Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The article reports on a joint investigation revealing a remote IT worker infiltration scheme linked to North Korea's Lazarus Group. This scheme highlights the persistent threat posed by state-sponsored cyber actors, emphasizing the need for heightened awareness and security measures against such infiltration tactics.

Impact: Remote IT workers, organizations employing remote staff, potential victims of Lazarus Group attacks.
Remediation: Organizations should enhance security protocols for remote workers, including robust vetting processes, employee training on cybersecurity awareness, and monitoring for unusual activity.
Read Original

North Korean IT recruiters are engaging in a scheme where they entice developers to rent out their identities for illicit fundraising activities. This operation poses a significant cybersecurity threat as it exploits individuals' identities to support North Korea's funding efforts, highlighting the growing intersection of cybercrime and geopolitical issues.

Impact: Developers' identities, potentially various IT systems used by affected individuals.
Remediation: Developers should be cautious about sharing personal information and identities, utilize identity protection services, and stay informed about phishing and social engineering tactics.
Read Original

Google has addressed 51 vulnerabilities in Android, including two high-severity flaws (CVE-2025-48633 and CVE-2025-48572) that are potentially under targeted exploitation. Both vulnerabilities impact the Android Framework, which is essential for app development, and could allow malicious applications to access sensitive information.

Impact: Android Framework; potentially all devices running affected versions of Android.
Remediation: Patches have been released to address the vulnerabilities. Users are advised to update their devices to the latest Android version as per the December Android security bulletin.
Read Original

The article discusses a critical vulnerability in OpenAI's Codex CLI, identified as CVE-2025-61260, which allows for command execution. This vulnerability poses a significant risk to developers, as it could be exploited to facilitate various attacks. Immediate attention is required to mitigate potential threats stemming from this issue.

Impact: OpenAI Codex CLI
Remediation: To mitigate the risk associated with CVE-2025-61260, users should apply any available patches for the Codex CLI and review their command execution permissions. Additionally, implementing strict access controls and monitoring for unusual activity can help reduce the likelihood of exploitation.
Read Original

The article discusses how a noisy ransomware attack at Russian companies inadvertently revealed a long-term espionage foothold by a stealthier threat actor. This situation highlights the complexities of cybersecurity, where one breach can expose another, potentially more dangerous, vulnerability. The findings emphasize the need for organizations to remain vigilant against both overt and covert threats.

Impact: Russian companies, ransomware groups, espionage actors
Remediation: N/A
Read Original

The UK Information Commissioner’s Office (ICO) has initiated an investigation into the mobile gaming sector to ensure compliance with the Children’s Code, which aims to protect children's privacy and data. This investigation highlights the increasing scrutiny of mobile games and their practices regarding children's data protection, signaling potential regulatory actions in the future.

Impact: Mobile games targeting children
Remediation: Develop and implement compliance strategies with the Children’s Code, including data protection measures for children.
Read Original

The Kaspersky Security Bulletin for 2025 provides insights into various cyberthreats observed from November 2024 to October 2025, leveraging anonymized data from Kaspersky users. This report highlights trends and statistics that can inform users about the evolving landscape of cybersecurity threats.

Impact: N/A
Remediation: N/A
Read Original

Europol has shut down Cryptomixer, a cryptocurrency mixing service used to launder cybercrime proceeds, and seized $29 million in Bitcoin. Since its inception in 2016, Cryptomixer facilitated the mixing of over EUR 1.3 billion in Bitcoin, highlighting the ongoing challenges in combating cryptocurrency-related crimes.

Impact: Cryptomixer, Bitcoin
Remediation: N/A
Read Original

The article discusses a new cyber-espionage campaign by the Russian-speaking group Tomiris, which is targeting government and diplomatic entities in CIS member states and Central Asia. This campaign poses a significant cybersecurity threat, highlighting the ongoing risks to sensitive government communications and operations in the region.

Impact: Government and diplomatic entities in CIS member states and Central Asia
Remediation: Implementing robust cybersecurity measures, including network monitoring, threat detection systems, and employee training on phishing and social engineering attacks.
Read Original

The Inc ransomware gang has claimed responsibility for a cyberattack that led to the shutdown of the CodeRED Emergency Alert Platform, indicating a significant breach involving sensitive subscriber data. This incident raises concerns about the security of emergency communication systems and the potential misuse of stolen data.

Impact: CodeRED Emergency Alert Platform
Remediation: Organizations using the CodeRED platform should assess their security measures, implement stronger access controls, and monitor for unusual activity. It is also advisable to notify affected subscribers and review data protection policies.
Read Original

Michael Clapsis, an Australian man, was sentenced to over seven years in prison for conducting Wi-Fi attacks at airports and on flights, where he stole sensitive data from unsuspecting users. This case highlights the ongoing threat of Wi-Fi vulnerabilities in public spaces, emphasizing the importance of securing personal information while using public networks.

Impact: Public Wi-Fi networks at airports and on flights
Remediation: Users should avoid using public Wi-Fi for sensitive transactions, employ VPNs for encryption, and ensure devices are updated with the latest security patches.
Read Original

The article discusses a significant cybersecurity breach at South Korean online retailer Coupang, affecting approximately 33.7 million users. Experts warn that similar incidents could occur in the U.S. if companies do not adequately secure their databases, highlighting the ongoing vulnerability of online retailers to cyber threats.

Impact: Coupang user database, potentially affecting personal information of 33.7 million customers.
Remediation: Companies should implement robust database security measures, including regular audits, encryption, and access controls to prevent similar breaches.
Read Original
Coupang Data Breach Affects All 33.7 Million South Korean Accounts

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Coupang has confirmed a significant data breach affecting 33.7 million users in South Korea, which has resulted in the exposure of personal information including names, contact details, and order history. The investigation into the breach is ongoing, highlighting the potential risks associated with large-scale data leaks and the importance of user data protection.

Impact: Coupang user accounts
Remediation: Users should monitor their accounts for unusual activity and change passwords. Additionally, it is advisable to enable two-factor authentication where available.
Read Original
PreviousPage 86 of 101Next