Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Over 70 Domains Used in Months-Long Phishing Spree Against US Universities

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

A phishing campaign utilizing the Evilginx kit has targeted 18 US universities, successfully bypassing Multi-Factor Authentication (MFA) to steal credentials over a period from April to November 2025. The severity of the threat highlights the vulnerabilities in MFA systems and the need for enhanced security measures in educational institutions.

Impact: 18 US universities
Remediation: Educational institutions should enhance their MFA systems, implement user training on recognizing phishing attempts, and consider additional layers of security such as anomaly detection and threat intelligence.
Read Original

The UK Information Commissioner's Office (ICO) is seeking urgent clarity regarding claims of racial bias in facial recognition technology, particularly as highlighted in a recent Home Office report. This raises significant concerns about the implications of biased technology in law enforcement practices and its potential impact on civil rights.

Impact: Facial recognition technology used by police
Remediation: N/A
Read Original
Actively Exploited

The article discusses the rising exploitation of the React vulnerability CVE-2025-55182 by threat actors. This vulnerability poses a significant risk as it is being actively targeted in various attacks, highlighting the urgency for organizations to address it promptly.

Impact: React framework versions vulnerable to CVE-2025-55182. Specific versions and affected products are not detailed in the article.
Remediation: Organizations should apply security patches provided by React developers as soon as they are available. Additionally, implementing security best practices such as input validation and regular software updates can help mitigate the risk associated with this vulnerability.
Read Original

The article discusses the differences between prompt injection and SQL injection, emphasizing the potential severity of prompt injection as a cybersecurity threat. It highlights that misunderstanding these differences can undermine mitigation strategies, suggesting that prompt injection may pose unique risks that require specific attention.

Impact: N/A
Remediation: Implement robust input validation and sanitization practices, regularly update security protocols, and educate users on the risks of prompt injections.
Read Original
Actively Exploited

Barts Health NHS Trust has become a victim of a cyberattack linked to the Cl0p ransomware group, which has targeted Oracle EBS systems. This incident raises significant concerns regarding the security of sensitive data within healthcare organizations and highlights the ongoing threat posed by ransomware groups.

Impact: Oracle EBS systems
Remediation: N/A
Read Original

The UK's National Cyber Security Centre (NCSC) has updated three important pieces of guidance related to cryptographic practices involving security certificates, Transport Layer Security (TLS), and Internet Protocol Security (IPsec). These updates are aimed at helping organizations improve their security posture by providing clearer instructions on the implementation and management of cryptographic protocols. It's crucial for companies and IT professionals to stay informed about these changes, as they affect the security of data transmission and overall network integrity. By following the revised guidelines, organizations can better protect themselves from potential vulnerabilities and attacks that exploit outdated or improperly configured systems.

Impact: TLS, IPsec, security certificates
Remediation: Organizations should review and implement the updated NCSC guidance on security certificates, TLS, and IPsec.
Read Original

NVIDIA's research highlights the vulnerabilities of agentic AI systems, which operate with minimal human oversight. These systems face new risks due to their interactions with various models, tools, and data sources, necessitating a safety and security framework to address these challenges.

Impact: Agentic AI systems, tools, and workflows
Remediation: Implement the safety and security framework proposed by NVIDIA and Lakera AI to assess and mitigate risks.
Read Original

The Iranian hacking group MuddyWater has deployed a new backdoor known as UDPGangster, which utilizes the User Datagram Protocol for command-and-control operations. This targeted cyber espionage campaign is focused on users in Turkey, Israel, and Azerbaijan, highlighting the ongoing threat posed by state-sponsored hacking groups in the region.

Impact: N/A
Remediation: N/A
Read Original

The article discusses a dual campaign targeting GlobalProtect portals and SonicWall APIs, highlighting a critical XXE vulnerability found in Apache software. This vulnerability poses a significant risk, necessitating immediate attention from affected organizations to mitigate potential exploitation.

Impact: GlobalProtect portals, SonicWall APIs, Apache software
Remediation: Organizations should apply patches and updates to affected Apache software and review configurations to mitigate the risk of exploitation.
Read Original

Portugal has updated its cybercrime law to provide a legal safe harbor for security researchers engaged in good-faith hacking, thereby allowing them to operate without fear of prosecution under specific conditions. This change aims to encourage responsible security research and enhance overall cybersecurity in the country.

Impact: N/A
Remediation: N/A
Read Original

The article highlights recent developments in cybersecurity, including a patched flaw in React and Node.js, as well as a ransomware intrusion that has revealed an espionage foothold. These incidents underscore the ongoing challenges in securing software frameworks and the risks posed by cyber threats to sensitive information.

Impact: React, Node.js
Remediation: Patches released for React and Node.js vulnerabilities
Read Original

A hacking campaign has been targeting GlobalProtect logins and scanning SonicWall APIs since December 2, 2025. The attack is significant due to its scale, involving over 7,000 IP addresses linked to a German hosting provider, indicating a coordinated effort that poses a serious threat to the security of affected systems.

Impact: Palo Alto GlobalProtect portals, SonicWall SonicOS API endpoints
Remediation: Organizations should implement strong authentication measures, monitor access logs for unusual login attempts, and ensure that their SonicWall APIs are properly secured and updated.
Read Original

Over 30 security vulnerabilities have been identified in AI-powered Integrated Development Environments (IDEs), collectively termed IDEsaster. These vulnerabilities combine prompt injection techniques with legitimate features, allowing for potential data exfiltration and remote code execution, posing significant risks to developers and organizations using these tools.

Impact: Various AI-powered Integrated Development Environments (IDEs), specific products not detailed.
Remediation: N/A
Read Original

This article discusses the cybersecurity risks associated with smart home devices and emphasizes the importance of minimizing entry points to enhance security. It highlights the growing concern over vulnerabilities in smart home technology and the potential for unauthorized access and attacks.

Impact: Smart home devices, IoT devices
Remediation: Implement strong passwords, regularly update device firmware, disable unused features, and use a separate network for smart devices.
Read Original

The article discusses a React vulnerability that has been reportedly exploited by attackers, leading to a debate among researchers about the existence of concrete evidence for these attacks. While some researchers claim to have seen proof of concepts demonstrating the exploit, others argue that there is insufficient evidence of actual attacks occurring, complicating the response efforts.

Impact: React framework, potentially affecting applications built with React.
Remediation: Update to the latest version of React as patches are likely to be released to address the vulnerability. Monitor for official guidance from React maintainers.
Read Original
PreviousPage 80 of 101Next