Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Japanese companies, including manufacturers and retailers, have fallen victim to a series of ransomware attacks that have severely disrupted their operations. These incidents have affected not only private businesses but also government entities, leading to prolonged recovery times that can stretch over several months. The attackers are leveraging vulnerabilities in systems to encrypt critical data, causing significant financial and operational losses. As organizations struggle to restore services and secure their networks, the situation raises concerns about the overall cybersecurity posture in Japan. This trend highlights the need for improved defenses against ransomware, especially for sectors that are vital to the economy.

Impact: Manufacturers, retailers, Japanese government systems
Remediation: Organizations should enhance their cybersecurity measures, conduct regular backups, and implement robust incident response plans.
Read Original
Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

Varonis threat analysts have identified a new phishing kit named Spiderman that specifically targets European banks and cryptocurrency customers. This kit automates the process of stealing users' credentials and personal information, creating a complete identity profile of the victim. The implications of this attack are significant, as it not only compromises individual accounts but can also lead to broader financial fraud and identity theft. Banks and crypto platforms should be on high alert and enhance their security measures to protect against this sophisticated threat. Users must also remain vigilant and be cautious about sharing their information online.

Impact: European banks, cryptocurrency platforms
Remediation: Banks and crypto platforms should enhance security protocols, implement two-factor authentication, and educate users on recognizing phishing attempts.
Read Original

Shanya, a new packing malware, has emerged as a tool for ransomware groups. It specializes in obfuscating malicious payloads, making it harder for security software to detect attacks. This malware not only hides ransomware but also disables endpoint detection and response (EDR) systems, leaving networks vulnerable to exploitation. The rise of such tools poses a significant risk to organizations, as they can facilitate successful ransomware attacks by evading traditional security measures. Companies should be vigilant and enhance their security protocols to combat this evolving threat.

Impact: Ransomware, EDR systems
Remediation: Organizations should enhance security protocols and consider implementing advanced detection systems to identify obfuscated threats.
Read Original

North Korea-linked cyber actors are exploiting a recently identified vulnerability in React Server Components known as React2Shell to deploy a new remote access trojan called EtherRAT. This malware utilizes Ethereum smart contracts to manage command-and-control communications and can establish multiple persistence mechanisms on Linux systems. The emergence of EtherRAT marks a concerning development as it allows attackers to maintain access to compromised systems. Companies using React Server Components need to be vigilant and update their systems to mitigate this risk. The situation emphasizes the ongoing threat posed by state-sponsored hacking groups and the importance of timely patching of known vulnerabilities.

Impact: React Server Components (RSC), Linux systems
Remediation: Update systems to patch the React2Shell vulnerability; specific patch details not provided.
Read Original

Sysdig has identified a series of advanced cyberattacks exploiting a vulnerability known as React2Shell, which has been linked to North Korean hacker groups. These campaigns are distributing a type of malware called EtherRAT, which allows attackers to take control of compromised systems. This situation poses a significant risk to organizations that may be using affected systems, as it could lead to unauthorized access to sensitive data and networks. The involvement of North Korean actors suggests that these attacks might be part of a broader strategy to target specific industries or organizations. Companies should be vigilant and ensure their systems are secured against this type of exploitation.

Impact: React2Shell vulnerability, EtherRAT malware
Remediation: Organizations should apply security patches, update their systems, and monitor for unusual activity related to EtherRAT.
Read Original

Ivanti has issued a warning to customers regarding a serious vulnerability in its Endpoint Manager (EPM) software that could allow remote code execution by attackers. This flaw could potentially enable unauthorized access to systems managed by EPM, posing a significant risk to organizations using the software. Users are urged to apply patches as soon as possible to protect their systems from potential exploitation. The vulnerability affects various versions of Ivanti's Endpoint Manager, making it crucial for affected organizations to act quickly. Failure to address this issue could lead to severe security breaches, including data theft and system compromise.

Impact: Ivanti Endpoint Manager (EPM) versions affected, specific versions not specified.
Remediation: Customers are advised to patch their Endpoint Manager software immediately; specific patch details not provided.
Read Original

A 19-year-old hacker was arrested in Barcelona by Spain's National Police for allegedly stealing 64 million personal data records from nine different companies. The suspect reportedly attempted to sell this vast trove of data, which raises significant concerns about the security of personal information and the potential harm to individuals whose data was compromised. The incident highlights ongoing vulnerabilities in corporate cybersecurity practices and the need for stronger protections against data breaches. Authorities are investigating the extent of the breaches and the methods used to obtain the data. This case serves as a reminder for companies to prioritize data security and for individuals to stay vigilant about their personal information online.

Impact: 64 million personal data records from nine companies
Remediation: Companies should enhance their cybersecurity measures to prevent breaches and secure personal information.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and international partners, is warning about potential cyber threats from pro-Russia hacktivist groups. These groups are targeting critical infrastructure sectors, which could lead to significant disruptions in services and operations. The alert emphasizes the need for organizations to strengthen their cybersecurity measures and remain vigilant against possible attacks. This warning comes amid ongoing geopolitical tensions, making it crucial for sectors like energy, transportation, and healthcare to assess their security posture. Companies are encouraged to implement best practices to defend against these threats, ensuring that they are prepared for any potential disruptions.

