Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A recent report by Armis indicates a significant rise in cyberattacks from nation-state actors targeting UK businesses. The concept of 'mutually assured disruption,' which previously discouraged such attacks, appears to be losing its effectiveness. This shift raises concerns about the potential for increased cyber warfare, putting numerous companies at risk. The report suggests that many firms may not be adequately prepared for these state-backed threats, which could lead to severe disruptions in operations and data security. As tensions rise globally, businesses in the UK need to bolster their cybersecurity measures to defend against these evolving risks.

Impact: UK firms, particularly in critical sectors
Remediation: Companies should enhance their cybersecurity protocols, conduct regular security assessments, and train employees on recognizing phishing attempts and other cyber threats.
Read Original

Akamai has issued a warning about a new wave of cyberattacks that combine Layer 7 DDoS attacks, API abuse, and AI-driven tactics. These coordinated assaults are becoming more sophisticated and are increasingly difficult for organizations to detect and defend against. The blending of these attack vectors means that traditional defenses may not be sufficient, putting many companies at risk. As attackers enhance their methods, it's crucial for businesses to stay informed and adapt their security strategies accordingly. This trend could affect a wide range of industries, making it essential for companies to prioritize their cybersecurity measures.

Impact: Layer 7 DDoS attacks, API services
Remediation: Companies should enhance their monitoring and detection capabilities, implement rate limiting for APIs, and regularly update their security protocols to address evolving threats.
Read Original
Actively Exploited

According to a report from Akamai, API attacks have surged by 113% over the past year, marking a significant rise in the frequency of these incidents. The report reveals that a staggering 87% of organizations experienced at least one security issue related to APIs last year. This increase in API attacks poses serious risks, as APIs are critical for modern applications and are often targeted for sensitive data. The findings indicate that companies need to bolster their security measures to protect against these growing threats, as attackers are increasingly exploiting vulnerabilities in API implementations. With the rise of digital services, ensuring the security of APIs has become essential for safeguarding both organizational data and user information.

Impact: APIs, web applications, cloud services
Remediation: Organizations should implement API security best practices, including regular security assessments, access controls, and monitoring for unusual activity.
Read Original

Quantum computing has the potential to disrupt current encryption methods, putting sensitive data at risk. Experts warn that organizations need to start shifting to post-quantum cryptography to safeguard against future threats, particularly the 'harvest now, decrypt later' strategy used by attackers. This approach allows adversaries to collect encrypted data today and decrypt it later when quantum computers become powerful enough. Without proactive measures, businesses could face significant security vulnerabilities as quantum technology advances. Transitioning to new cryptographic standards is essential to protect data integrity and confidentiality in the coming years.

Impact: Current encryption standards, sensitive data across various sectors
Remediation: Transition to post-quantum cryptography standards
Read Original

Researchers have discovered a long-running cyberespionage campaign linked to Chinese hackers targeting military organizations in Southeast Asia. The attackers utilized advanced backdoor techniques and traditional evasion methods to maintain ongoing access to these sensitive networks. This campaign has raised concerns about the security of military operations and the potential for sensitive information to be compromised. The infiltration has reportedly been active for years, indicating that these hackers have been able to operate undetected for an extended period. This situation highlights the ongoing cybersecurity challenges faced by military organizations in the region and the need for enhanced defenses against such sophisticated threats.

Impact: Southeast Asian military organizations
Remediation: Organizations should conduct thorough security audits, implement advanced threat detection systems, and regularly update their cybersecurity protocols to counteract similar intrusions.
Read Original
Actively Exploited

The GlassWorm supply chain attack campaign has escalated, involving dozens of malicious Open VSX extensions and over 150 compromised GitHub repositories, according to reports from The Hacker News. This campaign targets software development environments, potentially affecting developers who use these extensions and repositories for their projects. By infiltrating trusted sources, attackers can distribute malicious code that may compromise the integrity of software development processes. Users and organizations relying on these platforms need to be vigilant and ensure their systems are secure to mitigate the risk of infection. The widespread nature of this attack highlights the growing threat to software supply chains and the need for heightened security measures in development practices.

Impact: Open VSX extensions, GitHub repositories
Remediation: Users should review and remove any suspicious Open VSX extensions and GitHub repositories. Implementing security best practices, such as using verified sources and regularly updating software, is recommended.
Read Original

According to Field Effect's 2026 Cyber Threat Outlook, compromised cloud identities were responsible for over 80% of the incident alerts investigated in 2025. This significant statistic indicates that attackers are increasingly targeting cloud services to gain unauthorized access. The shift in focus toward cloud identity compromises suggests that organizations need to bolster their security measures around these services. Companies that rely heavily on cloud infrastructure should prioritize identity management and implement stronger authentication processes to mitigate risks. This trend emphasizes the critical need for ongoing vigilance in cybersecurity practices as attackers adapt their strategies.

Impact: Cloud identity management systems, cloud service providers
Remediation: Implement stronger authentication measures, enhance identity management protocols, conduct regular security audits
Read Original

Microsoft has released an out-of-band update to address three vulnerabilities in Windows 11's Routing and Remote Access Service (RRAS). The vulnerabilities, identified as CVE-2026-25172, CVE-2026-25173, and CVE-2026-26111, could potentially allow remote code execution when users connect to a malicious server. This is a serious concern as it could enable attackers to execute harmful code on affected systems. Users of Windows 11 should ensure they apply the latest updates to protect their devices from these risks. The prompt release of this patch reflects the urgency in addressing vulnerabilities that can be exploited remotely, highlighting the need for users to stay vigilant about software updates.

