The US Treasury's Financial Crimes Enforcement Network has reported that ransomware payments have reached $4.5 billion since 2013, highlighting the increasing severity and prevalence of ransomware attacks. This data underscores the urgent need for enhanced cybersecurity measures and awareness as these attacks continue to evolve and impact various sectors.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Recent data from the U.S. Treasury shows that while the total amount paid in ransomware attacks dropped significantly by one-third to $734 million, the number of victims remains largely unchanged, falling only 2% last year. This suggests that although fewer payments are being made, the ransomware problem is still widespread and persistent. Many organizations continue to face attacks, indicating that cybercriminals are still active and finding new ways to exploit vulnerabilities. The decline in payments could be attributed to better security practices or a shift in how companies respond to demands. Overall, while there is some cautious optimism about the decrease in payments, the ongoing prevalence of ransomware means that businesses and individuals must remain vigilant.
Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The JS#SMUGGLER campaign is a sophisticated web attack that employs obfuscated JavaScript and hidden HTA files to deploy the NetSupport RAT on Windows desktops. This malware allows attackers to gain full remote control over infected systems, posing a significant threat to user security and privacy.
The FBI has issued a warning about criminals manipulating publicly available images to create fake 'proof-of-life' photos for virtual kidnapping ransom scams. This alarming tactic poses a significant threat as it exploits social media to deceive victims and their families into believing loved ones are in danger, thereby increasing the likelihood of ransom payment.
Google has enhanced Chrome's agentic browsing protections to defend against indirect prompt injection attacks. The new features include a user alignment critic, expanded origin-isolation capabilities, and user confirmations, aimed at improving user security and reducing the risk of exploitation.
The UK cyber agency has issued a warning that large language models (LLMs) will always be susceptible to prompt injection attacks, a vulnerability seen as an inherent flaw in generative AI technology. This highlights ongoing concerns within the research community regarding the security of AI systems and their potential exploitation.
Infosecurity Magazine
The article discusses a new version of ClayRat Android spyware that has enhanced surveillance and device-control capabilities, indicating an increase in the potential for unauthorized access to personal data. This development poses a significant risk to Android users, as the spyware may be used for malicious purposes such as spying and data theft.
The article discusses the importance of cybersecurity for early years practitioners in protecting sensitive information about children and their settings from online threats and accidental damage. It emphasizes the need for proper security measures to safeguard against potential cybercriminal activities.
The article provides guidance for individuals and families on how to protect themselves from the impact of data breaches. It emphasizes the importance of proactive measures to safeguard personal information and mitigate risks associated with potential breaches.
Infosecurity Magazine
A data breach at Marquis Software Solutions has compromised the personal information of over 780,000 individuals across the United States due to a firewall vulnerability. This incident highlights the critical need for robust cybersecurity measures to protect sensitive data from exploitation.
The article provides guidance on how to identify scammers impersonating employees of the National Cyber Security Centre (NCSC). It emphasizes the importance of verifying the legitimacy of communications to protect against potential cyber threats. The implications highlight the ongoing risk of scams targeting individuals and organizations under the guise of official cybersecurity communications.
AWS Security has reported that multiple China-linked threat actors began exploiting the React2Shell vulnerability (CVE-2025-55182) within hours of its disclosure. Although this flaw does not affect AWS services, the rapid exploitation highlights the urgency for organizations to address this vulnerability to prevent potential breaches.
Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
The Space Bears ransomware group claims to have stolen data from Comcast through a breach at Quasar Inc., threatening to release the data publicly. This incident highlights the ongoing risks associated with ransomware attacks and the potential exposure of sensitive information from large corporations.
Tri-Century Eye Care has suffered a data breach due to an attack by the Pear ransomware group, which has reportedly stolen over 3 terabytes of sensitive data. This incident has affected approximately 200,000 individuals, raising significant concerns about the security of personal information in the healthcare sector.
Infosecurity Magazine
Portugal has revised its cybercrime law to provide legal protection for security researchers, allowing them to operate without the fear of prosecution as long as they adhere to specified conditions. This change is significant for fostering a safer environment for ethical hacking and vulnerability disclosure, ultimately enhancing cybersecurity efforts in the country.