Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The article discusses how the shift towards open-source libraries and AI-powered coding tools is creating new risks for software development. As developers increasingly rely on third-party resources to speed up their work, they unintentionally expose their projects to vulnerabilities that can be exploited by cybercriminals. These risks affect a wide range of companies and software products, as attackers look for weak points in the development process. The growing use of AI for coding assistance also raises concerns about the potential for introducing flaws or malicious code without developers' awareness. This situation emphasizes the need for businesses to assess their third-party dependencies and implement stronger security measures.

Impact: Open-source libraries, AI-powered coding tools
Remediation: Companies should evaluate their use of third-party libraries and AI tools, implement security assessments, and establish guidelines for secure coding practices.
Read Original

The Texas Attorney General has filed a lawsuit against five major television manufacturers, claiming they illegally collected user data by using Automated Content Recognition (ACR) technology to monitor what viewers watch. The lawsuit alleges that these companies failed to inform users about this data collection, raising significant privacy concerns. ACR technology allows devices to identify and record content without the viewer's explicit consent, which the state argues is a violation of consumer protection laws. This case underscores the ongoing debate over user privacy and data collection practices in smart devices, particularly as more households adopt smart TVs. If successful, the lawsuit could lead to stricter regulations on how companies handle user data in the future.

Impact: Smart TVs from five major manufacturers (not specified)
Remediation: N/A
Read Original

Urban VPN Proxy, a browser extension, is facing accusations of collecting users' AI chat conversations without their consent. This raises significant privacy concerns, especially for users who rely on the VPN service for secure browsing. Researchers discovered that the extension may be logging sensitive information, which could potentially be misused or exposed. The implications of this practice are serious, as it undermines user trust in VPN services, which are typically used to protect privacy online. Users of Urban VPN should be aware of these allegations and consider the risks associated with using this tool for private communications.

Impact: Urban VPN Proxy browser extension
Remediation: Users should consider uninstalling the Urban VPN Proxy extension and switching to a reputable VPN service that prioritizes user privacy.
Read Original

Urban VPN Proxy, a browser extension that claims to enhance user privacy, has been found to collect sensitive data from interactions with various AI chatbots, including ChatGPT, Claude, Gemini, and Copilot. This means that conversations users believe are private may actually be harvested and stored by the extension. Researchers discovered that the extension is gathering information without user consent, raising serious privacy concerns. With around 8 million users potentially affected, the implications are significant, as sensitive personal data could be misused. Users should be cautious about the extensions they install and the permissions they grant, especially those that claim to protect their privacy.

Impact: Urban VPN Proxy extension, ChatGPT, Claude, Gemini, Copilot
Remediation: Users should uninstall the Urban VPN Proxy extension and review other extensions for privacy practices.
Read Original

JumpCloud has identified a vulnerability in its Remote Assist feature for Windows that could allow attackers to escalate privileges locally or launch denial-of-service attacks on managed endpoints. This flaw affects systems running the JumpCloud Windows Agent, posing a risk to organizations that rely on this software for remote management. If exploited, the vulnerability could give unauthorized users elevated access to sensitive system functions, potentially leading to further malicious actions. Users and administrators of JumpCloud services should be aware of this issue and take steps to secure their systems. It's crucial for organizations to stay informed about such vulnerabilities to protect their data and infrastructure.

Impact: JumpCloud Remote Assist for Windows, JumpCloud Windows Agent
Remediation: Users should apply any available patches or updates from JumpCloud to mitigate the risk. Specific patch numbers or versions are not mentioned.
Read Original

Amazon has alerted users that Sandworm, a group associated with Russia's military intelligence, has changed its approach to cyberattacks. Instead of exploiting software vulnerabilities, the group is now targeting poorly configured network edge devices to maintain access to their targets. This shift raises concerns for organizations that may not have secured their network configurations adequately. The focus on these devices suggests attackers are adapting their strategies to exploit weaknesses in network management rather than relying on traditional software flaws. This change could lead to increased risks for various industries, especially those with critical infrastructure that may be vulnerable due to lax network settings.

Impact: Network edge devices, poorly configured systems
Remediation: Organizations should review and secure their network edge devices, ensuring proper configuration and access controls are in place.
Read Original

Petróleos de Venezuela (PDVSA), the state-owned oil company of Venezuela, experienced a cyberattack over the weekend that significantly disrupted its export operations. The attack affected the company's ability to manage and deliver oil exports, which are crucial for the Venezuelan economy. While specific details about the nature of the attack remain unclear, it raises concerns about the security of critical infrastructure in the oil sector. This incident is particularly alarming given PDVSA's already precarious financial situation and the importance of oil exports for the country's revenue. The attack serves as a reminder of the vulnerabilities faced by major corporations, especially in politically sensitive regions.

Impact: PDVSA's export operations
Remediation: N/A
Read Original

Ransomware groups are increasingly targeting hypervisors, which are the underlying technology that allows multiple virtual machines to run on a single physical server. This approach enables attackers to encrypt multiple virtual machines simultaneously with a single breach, significantly increasing the impact of their attacks. Researchers at Huntress have found that these attackers exploit gaps in visibility and security at the hypervisor layer. Organizations need to take proactive steps to secure their virtualization infrastructure against these threats. This includes implementing stricter access controls, regular monitoring, and keeping systems updated to defend against potential ransomware attacks that can disrupt operations and lead to data loss.

