Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

In 2025, Apple took significant measures to maintain the integrity of its App Store by rejecting over 2 million app submissions. This move was part of a broader strategy to combat security threats and prevent fraud, resulting in the blocking of more than 1.1 billion accounts and the interception of $2.2 billion in potentially fraudulent transactions. The company's stringent review process aims to protect users from malicious apps and scams, ensuring a safer experience on its platform. This action highlights the ongoing challenges in app security and the need for companies to remain vigilant against fraudulent activities. Developers looking to publish apps must adhere to strict security protocols to avoid rejection, which could impact their business operations.

Impact: Apple App Store, developer accounts
Remediation: Developers should adhere to Apple's security guidelines and protocols to ensure app submissions are compliant.
Read Original

Microsoft has reported that two vulnerabilities in its Defender software are currently being exploited. The first, identified as CVE-2026-41091, is a privilege escalation flaw that has a CVSS score of 7.8, meaning it poses a significant risk. If successfully exploited, attackers could gain SYSTEM privileges, which would allow them to control the affected systems. The second vulnerability is a denial-of-service flaw, though specific details about its CVE designation weren't provided. These vulnerabilities affect Microsoft Defender, and users of the software should be vigilant as attackers are actively exploiting these flaws in the wild. It's crucial for individuals and organizations to take immediate action to secure their systems.

Impact: Microsoft Defender
Remediation: Users should apply any available security updates from Microsoft for Defender, monitor for patches addressing CVE-2026-41091, and consider disabling features that may be exploited until a fix is implemented.
Read Original

Google has recently patched over 200 vulnerabilities in its Chrome browser, with many of these issues reported by its own security teams. This uptick in discoveries is believed to be largely driven by advancements in artificial intelligence, which has enhanced the company's ability to identify and address security flaws. Users of Chrome should be aware that while these vulnerabilities have been fixed, the sheer volume underscores the ongoing challenges in maintaining browser security. Keeping Chrome updated is crucial to protect against potential exploitation of these vulnerabilities. This situation highlights the importance of continuous vigilance in cybersecurity, especially for widely used software like Chrome.

Impact: Google Chrome browser
Remediation: Users should update to the latest version of Chrome to ensure all vulnerabilities are patched.
Read Original

The article discusses the increasing number of vulnerabilities within the supply chain security domain, noting that they are being discovered at an alarming rate while the time it takes for attackers to exploit them has significantly shortened. This lack of visibility into these vulnerabilities poses a serious risk for companies relying on third-party vendors. As these vulnerabilities can affect various products and systems, the implications are far-reaching, potentially leading to widespread security breaches. Companies must enhance their monitoring and response strategies to mitigate these risks and better protect their systems and data. The urgency for improved security measures is underscored by the rapid pace at which these vulnerabilities are being exploited.

Impact: Various third-party software and systems used across multiple industries
Remediation: Companies should enhance monitoring and response strategies to mitigate risks
Read Original
Actively Exploited

Grafana Labs has reported that a recent data breach they experienced was linked to the TanStack supply chain attack. This breach raises significant concerns for users of Grafana's services, as it indicates that attackers exploited vulnerabilities within third-party components to gain unauthorized access. The specifics of the data compromised have not been detailed, but such incidents often lead to sensitive information being exposed. This breach not only affects Grafana Labs but also any organizations relying on their software, highlighting the importance of scrutinizing supply chain security. Companies using affected services should take immediate action to assess their security posture and mitigate potential risks.

Impact: Grafana Labs services and potentially other users of TanStack components
Remediation: Users should review their dependencies for vulnerabilities and implement security patches as they become available.
Read Original

Researchers have revealed a vulnerability in the Linux kernel, identified as CVE-2026-46333, which has remained unnoticed for nine years. This flaw involves improper privilege management, allowing unprivileged local users to access sensitive files and execute commands with root privileges on default installations of several major Linux distributions. The vulnerability has a CVSS score of 5.5, indicating a moderate severity level. Affected users include those running various Linux distributions, which could expose them to significant risks if exploited. It's crucial for system administrators and users to be aware of this vulnerability and take appropriate action to secure their systems.

Impact: Linux kernel on default installations of major distributions such as Ubuntu, Fedora, Debian, and CentOS.
Remediation: Users should review their Linux kernel versions and apply any available security patches from their distribution maintainers. Additionally, restricting access to sensitive files and monitoring system activity can help mitigate risks until a patch is applied.
Read Original

GitHub has reported a security breach affecting 3,800 of its internal repositories. The breach was linked to a compromised version of the Nx Console extension for Visual Studio Code, which was part of a recent supply-chain attack involving TanStack npm packages. This incident highlights the vulnerability of software supply chains, where attackers can exploit trusted tools to gain unauthorized access to sensitive code and data. Developers using the affected extension are particularly at risk, as the malicious version could have allowed hackers to infiltrate their systems and steal valuable information. GitHub is likely working to mitigate the fallout and prevent future incidents, but this breach serves as a reminder for all developers to be vigilant about the tools they use.

Impact: GitHub internal repositories, Nx Console VS Code extension, TanStack npm packages
Remediation: Users should remove the compromised Nx Console extension and ensure they are using a safe version from official sources.
Read Original

A recent analysis of dark web activity over six years, covering more than 25,000 sites, reveals that discussions often center around a limited number of topics. This research, based on over 11 million archived snapshots, shows that while major events like marketplace seizures and data breaches can create the illusion of shifting trends, the core subjects of interest remain relatively stable. The findings suggest that users of the dark web are consistently drawn to certain areas of discussion, which may include illegal goods, hacking services, and personal data trading. Understanding these patterns can help law enforcement and cybersecurity professionals anticipate criminal behavior and devise strategies to combat it. This snapshot of dark web dynamics offers valuable insights into the persistent interests that drive illicit activities online.

