Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Former President Donald Trump has signed an executive order aimed at preventing individual states from implementing their own regulations on artificial intelligence (AI). This decision comes amid growing calls from bipartisan members of Congress for stricter oversight of AI technologies, which many believe lack sufficient governance. The executive order may lead to a patchwork of regulations across states, complicating compliance for companies developing AI solutions. This move raises concerns about the balance between fostering innovation in AI and ensuring public safety, as unregulated AI could pose risks in various sectors, including healthcare and security. The implications of this order could significantly affect how AI is developed and deployed across the country.

Impact: AI technologies and applications in various sectors
Remediation: N/A
Read Original

Financial institutions are facing increasing pressure to combat money mule schemes, where individuals unknowingly or knowingly facilitate fraud by transferring stolen funds. The article outlines five distinct 'mule personas' that banks should be vigilant about, suggesting that a more proactive approach is necessary to detect and prevent these types of fraud. By understanding the characteristics and behaviors of these personas, banks can better identify potential threats and take action before losses occur. This shift from a defensive to an offensive strategy is essential in protecting both the institutions and their customers from financial crime. The ongoing evolution of these schemes makes it crucial for banks to adapt their methods and stay ahead of fraudsters.

Impact: Financial institutions, customers involved in money mule schemes
Remediation: Implement proactive monitoring strategies, train staff to recognize mule personas, enhance customer education on fraud prevention
Read Original

Hackers have taken advantage of a zero-day vulnerability in Gogs, a self-hosted Git service, leading to the compromise of approximately 700 servers that are accessible over the internet. This vulnerability allows attackers to execute code remotely, posing a significant risk to organizations and individuals using this platform to manage their Git repositories. Gogs, which is known for its lightweight and easy-to-deploy nature, is now under scrutiny as users scramble to secure their systems. The incident highlights the importance of promptly applying security updates and monitoring for unusual activity. Without swift action, affected servers could lead to data breaches or unauthorized access to sensitive information.

Impact: Gogs self-hosted Git service
Remediation: Users should apply any available patches for Gogs, review server configurations, and consider implementing network security measures to limit exposure.
Read Original

A recent campaign has targeted developers through the Visual Studio Code (VSCode) Marketplace, where 19 malicious extensions have been found since February. These extensions cleverly disguise malware within dependency folders, hiding it in fake PNG files. Developers using these compromised extensions are at risk, as the malware can potentially compromise their systems and projects. This incident raises alarms about the safety of third-party tools within development environments. Users are urged to be cautious when installing extensions and to verify their sources to avoid falling victim to such attacks.

Impact: VSCode Marketplace extensions, developers using these extensions
Remediation: Users should uninstall any suspicious extensions and verify the sources of the extensions they use. Regularly update VSCode and its extensions to the latest versions.
Read Original

Researchers at Wiz have discovered a serious vulnerability in Gogs, a self-hosted Git service. This flaw allows attackers to bypass a previously reported remote code execution (RCE) vulnerability that was disclosed last year. Although the specifics of the exploitation have not been detailed, the revelation indicates that the vulnerability has been exploited for months without a patch available to fix it. This situation poses significant risks for organizations that rely on Gogs for their version control, as it could lead to unauthorized access and potentially severe security breaches. Users of Gogs need to stay vigilant and consider alternative security measures while waiting for a fix.

Impact: Gogs (self-hosted Git service)
Remediation: N/A
Read Original

OpenAI has reported improvements in their defensive models, particularly with the release of GPT-5.1-Codex-Max, which achieved a 76% success rate in capability assessments. Alongside this progress, the company has raised concerns about potential cyber-risks that could arise from the use of advanced AI technologies. The implications of these risks are significant, as they could affect various sectors that rely on AI for security and operational efficiency. Organizations using AI systems need to remain vigilant and proactive in addressing these emerging threats to safeguard their data and infrastructure. As AI capabilities grow, so do the challenges in ensuring their secure deployment and use.

Impact: GPT-5.1-Codex-Max
Remediation: Organizations should implement security best practices for AI deployment and continuously monitor for vulnerabilities.
Read Original
Actively Exploited

Researchers have found 19 malicious extensions for Visual Studio Code that were designed to distribute malware. These extensions used a legitimate npm package to hide the malicious code within dependency folders, making detection difficult. The attack primarily targets developers who use Visual Studio Code, a popular code editor, potentially compromising their projects and systems. Users who have downloaded these extensions may unknowingly expose their work to hackers, which could lead to data breaches or further infections. This incident raises concerns about the security of third-party extensions and the need for vigilant monitoring of software sources.

Impact: Visual Studio Code extensions, npm packages
Remediation: Users should immediately remove any suspicious or unverified Visual Studio Code extensions and verify their projects for any signs of malware. Keeping software updated and using trusted sources for extensions can help mitigate risks.
Read Original
New ‘DroidLock’ Android Malware Locks Users Out, Spies via Front Camera

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Researchers at Zimperium zLabs have discovered a new Android malware called DroidLock, which behaves like ransomware. This malicious software can lock users out of their devices and steal sensitive information by tricking them into providing their credentials through phishing tactics. Additionally, DroidLock has the capability to stream users' screens and activate their front cameras through VNC, raising serious privacy concerns. This malware primarily targets Android users, making it essential for them to remain vigilant about their device security and be cautious of suspicious links or applications. The emergence of DroidLock emphasizes the ongoing risks associated with mobile malware and the need for users to adopt strong security practices.

