Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The Federal Communications Commission (FCC) is tightening its Know Your Customer (KYC) regulations for telecom companies. This move aims to enhance the verification process for callers and curb the influx of illegal calls and scams targeting American consumers. By closing loopholes that previously allowed banned foreign services to operate, the FCC is taking a stronger stance against fraudulent activities in the telecommunications sector. This change affects telecom providers nationwide, requiring them to implement more rigorous identification measures to ensure that they are not facilitating scams. The new rules are part of a broader effort to protect consumers from unwanted and potentially harmful calls.

Impact: Telecom providers in the United States
Remediation: Telecom companies are required to enhance caller verification processes and close loopholes allowing banned foreign services.
Read Original
Private Chats, Photos of Celebs Exposed in Suspected Stalkerware Leak

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A database linked to suspected stalkerware has been left exposed, leaking private chats and photos of various celebrities and influencers. This incident raises serious privacy concerns, as sensitive information that was meant to be private is now accessible to anyone who finds the database. The exposed content could lead to harassment or other malicious actions against the affected individuals. The incident underscores the risks associated with stalkerware, which is often used to track and monitor people without their consent. It serves as a reminder for users to be cautious about the applications they install and the permissions they grant.

Impact: Stalkerware applications, celebrities, influencers
Remediation: Users should review and secure their privacy settings, avoid installing untrusted applications, and consider using security solutions to detect stalkerware.
Read Original

In 2022, U.S. states imposed a record $3.45 billion in privacy-related fines on companies, surpassing the total fines levied between 2020 and 2021. This sharp increase reflects growing scrutiny over how businesses handle personal data and comply with privacy regulations. The report by Gartner highlights the rising trend of regulatory actions as states strengthen their privacy laws. Companies across various sectors are feeling the pressure to improve their data protection practices to avoid hefty penalties. The surge in fines indicates a significant shift in enforcement, emphasizing the importance of compliance in today’s digital landscape.

Impact: N/A
Remediation: Companies should enhance their data protection practices and ensure compliance with privacy regulations to avoid fines.
Read Original

A teenager known as 'Bouquet' has been charged in the U.S. for his alleged involvement with the Scattered Spider hacking group, which is linked to extensive extortion schemes that have targeted companies around the globe. The charges include several serious crimes connected to these large-scale cyberattacks. Authorities believe that this group has been responsible for significant financial losses to various businesses, raising concerns about the growing threat posed by young hackers. The case highlights the ongoing challenges in combating cybercrime, especially as younger individuals become more involved in sophisticated hacking operations. This incident serves as a reminder for organizations to strengthen their cybersecurity measures to protect against such attacks.

Impact: Companies worldwide targeted by Scattered Spider's extortion schemes
Remediation: Organizations should enhance their cybersecurity protocols and employee training to mitigate risks from such hacking groups.
Read Original
Misconfigured Server Run by Hackers Leaks 345,000 Stolen Credit Cards

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A misconfigured server associated with the carding marketplace known as Jerry’s Store has leaked around 345,000 stolen credit card details. This incident stemmed from an artificial intelligence coding error that created a significant security flaw. The exposed data poses a serious risk to individuals whose credit card information was compromised, potentially leading to unauthorized transactions and identity theft. This situation also raises concerns about the security practices of online marketplaces that deal with illicit activities. The incident emphasizes the need for robust security measures, especially in environments handling sensitive financial data.

Impact: 345,000 stolen credit card details
Remediation: Implement proper server configuration and security protocols to avoid misconfigurations. Regular security audits and monitoring of server settings are recommended.
Read Original

A new phishing kit called Bluekit has emerged, featuring over 40 templates designed to target well-known online services. This kit stands out because it also includes basic AI capabilities that help users create phishing campaign drafts more efficiently. This means that even those with limited technical skills can launch sophisticated phishing attacks, increasing the risk for individuals and organizations. The availability of such tools makes it easier for cybercriminals to exploit unsuspecting users, potentially leading to data breaches and financial losses. As these tools become more accessible, companies and users need to be more vigilant about phishing attempts and enhance their security measures to protect sensitive information.

Impact: Popular online services
Remediation: Users and companies should implement stronger email filters, educate employees about recognizing phishing attempts, and utilize multi-factor authentication to mitigate risks.
Read Original

A newly discovered vulnerability in Linux, tracked as CVE-2026-31431 and named 'Copy Fail', could allow local, unprivileged users to escalate their privileges to root. This flaw lets attackers write four controlled bytes into page cache files, which is a significant security risk for many major Linux distributions. Researchers from Xint Code assigned a CVSS score of 7.8 to this vulnerability, indicating its seriousness. The issue affects various Linux systems, potentially putting numerous users at risk if they do not take action. Companies and users are urged to monitor their systems and apply necessary patches to mitigate this risk.

Impact: Major Linux distributions including Ubuntu, Debian, Fedora, CentOS, and others that utilize the affected page cache mechanism.
Remediation: Users should apply security patches as soon as they are released by their respective Linux distribution maintainers. It is advisable to monitor official channels for updates and to consider restricting local user access until a patch is applied.
Read Original

PyTorch Lightning, a widely used Python package, has been compromised in a supply chain attack, with attackers pushing two malicious versions—2.6.2 and 2.6.3—on April 30, 2026. This incident, identified by cybersecurity firms Aikido Security, Socket, and StepSecurity, aims to steal user credentials. Developers and organizations that use these specific versions are at risk, as the malicious code can capture sensitive information. Users are urged to quickly check their installations and update to secure versions to avoid potential credential theft. This attack emphasizes ongoing vulnerabilities within software supply chains, highlighting the need for vigilance among developers and users alike.