Impact: Critical infrastructure sectors including energy, transportation, and healthcare
Remediation: Organizations should strengthen cybersecurity measures and implement best practices to defend against potential attacks.
Read Original

The UK’s National Cyber Security Centre (NCSC) has issued a warning about prompt injection attacks, emphasizing that these threats should not be casually compared to SQL injection vulnerabilities. While both involve manipulating inputs to exploit systems, prompt injection specifically targets AI models, allowing attackers to manipulate responses generated by these systems. This distinction is crucial because prompt injection can lead to significant data breaches or misinformation if exploited successfully. The NCSC's alert serves as a timely reminder for organizations to evaluate their AI systems for potential vulnerabilities and to implement safeguards against such attacks. Addressing prompt injection is essential for maintaining the integrity and reliability of AI applications.

Impact: AI models and systems that utilize prompt-based inputs
Remediation: Organizations should review their AI model configurations and input validation processes to mitigate the risks associated with prompt injection attacks.
Read Original

Vitas Hospice, the largest for-profit hospice chain in the U.S., reported a data breach that has compromised the personal information of over 300,000 individuals. The breach was discovered in October, raising concerns about the security of sensitive health data. Although specific details about the nature of the cybersecurity intrusion have not been disclosed, affected individuals may face risks such as identity theft and unauthorized access to their medical records. This incident underscores the need for healthcare organizations to strengthen their cybersecurity measures and protect sensitive patient information. Vitas is likely to face scrutiny as it works to address the fallout from this breach.

Impact: Personal information of over 300,000 individuals, including sensitive health data.
Remediation: N/A
Read Original

Gartner has recommended that organizations halt the use of AI-powered browsers due to rising security concerns. This call comes amid worries that these browsers could expose sensitive data and increase the risk of cyberattacks. Many companies are already integrating AI capabilities into their web browsing tools, but Gartner warns that these technologies may not be adequately secured. As organizations adopt these tools, they need to be aware of the potential vulnerabilities and the implications for data protection. The recommendation serves as a caution for businesses to reassess their current use of AI browsers before any incidents occur.

Impact: AI-powered browsers from various vendors
Remediation: Organizations should block AI browsers until security measures improve.
Read Original

Researchers at the University of Pisa have developed a new method to maintain image signatures even after cropping, addressing a significant vulnerability in image verification. Current authentication tools often fail when an image is altered, which allows deepfake images to manipulate public opinion, spread misinformation, and impact news cycles. This innovation aims to provide a more reliable way to verify the authenticity of images, making it harder for malicious actors to exploit cropped images for deceptive purposes. The ability to verify images post-cropping could help restore trust in visual media, which is increasingly crucial in today's digital landscape where misinformation can spread rapidly. This development is particularly relevant for journalists, social media platforms, and anyone relying on visual content for information.

Impact: N/A
Remediation: N/A
Read Original

On December 2025 Patch Tuesday, a total of 57 Common Vulnerabilities and Exposures (CVEs) were reported, including one critical zero-day vulnerability and two others that have been publicly disclosed. The zero-day is particularly concerning as it is actively exploited, meaning attackers may already be using it to compromise systems. Users and organizations running affected software should prioritize applying the latest patches to mitigate these risks. The vulnerabilities impact various products and systems, highlighting the ongoing need for vigilance in cybersecurity practices. Keeping software updated is essential to defend against potential exploitation.

Impact: Various software products from multiple vendors (specific products not detailed)
Remediation: Apply the latest patches released during December 2025 Patch Tuesday
Read Original

Recent reports indicate that various ransomware groups are utilizing a tool called Shanya, a packer-as-a-service platform, to enhance their ability to evade detection by endpoint security solutions. This tool assists attackers in bypassing endpoint detection and response (EDR) systems, making it easier for them to execute their malicious activities without being flagged. The use of Shanya shows a trend where ransomware operations are becoming more sophisticated, posing a significant risk to organizations that rely on EDR products for cybersecurity. Companies could be at greater risk of data breaches and financial losses if they do not update their security measures to counter these evolving tactics. As ransomware attacks continue to rise, understanding and mitigating these new methods is crucial for protecting sensitive information.

Impact: EDR systems and endpoint security products
Remediation: Organizations should enhance their endpoint detection capabilities and consider updating their security measures to recognize and block the use of packers like Shanya.
Read Original

Two malicious extensions on Microsoft's Visual Studio Code Marketplace have been found to deploy information-stealing malware on developers' machines. This malware is capable of taking screenshots, stealing credentials, and hijacking browser sessions, posing a significant threat to developers' security and privacy.

Impact: Visual Studio Code Marketplace, Developers' machines
Remediation: Users should remove the malicious extensions immediately and ensure their development environments are secure. Regularly update software and use security tools to detect and prevent malware.
Read Original
PreviousPage 78 of 101Next