Impact: Android devices
Remediation: Users should avoid clicking on unknown links, regularly update their devices, and consider using security applications that can detect and mitigate malware.
Read Original

Danielle Hillmer, a former employee of Accenture, has been charged with fraud related to cybersecurity practices. The allegations state that she knowingly misled clients about the company's cloud platform, claiming it met the Department of Defense's requirements when it did not. This situation raises concerns about the integrity of cybersecurity measures in handling sensitive government data. If proven guilty, Hillmer could face serious penalties, and the case underscores the importance of transparency in cybersecurity services, especially for clients in critical sectors like defense. This incident may also prompt reviews of compliance protocols within companies that serve government contracts.

Impact: Accenture's cloud platform
Remediation: N/A
Read Original

CyberVolk has reemerged with its new VolkLocker ransomware-as-a-service, which comes with some notable features but also a significant design flaw. Researchers have identified a major vulnerability that could allow security teams to mitigate attacks more effectively. This flaw raises concerns for businesses and organizations that could be targeted by this ransomware, as it may lead to increased incidents of data theft and disruption. Cyber defenders need to be vigilant and prepare for potential attacks stemming from this new variant. Understanding the weaknesses in VolkLocker could help in developing strategies to counteract its effects and protect sensitive information.

Impact: VolkLocker ransomware
Remediation: Implement security measures to detect and block ransomware attacks, regularly back up data, and educate staff on phishing and social engineering tactics.
Read Original

MITRE has released the results of its 2025 ATT&CK Enterprise Evaluations, where eleven cybersecurity companies participated. Some of these companies reported achieving 100% detection and coverage rates during the evaluation process. This evaluation is significant as it provides insights into the effectiveness of various security solutions against known tactics and techniques used by attackers. By assessing how well these companies can detect and respond to simulated cyber threats, organizations can make more informed decisions about their cybersecurity investments. The results may influence how businesses approach their security strategies moving forward.

Impact: N/A
Remediation: N/A
Read Original

Hackers have taken advantage of a serious unpatched zero-day vulnerability in Gogs, a widely used self-hosted Git service, allowing them to execute remote code on exposed servers. This breach has impacted around 700 Internet-facing instances, putting sensitive data at risk and potentially leading to further attacks. The vulnerability is particularly concerning because it remains unpatched, leaving many servers vulnerable to exploitation. Users of Gogs should take immediate action to secure their systems, as the lack of a fix means attackers can easily compromise servers. This incident serves as a reminder for organizations to prioritize timely software updates and security measures to protect their infrastructure.

Impact: Gogs self-hosted Git service
Remediation: Users should apply any available updates or patches from Gogs as soon as they are released and consider implementing network security measures to restrict access to their servers.
Read Original

In April 2025, a significant data breach at the Pierce County Library compromised the personal information of around 340,000 individuals, including library patrons, employees, and their family members. The stolen data may include sensitive details, raising concerns about identity theft and privacy violations. As libraries often hold extensive personal information, this incident highlights the vulnerability of public institutions to cyberattacks. The breach not only affects those directly involved but also puts the library's reputation and trustworthiness at risk. Community members are urged to monitor their accounts and take precautions to protect their personal information.

Impact: Personal information of 340,000 library patrons, employees, and their family members
Remediation: Affected individuals should monitor their accounts and consider identity theft protection measures.
Read Original
Scammers Sent 40,000 E-Signature Phishing Emails to 6,000 Firms in Just 2 Weeks

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A recent phishing campaign has targeted around 6,000 companies, sending over 40,000 fraudulent emails that appeared to come from trusted services like SharePoint and DocuSign. These emails contained malicious links disguised by reputable redirect services, making it easier for scammers to trick recipients into clicking. The scale and speed of this attack raise concerns about the vulnerability of businesses to such tactics, which exploit the trust users place in well-known platforms. Companies need to be vigilant, as these phishing attempts can lead to data breaches or financial loss if employees fall for the scams. Ensuring proper training and awareness around phishing tactics is crucial for organizations to protect themselves.

Impact: SharePoint, DocuSign, e-signature services
Remediation: Employees should be trained to recognize phishing attempts and verify the authenticity of emails before clicking on links.
Read Original

Cybersecurity experts are reporting a surge in malware attacks exploiting a serious vulnerability in the React library, known as React2Shell. This vulnerability allows attackers to execute code remotely without authentication, putting many applications at risk. React is widely used for building user interfaces, meaning a broad range of developers and companies could be affected. The situation is concerning as it opens the door for various types of malware to be deployed against unsuspecting users. Companies using React should take immediate action to assess their systems and implement security measures to protect against these attacks.

Impact: React library versions affected by the React2Shell vulnerability.
Remediation: Developers should update to the latest version of the React library and apply any available security patches. Regular security audits and code reviews are also recommended to identify and mitigate potential vulnerabilities.
Read Original
PreviousPage 75 of 101Next