Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

WhatsApp recently disclosed two vulnerabilities that could pose risks to its users. The first is a file spoofing issue, which could allow attackers to disguise a malicious file as a legitimate one. The second vulnerability involves an arbitrary URL scheme that could lead to unwanted actions when users click on certain links. These vulnerabilities were reported to Meta through their bug bounty program and have been addressed in updates released earlier this year. Users of WhatsApp should ensure their app is updated to maintain security, as these vulnerabilities could potentially be exploited if left unpatched.

Impact: WhatsApp application
Remediation: Patches were released earlier this year; users should update to the latest version of WhatsApp.
Read Original

Trellix, a security vendor, has reported a breach that resulted in unauthorized access to its source code. The breach raises concerns about the potential for further exploitation of the accessed code, which could lead to vulnerabilities in the company's products or services. While the specifics of what data was accessed remain unclear, such incidents can undermine customer trust and affect the overall security posture of companies relying on Trellix’s solutions. This incident serves as a reminder of the importance of robust security measures and monitoring against unauthorized access. Companies in the cybersecurity sector must remain vigilant to protect sensitive information and maintain their reputations.

Impact: Trellix source code
Remediation: N/A
Read Original

A serious vulnerability has been discovered in Weaver E-cology, an enterprise office automation platform. This flaw, identified as CVE-2026-22679, allows attackers to execute code remotely without authentication. It affects versions of Weaver E-cology prior to 10.0.20260312 and has a high severity score of 9.8, indicating its potential for significant impact. The issue is actively being exploited in the wild, putting users and organizations at risk of unauthorized access and control over their systems. Companies using this software should prioritize updating to the latest version to protect against these attacks.

Impact: Weaver E-cology versions prior to 10.0.20260312.
Remediation: Users should update Weaver E-cology to version 10.0.20260312 or later to mitigate the vulnerability.
Read Original

Researchers at the University of Massachusetts Dartmouth are exploring whether coding styles can indicate vulnerabilities in software. They have found that individual developers leave distinct 'fingerprints' in their code, including naming conventions and loop structures. This study aims to determine if these unique patterns can also signal potential weaknesses in the code. The implications of this research could be significant, as it may lead to new methods for identifying vulnerabilities before they can be exploited. If successful, this could help developers write safer code by understanding the risks associated with certain coding habits.

Impact: N/A
Remediation: N/A
Read Original

Instructure, the company behind the Canvas learning management system, has confirmed a data breach that has exposed personal information of its users. The breach was disclosed on a Friday, and the hacker group ShinyHunters has claimed responsibility for the attack. While Instructure has not provided detailed information about the types of personal data compromised, the incident raises concerns about the security of educational platforms and the sensitive information they handle. Users of Canvas and potentially other Instructure services should remain vigilant and take steps to secure their accounts, as the exposure of personal data can lead to identity theft or further phishing attempts. This incident highlights the ongoing risks that educational institutions face in protecting their digital environments.

Impact: Canvas learning management system, Instructure services
Remediation: Users should change their passwords and enable two-factor authentication where possible. Organizations should review their security protocols and consider additional training for users on recognizing phishing attempts.
Read Original

A recent report has revealed that the FEMITBOT platform is being exploited for large-scale scams, including fake cryptocurrency schemes and fraudulent financial services. These scams also involve the distribution of malware disguised as AI tools and streaming sites. Users of Telegram are particularly at risk, as these mini apps are being used to lure individuals into these scams. The situation raises significant concerns about the safety of online financial transactions and the potential for users to lose money or have their personal information compromised. As these scams proliferate, it is crucial for users to remain vigilant and skeptical of unsolicited offers in online messaging platforms.

Impact: Telegram mini apps, cryptocurrency platforms, financial services
Remediation: Users should be cautious of unsolicited offers, verify the legitimacy of apps before use, and report suspicious activity to Telegram.
Read Original

Since mid-March, hackers have been exploiting a serious vulnerability known as CVE-2026-22679 in Weaver E-cology's office automation software. This flaw allows attackers to execute discovery commands, potentially compromising sensitive information and system integrity. Users of Weaver E-cology could be at risk, as the vulnerability has been actively targeted, indicating that attackers are already taking advantage of it. Organizations using this software should be aware of the ongoing exploitation and take immediate action to safeguard their systems. Addressing this vulnerability is crucial to prevent unauthorized access and data breaches.

Impact: Weaver E-cology office automation software.
Remediation: Users should apply any available patches from Weaver E-cology and ensure that their systems are updated to the latest version to mitigate the risks associated with this vulnerability. Additionally, organizations should review their security configurations and monitor for any suspicious activity related to this exploit.
Read Original

A significant security vulnerability, dubbed 'Copy Fail', has been discovered in Linux systems that could potentially impact every major Linux distribution released since 2017. The flaw has been actively exploited, raising alarms among cybersecurity researchers. Some experts have criticized the way the vulnerability was disclosed, particularly noting that the AI-generated report from Theori lacked clarity and helpful details. This situation underscores the importance of clear communication in security disclosures, especially when dealing with vulnerabilities that affect a wide range of users and systems. As attackers may leverage this flaw, it’s crucial for system administrators and users to stay informed and prepared for potential exploits.

