Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

India has decided to roll back its mandate requiring citizens to install a cybersecurity app designed to enhance surveillance and security. The app, intended to monitor digital activities, faced backlash over privacy concerns, with citizens worried about excessive government monitoring and data collection. The government's initial push for this app was met with skepticism, drawing comparisons to Apple's controversial decision to distribute a U2 album to all iTunes users. By reversing this mandate, India acknowledges the public's apprehension regarding personal privacy and the implications of government surveillance. This situation underscores the delicate balance between national security and individual privacy rights, a conversation that continues to evolve in the digital age.

Impact: Cybersecurity app mandated by the Indian government
Remediation: N/A
Read Original

Barts Health NHS Trust has reported a data breach involving the Clop ransomware group, which exploited a vulnerability in the Oracle E-business Suite software to steal files from their database. This incident highlights the ongoing risks associated with unpatched software vulnerabilities and the potential for significant data loss in healthcare organizations.

Impact: Oracle E-business Suite software
Remediation: Organizations should apply the latest security patches for Oracle E-business Suite and review their security protocols to prevent future breaches.
Read Original

A new zero-click attack has been identified that targets the Perplexity Comet browser, allowing malicious emails to delete all contents of a user's Google Drive. This technique exploits the automation capabilities of the browser when connected to Gmail and Google Drive, posing a significant risk to users' data security.

Impact: Perplexity Comet browser, Google Drive, Gmail
Remediation: Users should be cautious about granting permissions to their browser for accessing email and cloud services. Regularly review connected apps and services, and consider disabling automation features until further guidance is provided.
Read Original

The FBI has issued a warning regarding virtual kidnapping scams where criminals manipulate social media images to create fake proof of life photos. This alarming tactic is used to extort money from victims' families, highlighting the need for increased awareness and caution regarding online content.

Impact: Social media platforms and users whose images are altered.
Remediation: Increase awareness of social media privacy settings, educate users on the risks of sharing personal images, and verify the authenticity of any unusual requests for money.
Read Original

A critical security vulnerability, CVE-2025-66516, has been identified in Apache Tika, posing a risk of XML external entity (XXE) injection attacks. With a CVSS score of 10.0, this flaw affects multiple modules and requires urgent attention from users to prevent exploitation.

Impact: Affected products include Apache Tika tika-core (versions 1.13-3.2.1), tika-pdf-module (versions 2.0.0-3.2.1), and tika-parsers (versions 1.13-1.28.5) across all platforms.
Remediation: Users are advised to apply the latest patches for the affected modules: tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1), and tika-parsers (1.13-1.28.5) to mitigate the vulnerability.
Read Original

The article highlights that manufacturers are increasingly becoming prime targets for cyberattacks in 2025 due to significant cybersecurity gaps and a shortage of expertise in the sector. This growing threat landscape poses serious risks to operational integrity and data security within manufacturing environments.

Impact: Manufacturers
Remediation: Implementing robust cybersecurity measures, enhancing staff training and expertise, and conducting regular security assessments.
Read Original

A critical vulnerability in the React JavaScript library is currently being targeted by threat actors linked to China, highlighting the urgency for developers to implement patches. The situation underscores the importance of immediate action to secure applications using this library from potential exploitation.

Impact: React JavaScript library
Remediation: Patch the React library to the latest version as soon as possible.
Read Original

The article discusses a critical vulnerability in React that has been exploited by various threat actors, leading to a significant outage at Cloudflare as they implemented mitigations against the React2Shell exploit. This incident highlights the ongoing risks associated with vulnerabilities in widely used frameworks and the need for timely responses to emerging threats.

Impact: React framework, Cloudflare services
Remediation: Organizations using React should immediately update to the latest version of the framework and implement security best practices to mitigate the risk of exploitation. Regularly review and apply security patches as they become available.
Read Original

The European Commission has imposed a €120 million ($140 million) fine on X for failing to meet transparency obligations under the Digital Services Act (DSA). This penalty highlights the regulatory scrutiny on tech companies regarding their compliance with digital transparency standards, emphasizing the importance of accountability in online platforms.

Impact: X
Remediation: N/A
Read Original

CrowdStrike has issued a warning about Warp Panda, a cyber-espionage group linked to China, which is actively targeting North American organizations to steal sensitive data. This campaign aims to advance Beijing's strategic interests, highlighting the ongoing threat posed by state-sponsored cyber activities.

Impact: North American firms, particularly in sectors with sensitive data.
Remediation: Organizations should enhance their cybersecurity measures, including implementing advanced threat detection systems, employee training on phishing attacks, and regular security audits.
Read Original

US organizations are being warned about the presence of Chinese malware, specifically BrickStorm, Junction, and GuestConduit, which are being used by the group Warp Panda for long-term persistence in attacks. This poses a significant cybersecurity threat as these malware types can enable attackers to maintain access to compromised systems over extended periods.

Impact: US organizations, systems targeted by Warp Panda's malware.
Remediation: Organizations are advised to implement robust cybersecurity measures, including regular software updates, network monitoring, and incident response strategies to detect and mitigate the effects of these malware types. Specific patches or updates were not mentioned.
Read Original

Cloudflare has reported an outage due to the emergency patching of a critical React remote code execution vulnerability that is currently being exploited in attacks. This incident highlights the urgency and severity of addressing such vulnerabilities to maintain security and service continuity.

Impact: React framework versions vulnerable to remote code execution, impacting applications built using React.
Remediation: Apply the emergency patch provided by the React development team to mitigate the vulnerability. Ensure all applications using React are updated to the latest secure version as soon as possible.
Read Original

Inotiv, an American pharmaceutical company, has reported a data breach following a ransomware attack that occurred in August 2025, compromising the personal information of thousands of individuals. This incident highlights the ongoing risks associated with ransomware attacks and the importance of data protection in the pharmaceutical sector.

Impact: Personal information of individuals associated with Inotiv
Remediation: N/A
Read Original

The Louvre Museum is enhancing its safety and security systems following a significant burglary incident in October. This initiative involves a public tender worth €57 million, indicating the museum's commitment to improving its protection against potential threats.

Impact: N/A
Remediation: N/A
Read Original

The article discusses a record-breaking DDoS attack powered by the Aisuru botnet, which peaked at 29 Tbps. Cloudflare successfully mitigated this attack, highlighting the growing severity of DDoS threats and the need for robust cybersecurity measures.

Impact: N/A
Remediation: Implement DDoS mitigation strategies and utilize services like Cloudflare for protection against large-scale attacks.
Read Original
PreviousPage 81 of 101Next