Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

According to Infosecurity Magazine, Chinese money laundering networks have become a major force in the global cryptocurrency landscape, handling about 20% of all illicit crypto funds over the past five years. This activity has contributed to a staggering increase in crypto-based money laundering, which is projected to grow from $10 billion in 2020 to over $82 billion by 2025. This trend raises significant concerns for law enforcement and regulatory agencies worldwide, as it indicates that organized crime is increasingly using digital currencies to obscure the origins of their funds. The implications of this growth are profound, affecting financial systems and potentially facilitating a range of illegal activities, from drug trafficking to human trafficking. As these networks expand, it becomes crucial for governments and financial institutions to strengthen their measures against money laundering and enhance their oversight of cryptocurrency transactions.

Impact: Cryptocurrency systems and networks
Remediation: Governments and financial institutions should enhance regulations and monitoring of cryptocurrency transactions.
Read Original

The U.S. Defense Department has announced a new initiative called Cybercom 2.0 aimed at enhancing the country's ability to respond to increasing cybersecurity threats from China. Senior officials noted that this initiative is designed to adapt the military's cyber capabilities to better tackle these specific threats, which have been intensifying in recent times. The initiative will involve a new cyber force generation model that is expected to streamline and improve the U.S. military's response to these challenges. This is particularly important as the geopolitical climate evolves and the risks to national security from cyber attacks grow. By strengthening its cybersecurity efforts, the U.S. aims to protect its networks and maintain its strategic advantage in the cyber domain.

Impact: U.S. military networks and defense systems
Remediation: N/A
Read Original
Actively Exploited

Researchers have discovered that malicious Python packages were uploaded to the Python Package Index (PyPI), posing a significant risk to developers. The harmful code was hidden within a file that appeared to be a Basque language dictionary but was actually a compressed archive containing a Remote Access Trojan (RAT). This incident could affect any developers who inadvertently install these malicious packages, potentially allowing attackers to gain unauthorized access to their systems. It serves as a reminder for users to be cautious when downloading packages from open-source repositories, as they can be exploited to distribute malware. Vigilance and thorough vetting of software dependencies are crucial for maintaining security.

Impact: Python Package Index (PyPI), developers using malicious packages
Remediation: Developers should avoid installing unverified packages and consider using tools to scan for malicious code in dependencies.
Read Original

Ivanti has revealed two serious vulnerabilities in its Endpoint Manager Mobile (EPMM) software, identified as CVE-2026-1281 and CVE-2026-1340. These vulnerabilities are currently being exploited in zero-day attacks, meaning attackers have already taken advantage of them before any fix was made available. Organizations using EPMM are at risk, as these flaws could allow unauthorized access to sensitive mobile device management functions. The situation is urgent, as the vulnerabilities are actively being exploited in the wild, which could lead to data breaches or unauthorized control over managed devices. Users and companies are advised to monitor for updates and take immediate action to secure their systems.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Users should apply any available patches or updates from Ivanti as soon as they are released. In the meantime, organizations are advised to limit access to the EPMM software and monitor for unusual activity.
Read Original

Recent vulnerabilities have been discovered in n8n, a widely used AI automation platform. These flaws could allow attackers to take control of servers and steal sensitive user credentials. This poses a significant risk to businesses that rely on n8n for automating workflows and managing data. If exploited, these vulnerabilities could lead to unauthorized access and data breaches, potentially impacting customer trust and company reputation. Users of n8n should take immediate action to secure their systems and monitor for any suspicious activity.

Impact: n8n automation platform
Remediation: Users are advised to apply security patches as they become available and review their system configurations for any vulnerabilities.
Read Original

A senior official from the Secret Service has raised concerns about the vulnerabilities in the internet domain registration system, which are often overlooked despite their potential for exploitation by hackers. The official pointed out that domain registrars frequently allow bulk registration of various misspellings of well-known brand names, creating opportunities for malicious actors to deceive users. This practice could lead to phishing attacks and other forms of cybercrime targeting individuals and organizations. The official emphasized the need for greater awareness and action to address these weaknesses in domain registration processes. As cyber threats evolve, protecting domain names should be a priority to ensure both security and trust online.

Impact: Domain registration systems, domain registrars
Remediation: Companies should monitor domain registrations for variations of their brand names and implement stricter controls on bulk registrations.
Read Original

A recent investigation by SentinelOne SentinelLABS and Censys uncovered 175,000 publicly accessible Ollama AI servers spread across 130 countries. These servers, which are part of an open-source AI deployment, are found in both cloud environments and residential networks. The exposure of these systems poses significant security risks as they operate without proper management or oversight. This unmanaged infrastructure could be exploited by malicious actors for various purposes, including data breaches or launching attacks. Companies and users relying on these servers should take immediate action to secure their systems and limit exposure to potential threats.

Impact: Ollama AI servers
Remediation: Organizations should secure their AI servers by implementing access controls, monitoring network traffic, and ensuring proper configurations are in place to limit exposure.
Read Original
Common Cloud Migration Security Mistakes (and How to Avoid Them)

Hackread – Cybersecurity News, Data Breaches, AI, and More

The article discusses common security mistakes organizations make when migrating to the cloud, focusing on issues like weak access controls and misconfigurations. These mistakes can leave sensitive data vulnerable to unauthorized access and breaches. The piece emphasizes the importance of proper planning and implementation during cloud transitions, suggesting that organizations should employ stronger access management practices and regularly review their configurations. By addressing these pitfalls, companies can better protect their data and maintain compliance with regulatory standards. The insights provided are crucial for businesses looking to enhance their cloud security posture.