Impact: Hypervisors, virtual machines, virtualization infrastructure
Remediation: Organizations should implement stricter access controls, maintain regular monitoring of virtualization environments, and ensure systems are kept up to date with the latest security patches.
Read Original

As the holiday season approaches, the US Treasury is warning consumers about several prevalent scams, including a tactic known as 'gift card draining.' Scammers often trick individuals into buying gift cards under false pretenses and then demand the card information, leaving victims with empty balances. The warning highlights the importance of being cautious when receiving unsolicited messages asking for payment through gift cards. This is particularly relevant as many people are shopping online, making them more susceptible to these types of scams. The Treasury advises consumers to verify the legitimacy of requests and to report any suspicious activity to authorities.

Impact: Gift cards, consumer transactions
Remediation: Verify requests for gift card payments, report suspicious activity to authorities.
Read Original

Askul, a company specializing in e-commerce and logistics, suffered a significant data breach when the RansomHouse ransomware group targeted it in October. Around 700,000 records were compromised during this attack, raising concerns about the exposure of sensitive customer and business information. The incident highlights the ongoing risks faced by online retailers and logistics providers in today's digital landscape. Organizations like Askul must bolster their cybersecurity measures to protect against such threats and safeguard customer trust. The breach serves as a reminder for all businesses to remain vigilant and proactive in their security practices.

Impact: 700,000 customer and business records from Askul
Remediation: Companies should enhance their cybersecurity protocols, including regular data backups, employee training on phishing, and implementation of multi-factor authentication.
Read Original
Actively Exploited

A recent study has revealed that most parked domains—those that are expired, dormant, or commonly misspelled versions of popular sites—are now being used to host malicious content. These domains are redirecting users to scam sites or distributing malware, creating significant risks for individuals who may unknowingly type in these addresses. This trend highlights the dangers of direct navigation, where users enter URLs manually. As attackers exploit these parked domains, both casual internet users and organizations may find themselves vulnerable to online scams and security breaches. Awareness and caution are essential for users to avoid falling victim to these tactics.

Impact: Parked domains, expired domains, common misspellings of popular websites
Remediation: Users should double-check URLs before visiting, use security software that warns against malicious sites, and avoid entering sensitive information on unfamiliar domains.
Read Original
JumpCloud Remote Assist Flaw Lets Users Gain Full Control of Company Devices

Hackread – Cybersecurity News, Data Breaches, AI, and More

A serious vulnerability identified as CVE-2025-34352 affects the JumpCloud Remote Assist for Windows agent, allowing local users to gain full SYSTEM privileges on company devices. Discovered by XM Cyber, this flaw poses a significant risk to organizations using the software, as it could enable unauthorized access and control over sensitive company systems. Businesses are strongly urged to update their JumpCloud software to version 0.317.0 or later to mitigate this high-severity security issue. Failure to address this vulnerability could lead to severe operational disruptions and data breaches. Immediate action is crucial to ensure the safety and integrity of company devices and networks.

Impact: JumpCloud Remote Assist for Windows, versions prior to 0.317.0
Remediation: Update to JumpCloud Remote Assist version 0.317.0 or later
Read Original

European law enforcement has successfully dismantled a fraud network that operated call centers in Ukraine, scamming victims across the continent out of more than 10 million euros. The operation targeted individuals in various European countries, using deceptive tactics to trick them into handing over money. Authorities have not only shut down the call centers but also arrested several individuals involved in the scheme. This incident underscores the ongoing issue of fraud operations exploiting technology to defraud unsuspecting victims. The dismantling of this network is a significant step in combating such scams, which have become increasingly prevalent in recent years.

Impact: Victims across Europe
Remediation: N/A
Read Original

JumpCloud has a serious vulnerability in its Remote Assist feature that could allow attackers to gain control of affected systems. This flaw enables unauthorized users to write or delete files, which can lead to acquiring system privileges. The vulnerability poses a significant risk to organizations using JumpCloud's services, as it could lead to data breaches or system compromises. Users and companies that rely on this remote assistance tool need to take immediate action to secure their systems. It’s important to stay informed about any patches or updates from JumpCloud to mitigate this risk.

Impact: JumpCloud Remote Assist
Remediation: Users are advised to apply any available patches from JumpCloud and review their security settings to prevent unauthorized access.
Read Original

The rise of AI-assisted coding and app development is putting significant pressure on security and privacy teams within companies. As the number of applications grows rapidly and changes occur more frequently, these teams are struggling to keep up with the expanding surface area they need to protect. This situation may lead to vulnerabilities and security gaps, as existing staff levels often remain unchanged despite the increased workload. Companies need to integrate data security and privacy measures directly into the coding process to mitigate risks and ensure that applications are secure from the outset. Without this proactive approach, organizations may find themselves exposed to various cybersecurity threats.

Impact: N/A
Remediation: Integrate data security and privacy measures into the coding process.
Read Original
PreviousPage 71 of 101Next