Hackers are exploiting vulnerabilities in SolarWinds Web Help Desk (WHD) to gain unauthorized access to systems. This allows them to execute code on affected machines, deploying legitimate forensic tools like Velociraptor to maintain persistence and enable remote control. Organizations using SolarWinds WHD should be particularly vigilant, as these vulnerabilities can lead to serious security breaches. The situation underscores the need for companies to regularly update and patch their systems to protect against such attacks. Users of the software must act quickly to ensure their environments are secure.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
SmarterTools has reported that its network was breached by the Warlock ransomware gang, which gained access through a vulnerability in the company's email system. Fortunately, this incident did not compromise any business applications or account data, meaning that sensitive user information remains secure. However, the breach raises concerns about the security of email systems and the potential for ransomware attacks targeting software vulnerabilities. Organizations using SmarterTools should review their email security practices and ensure they are employing appropriate safeguards against such threats. This incident serves as a reminder that even established software can have weaknesses that attackers might exploit.
Hackread – Cybersecurity News, Data Breaches, AI and More
The European Commission has reported a cyber attack on its mobile infrastructure, which potentially exposed the names and phone numbers of its staff members. This breach raises concerns about the security of sensitive personal information within a major governmental body. Such incidents can lead to targeted phishing attacks and further exploitation of the compromised data. The European Commission has not disclosed specific details about how the attack occurred or whether it has affected other systems. The revelation serves as a reminder of the ongoing risks faced by public institutions in safeguarding their digital assets.
Infosecurity Magazine
Two men from Connecticut have been charged with a federal crime for allegedly running a fraudulent scheme that targeted online gambling platforms, swindling approximately $3 million. The accused reportedly used sophisticated techniques to manipulate betting systems, allowing them to place bets without the necessary funds. This case raises concerns about the security measures employed by online gambling sites and highlights the vulnerabilities that can be exploited by fraudsters. The investigation into their activities suggests that such schemes could undermine the integrity of online gaming, affecting both the platforms and their users. Law enforcement is taking this case seriously, as it not only involves financial loss but also potential impacts on the reputation and trustworthiness of online gambling environments.
Infosecurity Magazine
VoidLink is a newly identified Linux-based command-and-control (C2) framework that is designed to facilitate credential theft and data exfiltration across multiple cloud platforms. This malware allows attackers to gain unauthorized access to sensitive information, posing a significant risk to organizations that rely on cloud services. As it targets systems in a multi-cloud environment, companies using cloud storage and applications are particularly vulnerable. The presence of AI code within VoidLink suggests that it may employ advanced techniques to evade detection and enhance its operational capabilities. This development is concerning for cybersecurity professionals, as it indicates a growing sophistication in the tools used by cybercriminals.
Attackers are increasingly using targeted wordlists to guess passwords, and they don’t need artificial intelligence to do it. Instead, they rely on tools like CeWL, which scrape an organization’s public-facing content—such as websites and social media—to generate lists of likely passwords based on the language and terms used by that organization. This approach can be highly effective, as it capitalizes on the tendency of users to create passwords that are familiar or meaningful to them. The article emphasizes that simply having complex password policies is not enough to protect against such attacks, as attackers can easily bypass these measures by using personalized wordlists. Organizations need to be aware of this tactic and take steps to educate their users about creating stronger, more secure passwords.
The European Commission is currently investigating a cyberattack that appears to have breached its mobile device management system. Initial findings suggest that attackers may have accessed some personal information of staff members, including names and phone numbers. However, there are no indications that more sensitive data has been compromised so far. This incident raises concerns about the security of governmental systems and the potential risks to employee privacy. As investigations continue, it remains crucial for organizations to maintain strong cybersecurity measures to protect sensitive information from similar attacks.