Impact: N/A
Remediation: Implement strong access controls, regularly review and update configurations, and conduct security audits during cloud migration.
Read Original

Match Group, the parent company of popular dating apps like Tinder, Hinge, OkCupid, and Match.com, has confirmed a data breach that exposed sensitive user information. While the company has not disclosed the exact number of affected users, they are actively investigating the incident and have informed users of potential risks. The breach raises concerns about the security of personal data on dating platforms, as attackers may exploit this information for identity theft or other malicious activities. Users are advised to monitor their accounts for suspicious activity and change their passwords to enhance security. This incident serves as a reminder of the vulnerabilities present in online services that handle sensitive personal information.

Impact: Tinder, Hinge, OkCupid, Match.com
Remediation: Users are advised to change their passwords and monitor accounts for suspicious activity.
Read Original

Marquis Software Solutions, a financial services provider based in Texas, has linked a ransomware attack that compromised its systems in August 2025 to a subsequent security breach involving SonicWall's cloud backup services. This incident impacted several U.S. banks and credit unions, raising concerns about the security of financial data and the potential for widespread disruption in banking services. The breach reportedly allowed attackers to exploit vulnerabilities in SonicWall's systems, leading to the ransomware attack on Marquis. This situation not only emphasizes the interconnected nature of cybersecurity risks but also highlights the importance of robust security measures for third-party services that handle sensitive financial information. As organizations increasingly rely on cloud solutions, ensuring their security is crucial to protect against similar incidents in the future.

Impact: Marquis Software Solutions, SonicWall cloud backup services, U.S. banks, credit unions
Remediation: Organizations should review and strengthen their cloud backup security measures, apply any available patches from SonicWall, and conduct thorough security audits.
Read Original

TA584, a known threat actor, is currently using compromised email accounts to distribute malicious content through services like SendGrid and Amazon SES. Their attack method incorporates tools such as Tsundere Bot and XWorm, which are designed to gain unauthorized access to networks. This tactic raises concerns for organizations that rely on these email services, as attackers can exploit trusted channels to deliver malware. The use of legitimate platforms for malicious purposes complicates detection and prevention efforts. Companies need to be vigilant and enhance their security measures to protect against such sophisticated email-based attacks.

Impact: SendGrid, Amazon SES, Tsundere Bot, XWorm
Remediation: Implement email security measures, monitor for unusual account activity, and educate employees on phishing threats.
Read Original
Op Bizarre Bazaar: New LLMjacking Campaign Targets Unprotected Models

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Pillar Security Research has identified a significant cyberattack campaign called Operation Bizarre Bazaar, orchestrated by a hacker going by the name Hecker. This operation took place between December 2025 and January 2026, with over 35,000 sessions aimed at infiltrating AI systems. The attackers sought to hijack computing power and monetize their access through a platform called silver.inc. This incident raises serious concerns for organizations that rely on AI technologies, as it highlights vulnerabilities in unprotected models that can be exploited for malicious purposes. Companies using AI systems need to be vigilant about security measures to prevent unauthorized access and potential misuse of their resources.

Impact: AI systems, computing power resources, silver.inc platform
Remediation: Organizations should implement stronger security protocols for AI systems, including access controls and monitoring for unauthorized sessions.
Read Original

The FBI has launched an initiative called Operation Winter SHIELD, urging organizations to bolster their cybersecurity defenses against threats from cybercriminals and nation-state actors. They have outlined ten specific actions that businesses can implement to protect their networks and data. These measures include improving incident response plans, conducting regular security training for employees, and ensuring software is up to date. This call to action comes amid rising cyber threats that can disrupt operations and compromise sensitive information. Organizations of all sizes are encouraged to take these steps seriously to safeguard their assets and maintain operational integrity.

Impact: N/A
Remediation: Organizations should implement the ten recommended actions outlined by the FBI, including enhancing incident response plans and conducting security training.
Read Original

The French data protection authority has fined France Travail, the national employment agency, €5 million due to its mishandling of a data breach that occurred in 2024. The regulator determined that the agency's response violated the General Data Protection Regulation (GDPR), which sets strict guidelines on data privacy and security within the EU. This incident not only impacts the agency's reputation but also raises concerns about how public institutions handle sensitive personal data. The fine serves as a reminder to organizations about the importance of complying with data protection laws and the potential financial consequences of failing to do so. As data breaches become more common, it is crucial for agencies to have effective response strategies in place to protect citizen information.

Impact: France Travail, sensitive personal data of job seekers
Remediation: Implementing stronger data protection measures and ensuring compliance with GDPR guidelines
Read Original

Zscaler's recent testing has revealed alarming vulnerabilities in enterprise AI systems, finding that 90% of these systems have critical weaknesses that can be exploited in less than 90 minutes. The research indicates that the median time to experience a critical failure is just 16 minutes. This poses a significant risk for businesses relying on AI technology, as attackers could potentially compromise their systems before adequate defenses are put in place. With the growing adoption of AI in various sectors, companies need to be aware of these vulnerabilities and take immediate action to secure their systems. The findings serve as a wake-up call for organizations to assess their AI infrastructure and implement stronger security measures.

Impact: Enterprise AI systems
Remediation: Organizations should conduct security assessments of their AI systems and implement stronger security protocols to mitigate vulnerabilities.
Read Original
PreviousPage 7 of 86Next