Impact: PyTorch Lightning versions 2.6.2 and 2.6.3
Remediation: Users should update to a secure version of PyTorch Lightning immediately.
Read Original
Actively Exploited

Three individuals have been arrested in connection with a significant hacking incident involving over 610,000 stolen Roblox accounts. The suspects are accused of distributing malware that allowed them to gain unauthorized access to users' accounts and then selling that access on Russian online marketplaces. This breach not only puts the affected users at risk of losing their personal information and in-game assets but also raises broader concerns about online security and the vulnerability of gaming platforms. The incident highlights the necessity for stronger cybersecurity measures to protect user accounts, especially in popular online environments like Roblox, where many young users are active.

Impact: Roblox accounts
Remediation: Users should enable two-factor authentication on their accounts and remain vigilant for any suspicious activity.
Read Original
Actively Exploited

KryBit, a newly identified ransomware-as-a-service operation, has targeted fellow RaaS gang 0APT by leaking a substantial amount of its operational data. This includes access logs, system files, and even PHP source code. The breach seems to be a retaliatory move after 0APT leaked some of KryBit's data earlier this month. This incident highlights the ongoing rivalries within the ransomware community, where groups often retaliate against one another, potentially leading to further leaks and instability. As these operations continue to evolve, the implications for cybersecurity are significant, raising concerns about the security of sensitive data and the potential for increased attacks on various targets.

Impact: 0APT's operational data, including access logs and PHP source code
Remediation: N/A
Read Original

Chinese state-backed hackers have been targeting journalists and activists in Taiwan, Hong Kong, Tibet, and the Uyghur region through phishing campaigns over the past nine months. These campaigns are believed to be orchestrated by freelance hackers affiliated with the Chinese government, aiming to extract sensitive information from individuals who are often critical of the Chinese regime. The report from Recorded Future details the tactics used in these attacks, which are particularly concerning given the ongoing suppression of dissent in these regions. The implications are serious, as these efforts not only threaten the safety of the targeted individuals but also aim to silence voices of opposition and undermine press freedom. This situation highlights the ongoing cybersecurity risks faced by those advocating for human rights in China and surrounding areas.

Impact: Journalists, activists in Taiwan, Hong Kong, Tibet, Uyghur region
Remediation: Individuals should enhance their cybersecurity awareness, use secure communication channels, and verify the authenticity of messages before engaging with them.
Read Original

The Brazilian hacker group LofyGang has made a comeback, targeting Minecraft players with a new malware strain called LofyStealer or GrabBot. This marks their first attack in over three years, indicating a renewed focus on exploiting gamers. The malware is designed to steal sensitive information from users, which can lead to account takeovers and other malicious activities. As Minecraft remains a popular game, players should be particularly vigilant about their account security and be cautious of any suspicious links or downloads. This resurgence of LofyGang emphasizes the ongoing risks faced by online gaming communities.

Impact: Minecraft players
Remediation: Users should enable two-factor authentication on their accounts and avoid clicking on suspicious links or downloading unverified software.
Read Original

SonicWall has issued an urgent warning about vulnerabilities in its firewall products that could allow attackers to bypass security measures, access restricted services, and potentially crash the firewall systems. These flaws could put organizations at risk of unauthorized access and service disruptions. Users of affected SonicWall firewalls are strongly advised to apply patches immediately to protect their networks. The vulnerabilities were disclosed recently, and the company is emphasizing the need for swift action to mitigate any potential exploitation. Failure to patch could leave systems open to attacks that compromise sensitive data and operational integrity.

Impact: SonicWall firewalls
Remediation: Immediate patching is recommended; specific patch numbers or versions were not provided.
Read Original

A recent supply chain attack, dubbed the Mini Shai-Hulud attack, has targeted SAP's NPM packages. This attack involves a preinstall hook that downloads and executes a malicious Bun binary, which allows the attackers to evade security monitoring measures. As a result, developers using these NPM packages may unknowingly execute harmful code within their environments. This incident raises significant concerns about the integrity of software supply chains, especially for organizations relying on third-party packages for their development processes. Users of SAP NPM packages should be vigilant and review their dependencies to mitigate potential risks.

Impact: SAP NPM packages
Remediation: Users should review and update their NPM package dependencies to ensure they are not using compromised versions. Implementing additional security monitoring for package installations is also recommended.
Read Original
Actively Exploited

A Brazilian tech company, which specializes in DDoS protection, has been implicated in enabling a botnet that has targeted other internet service providers in Brazil with massive DDoS attacks. The CEO of the firm claims that these attacks stemmed from a security breach and suggested that a rival company might be behind the malicious activities to damage his firm's reputation. This situation raises serious concerns about the integrity of cybersecurity firms and their ability to protect clients. It also highlights the potential for internal issues or competition to lead to significant disruptions in the tech industry. The ongoing attacks could impact the reliability of internet services for many users and businesses in Brazil.

Impact: Brazilian internet service providers and the tech firm's clients
Remediation: N/A
Read Original
PreviousPage 8 of 187Next