Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A security researcher has discovered a vulnerability in WhatsApp that allows users to bypass the app's 'View Once' feature, which is designed to make images and videos disappear after being viewed. This issue arises from the use of a modified client application, and Meta, the parent company of WhatsApp, has stated it will not release a patch for this vulnerability. The decision not to address the flaw raises concerns about user privacy, as it undermines the security feature intended to protect sensitive media. Users who rely on this feature for confidential communications may be at risk of having their private content saved and shared without consent. The vulnerability's existence highlights the potential for modified applications to exploit weaknesses in popular messaging platforms.

Impact: WhatsApp (all versions using modified client applications)
Remediation: N/A
Read Original

According to a recent report by Gartner, security teams should prioritize their involvement in artificial intelligence (AI) projects to prevent expensive incident response efforts in the future. The research suggests that by 2028, AI-related issues will account for half of all incident response activities. This shift highlights the growing intersection between cybersecurity and AI, emphasizing that companies need to integrate security considerations from the outset of AI development. Failing to do so could lead to significant vulnerabilities and costly breaches. As AI technology becomes more prevalent in various sectors, understanding its risks and preparing for potential security incidents will be crucial for organizations.

Impact: N/A
Remediation: N/A
Read Original

The ongoing conflict in Iran is expected to extend, leading to an increase in cyber threats and potential disruptions in energy supply across the region. Companies operating in the Middle East may face heightened risks as tensions escalate. Cybersecurity experts are warning that this situation could result in more frequent and severe cyberattacks aimed at critical infrastructure and private enterprises. The implications of such attacks could be wide-ranging, impacting not just local businesses but also global markets and energy prices. Stakeholders in the region are advised to bolster their cybersecurity measures to mitigate potential risks.

Impact: Critical infrastructure, energy sector, Middle Eastern companies
Remediation: Companies should enhance their cybersecurity protocols and incident response strategies.
Read Original

A significant security vulnerability, identified as CVE-2026-3888, has been discovered in default installations of Ubuntu Desktop versions 24.04 and later. This flaw allows unprivileged local attackers to escalate their privileges to root access, potentially giving them complete control over the affected systems. With a CVSS score of 7.8, this high-severity issue poses a serious risk to users who have not applied necessary security measures. It is crucial for Ubuntu users to be aware of this vulnerability, as it could lead to unauthorized access and manipulation of sensitive data. Immediate action is recommended to safeguard systems against potential exploitation.

Impact: Ubuntu Desktop versions 24.04 and later
Remediation: Users should update their systems to the latest available patches from Ubuntu to address this vulnerability. Regular system updates and monitoring for security advisories are also recommended to mitigate risks.
Read Original

Online fraud is becoming a significant issue globally, with losses reaching $442 billion, according to INTERPOL's latest report. The increase is attributed to the rise of digital tools and organized crime networks that operate internationally. Between 2024 and 2025, there was a 54% increase in fraud-related notices, indicating a growing number of victims affected by these scams. The report categorizes financial fraud as one of the top five global crime threats, emphasizing the need for better security measures and awareness. The surge in fraud impacts individuals and businesses alike, highlighting the urgency for enhanced protective strategies in the digital space.

Impact: N/A
Remediation: N/A
Read Original

Researchers have identified a severe vulnerability in the GNU InetUtils telnet daemon, known by its CVE identifier CVE-2026-32746. This flaw allows unauthenticated attackers to execute arbitrary code with root privileges through Telnet connections on port 23. With a CVSS score of 9.8, this vulnerability poses a significant risk to systems using the affected telnetd. The issue arises from an out-of-bounds write in the LINEMODE Set, which could be exploited easily by attackers. Organizations using this software need to take immediate action to secure their systems, as the implications of this flaw could lead to unauthorized access and control over critical infrastructure.

Impact: GNU InetUtils telnet daemon (telnetd), versions not specified.
Remediation: Organizations should disable the telnetd service if it is not necessary. If telnetd must be used, system administrators should implement strict network controls to limit access to trusted hosts only. Regularly monitor for updates from the GNU project regarding patches or fixes for this vulnerability.
Read Original

The ForceMemo attack is a new tactic used by the GlassWorm malware, targeting developers by compromising their systems through malicious extensions for Visual Studio Code and Cursor. Once the malware infiltrates a developer's environment, it steals sensitive information, including GitHub tokens, which can then be used to access and manipulate code repositories. This poses a significant risk to software projects, as attackers can potentially alter or insert malicious code into popular Python repositories. Developers and organizations relying on GitHub for collaboration and version control should be particularly vigilant. It's crucial for users to ensure their development tools are secure and to monitor their accounts for any suspicious activity.

Impact: Python repositories, GitHub accounts, Visual Studio Code, Cursor extensions
Remediation: Developers should ensure that their development environments are secure, avoid using unverified extensions, and monitor their GitHub accounts for unauthorized access. Regularly updating software and using two-factor authentication can also help mitigate risks.
Read Original

A recent report by SailPoint, which surveyed 333 IT decision-makers in the UK, reveals a significant security risk for businesses: 77% of organizations do not deactivate accounts of former employees in a timely manner. This oversight can leave sensitive data vulnerable to unauthorized access, as ex-employees may still have the ability to access company systems. The failure to manage identity security effectively could result in data breaches, potentially exposing businesses to severe financial and reputational damage. Companies must prioritize timely account deactivation protocols to protect their data and maintain compliance with data protection regulations. This situation is particularly concerning as it highlights a widespread issue that could affect numerous organizations across various sectors.

