Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Asahi Group, a major beverage and food company, is facing significant challenges after a ransomware attack that severely disrupted its operations. The company's CEO has announced plans to potentially establish a dedicated cybersecurity unit in response to this incident. This move comes as organizations worldwide increasingly recognize the need for stronger defenses against cyber threats, especially after high-profile attacks like this one. The attack not only affected Asahi's internal systems but also raises concerns about the security of sensitive customer and company data. Strengthening cybersecurity measures is crucial for Asahi to protect its assets and regain consumer trust moving forward.

Impact: Asahi Group's internal systems, customer data
Remediation: Considering the establishment of a dedicated cybersecurity unit
Read Original

The French Interior Minister has confirmed that the Ministry of the Interior suffered a cyberattack that compromised its email servers. This incident raises concerns about the security of sensitive governmental communications and potentially exposes personal data. Although specific details about the attackers or the extent of the breach have not been disclosed, the attack highlights vulnerabilities in governmental cybersecurity measures. Such breaches can undermine public trust and may have implications for national security. Authorities are likely to investigate the matter further to assess the damage and prevent future incidents.

Impact: French Ministry of the Interior email servers
Remediation: N/A
Read Original

Atlassian has addressed a significant security vulnerability in Apache Tika, which affects several of its products including Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, and Jira. This flaw poses a risk as it could potentially allow attackers to exploit the software, putting user data at risk. The company has released software updates to patch the vulnerability, urging users to apply these updates promptly to ensure their systems remain secure. This incident underscores the importance of regularly updating software to protect against known vulnerabilities. Users of the affected products should prioritize these updates to safeguard their environments from potential exploitation.

Impact: Bamboo, Bitbucket, Confluence, Crowd, Fisheye/Crucible, Jira
Remediation: Software updates released by Atlassian for affected products.
Read Original

Apple has released security updates to address two vulnerabilities in WebKit, identified as CVE-2025-14174 and CVE-2025-43529, which are currently being exploited in the wild. The first vulnerability, CVE-2025-14174, was previously patched by Google for its Chrome desktop browser, but details were limited at that time. This flaw allows for out-of-bounds memory access, potentially enabling attackers to execute arbitrary code. Users of Apple devices, particularly those running Safari or any applications reliant on WebKit, should prioritize updating their systems to safeguard against these vulnerabilities. Ignoring these updates could leave devices exposed to active exploitation.

Impact: Affected products include Apple devices running Safari and any applications using WebKit. Specific versions or models are not detailed, but all users of Apple's operating systems should be cautious.
Remediation: Users should update their Apple devices to the latest version of the operating system to apply the security patches addressing CVE-2025-14174 and CVE-2025-43529.
Read Original

MITRE has released its Top 25 list of dangerous software weaknesses for 2025, based on an analysis of nearly 40,000 Common Vulnerabilities and Exposures (CVEs). This list identifies the most critical flaws that could be exploited by attackers, affecting a wide range of software and hardware products. Developers and organizations need to be aware of these vulnerabilities to improve their security measures and protect against potential breaches. The findings serve as a crucial resource for cybersecurity professionals aiming to prioritize their efforts in addressing these weaknesses. By understanding and mitigating these risks, companies can better safeguard their systems and data from malicious actors.

Impact: Various software and hardware products
Remediation: Organizations should review the Top 25 CWE list and implement necessary security measures to address identified weaknesses.
Read Original

The UK’s National Cyber Security Centre (NCSC) is urging businesses to implement the Cyber Essentials framework within their supply chains. This initiative aims to enhance cybersecurity practices among suppliers, which are often the weakest link in a company’s security posture. By adopting these guidelines, businesses can better protect themselves from cyber threats that may arise from third-party vendors. The NCSC emphasizes that this step is crucial for safeguarding sensitive data and maintaining customer trust. As cyber attacks become more sophisticated, ensuring that suppliers meet certain cybersecurity standards is essential for overall security.

Impact: N/A
Remediation: Businesses should adopt the Cyber Essentials framework for their suppliers.
Read Original
Actively Exploited

In December 2025, researchers identified a serious vulnerability in React, designated as CVE-2025-55182, which has led to a surge in attacks on services that use React2Shell. This vulnerability affects numerous applications built with the React framework, making them targets for malicious actors. Attackers are exploiting this flaw to gain unauthorized access to systems, which could lead to data breaches or service disruptions. Organizations utilizing React-enabled services are urged to take immediate action to safeguard their systems. The situation is critical, as the exploitation of this vulnerability poses significant risks to businesses and users globally.

Impact: React2Shell applications, React framework versions affected are not specified.
Remediation: Organizations should apply the latest security patches for the React framework, conduct vulnerability assessments, and implement monitoring to detect any suspicious activities. Regular updates and reviews of security protocols are also recommended to mitigate risks.
Read Original

Microsoft has acknowledged that its December 2025 security updates are causing failures in Message Queuing (MSMQ) functionality. This issue is impacting enterprise applications and Internet Information Services (IIS) websites, potentially disrupting business operations. Users and organizations relying on these services may experience significant downtime and communication issues, as MSMQ is crucial for message delivery in distributed applications. Microsoft has not yet provided specific patches or workarounds to resolve this problem, leaving affected users in a challenging situation until a fix is released. This situation highlights the importance of thorough testing of security updates before deployment, especially in enterprise environments.