Impact: Windows 11, Routing and Remote Access Service (RRAS)
Remediation: Users should apply the latest updates provided by Microsoft to address the vulnerabilities. Specific patch numbers or versions were not mentioned, but keeping Windows 11 updated is essential.
Read Original
FBI Investigates Steam Games Linked to Malware and Crypto Wallet Theft

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

The FBI has issued a warning to gamers about malware embedded in certain Steam games that has been stealing sensitive browser data and draining cryptocurrency wallets. This malicious activity reportedly took place between May 2024 and January 2026, affecting users who downloaded these compromised games. The malware exploits vulnerabilities to access personal information, making it a significant concern for the gaming community, especially as the popularity of cryptocurrencies continues to rise. Gamers are advised to be cautious about the games they download and to monitor their cryptocurrency accounts for any unusual activity. This incident underscores the need for heightened security awareness among gamers.

Impact: Steam games, cryptocurrency wallets
Remediation: Users should avoid downloading games from untrusted sources and regularly check their cryptocurrency wallets for unauthorized transactions.
Read Original

Researchers have discovered a new evolution of the GlassWorm malware, which now includes several malicious browser extensions that employ advanced evasion techniques. These extensions can hide within legitimate software dependencies, making them harder to detect. Users of affected browsers are at risk, as these extensions can compromise their systems by stealing sensitive information or enabling unauthorized access. This development is particularly concerning for organizations that rely on various web applications, as it can lead to significant data breaches if not addressed. Companies and users should remain vigilant and ensure their security measures are up-to-date to combat this growing threat.

Impact: Malicious browser extensions, web applications, user systems
Remediation: Users should review and remove any suspicious browser extensions, update their browsers to the latest versions, and employ security software to detect and block malware.
Read Original

The GlassWorm malware campaign is actively exploiting stolen GitHub tokens to inject malicious code into numerous Python repositories. Researchers at StepSecurity reported that this attack primarily targets various Python projects, including Django applications, machine learning research code, and Streamlit dashboards. The attackers are modifying critical files like setup.py, main.py, and app.py to include obfuscated malware, which could compromise any project that relies on these repositories. This situation poses a significant risk to developers and organizations using Python, as running compromised code could lead to serious security breaches. Developers need to be vigilant about the integrity of their repositories and monitor for unauthorized changes.

Impact: Python projects, Django apps, ML research code, Streamlit dashboards, PyPI packages
Remediation: Developers should review their repositories for unauthorized changes, monitor for unusual activity, and consider rotating their GitHub tokens. Implementing additional security measures, such as two-factor authentication, is also recommended.
Read Original
New Phishing Scam Uses LiveChat to Pose as Amazon and PayPal in Real Time

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Cofense researchers have identified a new phishing scam where attackers use LiveChat to impersonate customer service agents from Amazon and PayPal. This tactic enables them to interact with victims in real-time, making the scam appear more convincing. The goal is to extract sensitive information such as credit card details and multi-factor authentication (MFA) codes. This type of scam poses a significant risk to users who may inadvertently share their financial information with these impersonators. As online shopping and payment services continue to grow, consumers need to be more vigilant about verifying the identity of customer service representatives to avoid falling victim to such schemes.

Impact: Amazon, PayPal
Remediation: Users should verify the authenticity of customer service communications and avoid sharing sensitive information through chat platforms without confirming the identity of the representative.
Read Original

Recent ClickFix campaigns are targeting macOS users through malicious tools disguised as ChatGPT applications. Attackers are utilizing deceptive tactics, including fake software and Terminal commands, to install the MacSync infostealer on infected systems. This infostealer is designed to harvest sensitive information from users, which poses a significant risk to personal and organizational security. Users who inadvertently download these fake tools could find their data compromised, leading to potential identity theft or financial loss. It's crucial for macOS users to remain vigilant and avoid downloading software from untrusted sources.

Impact: macOS systems, users of fake ChatGPT tools
Remediation: Users should avoid downloading software from untrusted sources and ensure their operating system is updated. Regularly check for any suspicious activity on their devices.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has alerted U.S. government agencies about a vulnerability in Wing FTP Server that is currently being exploited in attacks. This flaw could potentially allow attackers to execute remote code, raising the risk of severe security breaches. Organizations using this software need to take immediate action to secure their systems, as the vulnerability could be linked to more extensive exploitation tactics. The warning is particularly urgent for agencies that manage sensitive data, as the consequences of an attack could be significant. It's crucial for affected users to stay vigilant and apply any available security measures to mitigate risks.

Impact: Wing FTP Server software versions affected are not specified, but the vulnerability impacts all instances of Wing FTP Server used by U.S. government agencies and potentially other organizations.
Remediation: CISA recommends that organizations using Wing FTP Server should apply any available patches and ensure their systems are configured securely. Specific patch numbers or updates were not mentioned, but users should check with the vendor for the latest security updates.
Read Original

Companies House, the British agency responsible for company registration in the UK, recently confirmed that a security flaw in its WebFiling service exposed sensitive business information since October 2025. The agency temporarily took the service offline on Friday to address the issue, which raised concerns about the privacy of companies' data. While they have since restored the service, the breach could have serious implications for businesses relying on the registry for compliance and reporting. Companies should review their security practices and remain vigilant about potential misuse of their exposed information. This incident underscores the need for robust security measures in public-facing services.

Impact: WebFiling service of Companies House, UK business data
Remediation: Service was taken offline to fix the security flaw; specific patches or updates not mentioned.
Read Original
PreviousPage 9 of 121Next