Impact: N/A
Remediation: Implement timely account deactivation processes for ex-employees
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a vulnerability in the Wing FTP Server software that is currently being exploited. This flaw enables low-privileged attackers to access the complete local installation path of the software, which could lead to further exploitation or data breaches. Users of Wing FTP Server need to be particularly vigilant, as this vulnerability could allow malicious actors to gain insights into the server's configuration and potentially exploit other weaknesses. Companies using this software should ensure they are taking appropriate measures to secure their systems and monitor for any suspicious activity. Immediate action is crucial to mitigate the potential risks associated with this vulnerability.

Impact: Wing FTP Server software
Remediation: Users should update their Wing FTP Server software to the latest version to mitigate this vulnerability. Additionally, they should review their server configurations and security settings to limit exposure to potential attacks.
Read Original

On March 13, the WebFiling service of Companies House was taken offline after a security issue was discovered that exposed sensitive data of company directors. This incident raises concerns about the privacy and security of personal information for those listed as directors, as it could potentially be misused by malicious actors. Companies House, which is responsible for registering company information in the UK, has not provided detailed information about the nature of the data that was exposed or how many individuals were affected. The downtime of the service indicates a proactive measure to prevent further unauthorized access. This situation emphasizes the importance of maintaining secure systems, especially when handling sensitive personal data.

Impact: Companies House WebFiling service, director data
Remediation: Service taken offline to prevent further exposure
Read Original

Intuitive has reported a data breach resulting from a phishing attack that compromised sensitive information. The stolen data includes customer business and contact details, as well as employee and corporate data. This breach could potentially expose affected individuals and businesses to identity theft and fraud. Phishing attacks are a common tactic used by cybercriminals to gain unauthorized access to systems, making this incident a reminder of the constant need for vigilance in cybersecurity practices. Organizations are encouraged to review their security protocols and educate employees about recognizing phishing attempts to mitigate future risks.

Impact: Customer business and contact information, employee data, corporate data
Remediation: Organizations should implement phishing awareness training for employees and review security protocols to prevent similar attacks.
Read Original

In the latter half of 2025, there was a significant rise in credential theft incidents, primarily driven by advancements in infostealer malware and AI-powered social engineering tactics. Attackers are increasingly logging into accounts rather than using traditional methods to break in. This trend affects not only individual users but also organizations that store sensitive data, making them more vulnerable to breaches. The use of sophisticated malware makes it easier for cybercriminals to harvest login credentials, which can lead to unauthorized access and data theft. Companies and users alike need to be vigilant and implement stronger security measures to protect against these evolving threats.

Impact: User accounts, organizational credentials, sensitive data systems
Remediation: Implement multi-factor authentication, regularly update passwords, and monitor account activity for suspicious logins.
Read Original

The GlassWorm malware has resurfaced, launching a coordinated attack on over 400 code repositories and packages across platforms like GitHub, npm, and VSCode/OpenVSX. Researchers discovered that this supply-chain campaign targets developers by compromising popular software extensions and packages, potentially allowing attackers to inject malicious code into legitimate projects. This incident affects a wide range of developers and organizations relying on these platforms for their software development needs. The implications are significant, as compromised code can lead to broader security vulnerabilities in applications that utilize these affected packages. Developers are urged to audit their dependencies and ensure they're using trusted sources to mitigate the risk of infection.

Impact: GitHub, npm, VSCode, OpenVSX
Remediation: Developers should audit their code dependencies and avoid using unverified packages. Regularly updating software and using security tools to monitor for vulnerabilities is also recommended.
Read Original

As ransomware payments decline to historic lows, attackers are changing their tactics to adapt to the shrinking market. Research indicates that many ransomware actors are moving away from using sophisticated tools like Cobalt Strike and are instead relying on native Windows tools to carry out their attacks. This shift comes as the frequency of data theft incidents is increasing, suggesting that attackers are looking for ways to maintain their profitability despite the challenges. The implications of this trend are concerning for organizations, as it may lead to more widespread and varied attacks that are harder to detect and defend against. Companies need to stay vigilant and adapt their security measures to counter these evolving threats.

Impact: Cobalt Strike, native Windows tools
Remediation: Organizations should enhance their security protocols, monitor for unusual activity, and consider training staff on recognizing potential threats.
Read Original

A phishing attempt targeting a C-suite executive at cybersecurity firm Outpost24 recently came to light. The attackers used trusted brands and domains to trick the executive into revealing their login credentials. Although the attack was ultimately unsuccessful, it raises concerns about the vulnerabilities even experienced professionals face when dealing with sophisticated phishing schemes. This incident serves as a reminder for organizations to remain vigilant and reinforce security training, particularly for high-level staff who are often prime targets for attackers. The tactics employed in this case reflect the evolving strategies of cybercriminals, making it crucial for companies to continually update their defenses against such threats.

Impact: Outpost24, C-suite executive credentials
Remediation: Companies should enhance security awareness training for employees, particularly executives, and implement multi-factor authentication to protect against phishing attacks.
Read Original
PreviousPage 7 of 121Next