Impact: All mainstream Linux distributions since 2017, including Ubuntu, Fedora, Debian, and others.
Remediation: System administrators should update their Linux distributions to the latest versions as soon as patches are made available. Monitoring for any updates from specific Linux vendors regarding this vulnerability is also recommended.
Read Original

A recently discovered vulnerability in cPanel allows attackers to bypass authentication, raising significant concerns for millions of users. Following the disclosure of this flaw, multiple proof-of-concept exploits have surfaced, indicating that the vulnerability could be actively exploited in the wild. One researcher has noted that there has been zero-day activity linked to this issue for at least a month, suggesting that attackers may already be taking advantage of the situation. This flaw affects various versions of cPanel, which is widely used for managing web hosting services. Users and companies relying on cPanel should prioritize patching their systems to mitigate potential risks.

Impact: cPanel versions with the authentication-bypass flaw
Remediation: Users should apply available patches from cPanel to address the authentication-bypass vulnerability.
Read Original

Cisco has announced its plan to acquire Astrix Security, a move aimed at improving its identity-centric security solutions, particularly for managing non-human identities like those used by AI systems and machines. This acquisition is part of Cisco's broader strategy to enhance security measures in an increasingly automated and interconnected environment. By integrating Astrix's technology, Cisco aims to better protect organizations from potential risks associated with machine access and identity misuse. This is important as businesses increasingly rely on AI and automated systems, which can introduce unique security challenges. The deal underscores the growing focus on securing these non-human identities to prevent unauthorized access and data breaches.

Impact: N/A
Remediation: N/A
Read Original

A phishing campaign named VENOMOUS#HELPER has been targeting over 80 organizations since at least April 2025. The attackers exploit legitimate Remote Monitoring and Management (RMM) tools, specifically SimpleHelp and ScreenConnect, to gain ongoing remote access to compromised systems. Most of the affected organizations are based in the United States. This type of attack is concerning because it allows attackers to maintain control over their targets, potentially leading to data breaches or further exploitation. Organizations need to be vigilant about phishing attempts and ensure that their RMM tools are secured against unauthorized access.

Impact: SimpleHelp, ScreenConnect
Remediation: Organizations should enhance their phishing awareness training and secure their RMM tools to prevent unauthorized access.
Read Original

Trellix, a cybersecurity firm, recently reported a breach of its source code repository. Although the company is conducting a thorough investigation, they have not found any evidence that this incident has affected their source code release or distribution processes. This means that, at least for now, their products and services remain secure from any potential vulnerabilities that could arise from the breach. The implications of such a breach can be significant, as access to source code can provide attackers with insights that could be used to exploit systems or develop malicious software. Trellix is reassuring its clients that their security measures are intact, but the situation serves as a reminder of the ongoing risks associated with software development and source code management.

Impact: N/A
Remediation: N/A
Read Original

Trellix, a cybersecurity firm, has reported a data breach after attackers accessed part of its source code repository. The breach raises concerns about the security of the company's software and the potential exposure of sensitive information. While Trellix did not disclose the extent of the data accessed, incidents like this can lead to vulnerabilities in the software products they develop. This situation serves as a reminder for companies to regularly assess their security measures and safeguard their intellectual property. Customers and partners are advised to stay vigilant and monitor for any unusual activity related to Trellix products.

Impact: Trellix source code repository
Remediation: Companies should review their security protocols and enhance access controls to source code repositories.
Read Original

A college student is taking legal action against a dating app for allegedly using her TikTok videos to target men living in her dorm. According to her lawyer, the dating app edited her content to imply she was looking for a 'friend with benefits' and geofenced the posts to reach nearby male users. This raises significant concerns about privacy and consent, as the student did not authorize the app to use her videos in this manner. The case could set a precedent for how dating apps and other platforms handle user-generated content and targeted advertising. It also highlights the potential risks associated with sharing personal videos online, particularly on social media platforms.

Impact: Dating app, TikTok
Remediation: N/A
Read Original

A new botnet is targeting gaming servers by exploiting misconfigured Jenkins installations. Attackers accessed the Jenkins server through a vulnerability in the scriptText endpoint, which allowed them to execute remote code using a Groovy script. This incident raises concerns for gaming companies and server administrators, as it can lead to unauthorized access and potential service disruptions. Organizations using Jenkins need to ensure their configurations are secure to prevent similar attacks. The exploitation of this vulnerability could have significant implications for the security of gaming platforms and user data.

Impact: Jenkins servers, gaming servers
Remediation: Secure Jenkins configurations, disable the scriptText endpoint if not in use, apply security best practices for Jenkins installations
Read Original
Page 1 of 184Next