Impact: N/A
Remediation: N/A
Read Original

Drupal has issued urgent security updates to address a serious vulnerability in Drupal Core, identified as CVE-2026-9082. This flaw can allow attackers to execute malicious code remotely, escalate privileges, or disclose sensitive information on PostgreSQL sites. With a CVSS score of 6.5, the vulnerability affects users relying on Drupal's database abstraction API. This issue is particularly concerning for organizations using Drupal for their web applications, as the potential for exploitation could lead to significant data breaches or system compromises. Users are strongly advised to apply the available security updates promptly to mitigate the risk.

Impact: Drupal Core, PostgreSQL sites
Remediation: Users should apply the latest security updates provided by Drupal to address CVE-2026-9082. Specific patch numbers or versions are not mentioned, but updating to the latest version of Drupal Core is recommended.
Read Original

Ukrainian cyberpolice, in collaboration with U.S. law enforcement, have apprehended an 18-year-old man from Odesa who is believed to be behind an infostealer malware operation. This operation specifically targeted users of an online store based in California, resulting in the theft of approximately 28,000 accounts. The malware was designed to harvest sensitive information from victims, raising concerns about the security of online shopping platforms. This incident serves as a stark reminder of the ongoing risks associated with online transactions and the importance of robust cybersecurity measures for both users and businesses. Authorities are continuing to investigate the scope of the operation and its potential connections to other cybercrimes.

Impact: Online store users in California, 28,000 stolen accounts
Remediation: Users should enable two-factor authentication and regularly monitor account activity. Companies should enhance security measures and conduct thorough security audits.
Read Original

Hackers have successfully bypassed multi-factor authentication (MFA) on SonicWall Gen6 SSL-VPN appliances, allowing them to gain unauthorized access to networks. They achieved this by brute-forcing VPN credentials, which enabled them to deploy tools commonly used in ransomware attacks. This incident poses a serious risk for organizations relying on SonicWall's VPN technology, as it undermines the security measures intended to protect sensitive data. Companies using these appliances should be vigilant and consider strengthening their security protocols. The exploitation of this vulnerability emphasizes the need for timely patching and updates to prevent similar attacks in the future.

Impact: SonicWall Gen6 SSL-VPN appliances
Remediation: Organizations should apply the latest patches from SonicWall and review their VPN security configurations to enhance protection against brute-force attacks.
Read Original

GitHub has confirmed that it experienced a significant data breach resulting in the theft of approximately 4,000 internal repositories. The hacker group TeamPCP has claimed responsibility for the attack, raising concerns about the security of open source projects hosted on the platform. This incident affects not only GitHub but also the developers and organizations that rely on these repositories for their software projects. The stolen data could potentially expose sensitive code and vulnerabilities, which may lead to further exploitation. Users and companies utilizing GitHub should review their security practices and be vigilant about any unusual activity related to their accounts.

Impact: 4,000 internal GitHub repositories
Remediation: Users should review their security practices and monitor their accounts for unusual activity.
Read Original
Actively Exploited

A new cyber campaign named Mini Shai-Hulud has targeted 323 packages within the npm ecosystem, affecting tools commonly used in GitHub Actions and Visual Studio Code. This attack could potentially compromise the security of numerous applications that rely on these packages, making it a significant concern for developers and organizations that utilize the npm registry. The campaign demonstrates the ongoing risks associated with open-source software and highlights the need for vigilant security practices among developers. Users of affected packages should assess their environments and consider updates or alternatives to mitigate potential risks. The incident serves as a reminder of the vulnerabilities that can exist within widely-used development tools.

Impact: 323 npm packages, GitHub Actions, Visual Studio Code tools
Remediation: Developers should review their package dependencies, update to the latest versions of affected packages, and consider using alternative packages if necessary.
Read Original

Recent research from Visa has identified AI-driven scams as the fastest growing form of consumer fraud. These scams often involve sophisticated tactics that can trick individuals into making fake payments. Consumers need to be vigilant and look out for five key red flags that may indicate a scam, such as unsolicited requests for payment, pressure to act quickly, and unusual payment methods. The implications of these scams are significant, as they can lead to financial loss and erode trust in digital payment systems. Awareness and education are crucial for consumers to protect themselves from these evolving threats.

Impact: Digital payment systems and consumers
Remediation: Users should be cautious of unsolicited payment requests and verify the legitimacy of transactions before proceeding.
Read Original

Discord has rolled out end-to-end encryption for its voice and video calls, a significant upgrade aimed at enhancing user privacy. This new feature uses the DAVE encryption protocol, which is open-source, making it available across all platforms including desktop, mobile, web browsers, and gaming consoles. With approximately 690 million registered users on the platform, this move is particularly relevant as it addresses growing concerns over data security and privacy in online communications. The implementation of end-to-end encryption means that only the participants in a call can access the content of their conversations, making it much harder for third parties to intercept or eavesdrop. This is a step forward in safeguarding user information and ensuring a safer communication environment for millions of users worldwide.

Impact: Discord voice and video calls across desktop, mobile, web browsers, and gaming consoles
Remediation: N/A
Read Original
Page 1 of 209Next