their infrastructure.

Impact: N/A
Remediation: Organizations should monitor DNS requests for anomalies and implement security measures to detect and block malicious traffic. Regular updates to security software and employee training on phishing and social engineering tactics are also recommended.
Read Original

A recent study from the University of Maryland and North Carolina State University raises concerns about the effectiveness of paper-based counterfeit protection systems, specifically those using paper physically unclonable functions (PUFs). These systems authenticate products by relying on unique microscopic variations in the paper's surface. However, the research indicates that these systems can be disrupted or bypassed, potentially allowing counterfeiters to replicate products without detection. This finding is significant as it questions the reliance on paper PUFs in securing product authenticity, impacting industries that use these methods for anti-counterfeiting measures. The results suggest that companies need to reconsider their security strategies to address these vulnerabilities.

Impact: Paper-based authentication systems, particularly those using paper PUFs.
Remediation: Companies should explore alternative authentication methods and improve existing paper PUF designs to enhance security.
Read Original

A recent breach involving Red Hat’s self-managed GitLab has compromised the data of approximately 21,000 Nissan customers. The Japanese automaker confirmed that attackers accessed their GitLab instance, which is used by Red Hat Consulting. This incident raises significant concerns about data security, especially given the sensitive nature of the information that may have been stolen. Such breaches can lead to identity theft and further exploitation of affected individuals. Companies like Nissan must prioritize their cybersecurity measures to protect customer data and maintain trust.

Impact: Data of 21,000 Nissan customers
Remediation: N/A
Read Original

As cyberattacks targeting the healthcare sector increase, industry organizations are expressing concerns over proposed changes to the HIPAA security rules. Many in the healthcare field believe that the revisions do not adequately address the growing threats and vulnerabilities. The healthcare industry is under significant strain as attackers exploit weaknesses, which could compromise patient data and disrupt services. Stakeholders are advocating for more comprehensive measures to enhance security and better protect sensitive health information. This ongoing debate highlights the urgent need for updated regulations that reflect the current cybersecurity landscape.

Impact: Healthcare systems and patient data
Remediation: Industry stakeholders are calling for stronger security measures, but specific remediation steps are not detailed.
Read Original

OpenAI is actively testing its ChatGPT Atlas browser for vulnerabilities, specifically against prompt injection attacks. Using an automated attacker, the company simulates the actions of human hackers to assess the system's defenses. However, the ongoing nature of these tests reveals that while the browser is being fortified, safety cannot be fully guaranteed. This effort is crucial as prompt injection attacks can manipulate the AI's responses, potentially leading to misinformation or harmful outputs. As OpenAI works to enhance security, users and developers must remain vigilant about the risks associated with AI-driven technologies.

Impact: ChatGPT Atlas
Remediation: Continuous testing and improvement of defenses against prompt injection attacks
Read Original

The Clop ransomware group has claimed responsibility for a significant data breach at the University of Phoenix, affecting approximately 3.5 million people. The breach reportedly exposed sensitive information, although the exact nature of the data compromised has not been detailed. This incident raises serious concerns about the security measures in place at educational institutions and the potential for misuse of the stolen data. Individuals affected by the breach may face risks such as identity theft or phishing attempts. As the investigation continues, it underscores the need for stronger cybersecurity protocols to protect personal information in higher education settings.

Impact: University of Phoenix data, personal information of 3.5 million individuals
Remediation: N/A
Read Original
Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Romania's national water authority, Romanian Waters, recently experienced a significant ransomware attack that affected around 1,000 of its systems. Fortunately, the attack did not compromise the safety of the dams, which remain secure. Authorities are actively working to restore operations without paying the ransom demanded by the attackers. This incident is a stark reminder of the vulnerabilities critical infrastructure faces from cyber threats, emphasizing the need for robust cybersecurity measures in public services. The situation is still developing as officials assess the full impact and work on recovery efforts.

Impact: Romanian Waters systems, specifically around 1,000 affected devices
Remediation: Authorities are working to restore operations without paying the ransom.
Read Original

Two malicious Chrome extensions called 'Phantom Shuttle' have been discovered in the Chrome Web Store, masquerading as tools for a proxy service. These extensions are designed to hijack user traffic and steal sensitive information, including login credentials. Users who have installed these extensions are at risk of having their personal data compromised. This incident serves as a reminder for users to be cautious when downloading browser extensions and to regularly review their installed plugins. Google has a responsibility to monitor the extensions available in its store to protect users from such threats.

Impact: Chrome Web Store extensions, user credentials, sensitive data
Remediation: Users should remove the 'Phantom Shuttle' extensions from their browsers immediately and change any passwords that may have been compromised.
Read Original
PreviousPage 63 of 101Next