Help Net Security
The European Commission is taking action against Meta, alleging that the company violated EU competition laws by restricting access to WhatsApp for third-party AI assistants. In a change announced on October 15, 2025, Meta updated its WhatsApp Business Solution Terms, effectively preventing outside AI programs from interacting with users on the platform. Since January 15, 2026, Meta's own AI assistant has been the only one allowed on WhatsApp. The Commission is planning to impose interim measures while investigating these practices. This situation raises concerns about competition and innovation in the AI space, as limiting access could stifle the development of alternative AI solutions that could benefit users.
BeyondTrust has issued a warning about a serious vulnerability in its Remote Support (RS) and Privileged Remote Access (PRA) software. This flaw could let unauthorized attackers run arbitrary code on affected systems, posing a significant security risk. Users of these software products are strongly advised to apply the necessary patches to protect their systems from potential exploitation. The vulnerability's nature means that it could be exploited without requiring any form of authentication, making it particularly dangerous. Organizations using BeyondTrust's software should prioritize updating to secure their environments against this threat.
In December 2025, vulnerabilities in SolarWinds Web Help Desk instances were exploited, allowing attackers to gain initial access to compromised systems. This incident raises concerns for organizations using SolarWinds products, as it indicates that these flaws may have been leveraged as zero-day exploits. Such vulnerabilities can lead to unauthorized access and potential data breaches, making it crucial for affected companies to address these security gaps promptly. Users should be vigilant and monitor their systems for unusual activity while applying any available patches or updates. The incident serves as a reminder of the ongoing risks associated with third-party software vulnerabilities.
Huntress has reported an ongoing attack exploiting vulnerabilities in SolarWinds Web Help Desk software. Attackers are targeting unpatched versions of this tool to execute remote code, which allows them to install Zoho ManageEngine software for persistent access and Velociraptor for control over compromised systems. This incident was confirmed on February 7, 2026, and it raises significant concerns for organizations that rely on SolarWinds products, as it highlights the risks associated with unaddressed software vulnerabilities. Companies using this software should prioritize patching to safeguard against these exploits and prevent unauthorized access to their systems.
SmarterTools has reported a ransomware attack that compromised a data center used for quality control testing. The breach occurred due to a vulnerability in one of SmarterTools' own products, which allowed hackers to infiltrate their systems. As a result, customers have been affected, although specific details on the extent of the impact have not been disclosed. This incident raises concerns about the security of software products, especially those used in business environments. Companies using SmarterTools' services should review their security measures and remain vigilant for any unusual activity.
Two men from Connecticut have been charged with defrauding FanDuel and other online gambling sites out of approximately $3 million by using the stolen identities of around 3,000 individuals. This scheme involved creating fake accounts on these platforms to place bets and withdraw winnings. The accused allegedly operated this scam for several years, taking advantage of the online gambling system's vulnerabilities. This incident is a stark reminder of the risks associated with identity theft and online gambling, as it shows how easily personal information can be exploited for financial gain. The fallout from such fraudulent activities can lead to financial losses for both the victims and the companies involved, highlighting the need for better identity verification processes in online services.
Help Net Security
CVE-2026-1731BeyondTrust has addressed a serious remote code execution vulnerability, identified as CVE-2026-1731, which affects its Remote Support (RS) and Privileged Remote Access (PRA) solutions. This vulnerability can be exploited without authentication, making it particularly dangerous for self-hosted customers. BeyondTrust is urging users to apply the patch immediately to protect their systems. Unlike a previous zero-day vulnerability exploited by threat actors linked to China, this issue was discovered by a security researcher and disclosed privately. The prompt action by BeyondTrust highlights the necessity for timely vulnerability management in remote access tools, which are critical for many organizations.
Infosecurity Magazine
BridgePay, a payments platform based in Florida, has confirmed that its services are currently offline due to a ransomware attack. While the company has been affected by this incident, it has reassured users that no card data has been compromised during the attack. The disruption highlights the ongoing risks that payment processing companies face from cybercriminals. As users rely on these platforms for financial transactions, the incident raises concerns about the security measures in place to protect sensitive information. BridgePay is working to restore its services while ensuring the safety of its users' data.