Impact: Message Queuing (MSMQ), Internet Information Services (IIS), enterprise applications
Remediation: N/A
Read Original

Apple has issued updates for macOS and iOS to address two zero-day vulnerabilities in WebKit that were found to be exploited in a highly sophisticated attack. These vulnerabilities could allow attackers to execute malicious code on affected devices, potentially compromising user data and privacy. The updates are crucial for users of Apple's platforms, as they help protect against active threats that exploit these flaws. Users are encouraged to install the latest updates to ensure their devices are secure. This incident also raises concerns about the interconnectedness of browser vulnerabilities, as these flaws are linked to a Chrome exploit, indicating that security issues can cross platform boundaries.

Impact: macOS, iOS, WebKit
Remediation: Install the latest macOS and iOS updates that patch the vulnerabilities.
Read Original

A new report from the Center for Cybersecurity Policy and Law raises concerns about mobile security as the European Union's Digital Markets Act (DMA) takes effect. The DMA mandates that major platform providers allow third-party developers access to key software and hardware features for better interoperability. While this aims to foster competition, experts warn it could weaken the security controls that have traditionally protected mobile devices. As apps and services become more interconnected through these new regulations, there is a risk that vulnerabilities could be introduced, potentially exposing user data and device integrity. This shift could affect millions of users across various mobile ecosystems, raising urgent questions about how security will be maintained in a more open environment.

Impact: Mobile devices and applications on major platforms such as Android and iOS
Remediation: Companies should evaluate their security protocols and consider enhancing their app vetting processes as new interoperability requirements are implemented.
Read Original

CyberVolk, a pro-Russian hacktivist group, has launched a new ransomware-as-a-service (RaaS) called VolkLocker, which has a significant flaw. Researchers from SentinelOne discovered that VolkLocker contains a hard-coded master key, allowing victims to decrypt their files without paying the ransom. This ransomware, which surfaced in August 2025, targets Windows systems and is part of an ongoing trend of ransomware attacks that can disrupt businesses and individuals alike. The presence of this flaw means that while the ransomware may still be a concern, victims have a potential way to recover their data without succumbing to the attackers' demands. This incident underscores the ongoing battle between cybercriminals and security researchers, as vulnerabilities in ransomware can lead to unexpected outcomes for victims.

Impact: Windows systems
Remediation: Victims can decrypt files using the hard-coded master key; no specific patches or updates are mentioned.
Read Original

A new email scam is exploiting PayPal's subscription feature to send deceptive purchase notifications. These emails appear legitimate as they come from PayPal but contain links directing users to fraudulent sites. The scam takes advantage of the way PayPal's subscription system generates email notifications, making it challenging for recipients to discern the authenticity of the messages. Users who fall for these scams could inadvertently share personal information or financial details with malicious actors. It's crucial for PayPal users to be cautious when receiving unexpected purchase notifications and to verify any claims before taking action.

Impact: PayPal users
Remediation: Users should verify email sender addresses, avoid clicking on links in unexpected emails, and report suspicious messages to PayPal.
Read Original

The latest Security Affairs Malware Newsletter highlights several significant malware developments affecting multiple countries. Notably, the UDPGangster campaigns are targeting various regions, posing risks to users and organizations. Researchers also discuss ransomware trends related to the Bank Secrecy Act, shedding light on how financial institutions might be affected between 2022 and 2024. Additionally, the return of the ClayRat malware introduces expanded features and techniques that could complicate detection and mitigation efforts. Another concerning finding is the SEEDSNATCHER, an Android malware that targets crypto wallets, raising alarms for cryptocurrency users. These incidents highlight the evolving tactics employed by cybercriminals and the need for heightened security measures.

Impact: Android devices, cryptocurrency wallets, financial institutions
Remediation: Users should ensure their devices are updated with the latest security patches, utilize reputable antivirus software, and remain vigilant against suspicious links or downloads.
Read Original

A significant security oversight was uncovered when researchers found an unsecured 16TB MongoDB database that exposed approximately 4.3 billion professional records. This database primarily contained LinkedIn-style data, which could be exploited for large-scale AI-driven social engineering attacks. The discovery was made by Bob Diachenko and nexos.ai on November 23, 2025, and the database was secured only after the researchers alerted its owner. This incident underscores the risks associated with unsecured databases, as the exposed data could facilitate identity theft and phishing schemes targeting professionals. Organizations need to ensure better security measures for their data to prevent such breaches in the future.

Impact: Unsecured MongoDB database, professional records, LinkedIn-style data
Remediation: Database secured after researcher notification; organizations should implement strict access controls and regular security audits.
Read Original
UK’s ICO Fine LastPass £1.2 Million Over 2022 Security Breach

Hackread – Cybersecurity News, Data Breaches, AI, and More

The UK's Information Commissioner's Office (ICO) has imposed a £1.2 million fine on LastPass following a significant data breach in 2022 that compromised the personal information of 1.6 million users. The breach was traced back to a vulnerability in an employee's personal computer, which allowed attackers to access sensitive data. This incident raises serious concerns about the security practices of password management services, especially considering the potential for misuse of the exposed information. Users of LastPass are now at increased risk of phishing attacks and identity theft. The fine serves as a reminder for companies to enhance their cybersecurity measures and protect user data more effectively.

Impact: LastPass user accounts and associated personal data
Remediation: Companies should conduct thorough security audits and ensure employees follow strict cybersecurity protocols, particularly when using personal devices for work.
Read Original
PreviousPage 73 of 101Next