Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

The Interlock ransomware gang has been actively exploiting a serious remote code execution vulnerability in Cisco's Secure Firewall Management Center (FMC) software since late January. This flaw, classified as having maximum severity, allows attackers to execute arbitrary code on affected systems, putting organizations at significant risk. Companies using this software should be particularly vigilant, as the vulnerability is being exploited in ongoing attacks. Cisco has not yet released a patch to address this issue, which raises concerns about the potential for widespread impact. Organizations relying on Cisco FMC should prioritize security measures and closely monitor any unusual activity to safeguard their networks.

Impact: Cisco Secure Firewall Management Center (FMC) software
Remediation: N/A
Read Original

Amazon Threat Intelligence has issued a warning regarding an active ransomware campaign known as Interlock, which is exploiting a significant vulnerability in Cisco's Secure Firewall Management Center (FMC) Software. This vulnerability, identified as CVE-2026-20131, has a maximum severity score of 10.0 and stems from an insecure deserialization of user-supplied Java byte streams. This flaw could allow attackers to gain root access without authentication, posing a serious risk to organizations using affected Cisco products. The exploitation of this vulnerability is concerning as it enables unauthorized access, potentially leading to data breaches and system compromises. Companies using Cisco FMC Software must take immediate action to protect their systems from this ongoing threat.

Impact: Cisco Secure Firewall Management Center (FMC) Software
Remediation: Organizations should immediately update their Cisco FMC Software to the latest version to mitigate this vulnerability. Additionally, they should review their security configurations and consider implementing network segmentation and access controls to limit exposure.
Read Original

A new vulnerability identified as CVE-2026-3888 has been discovered in Ubuntu's snap package management system, allowing local users to escalate their privileges to root access through a timing-based exploit. This flaw poses a significant risk particularly for multi-user environments, as any local user could potentially gain complete control over the affected system. Ubuntu has not specified which versions are impacted, but users running the snap package system should be aware of this vulnerability. The implications of this flaw are serious, as it could enable attackers to manipulate system settings, install malicious software, or access sensitive information. Users are advised to monitor for updates from Ubuntu and apply patches as they become available.

Impact: Ubuntu snap package management system (specific versions not specified)
Remediation: Users should apply patches from Ubuntu as soon as they are released to mitigate this vulnerability. Monitoring for any updates regarding this CVE is recommended.
Read Original

Marquis, a financial services provider based in Texas, recently reported that a ransomware attack in August 2025 compromised the personal data of over 672,000 individuals. The breach also had significant operational impacts, affecting 74 banks across the United States. The stolen data may include sensitive information, raising concerns about identity theft and privacy for those affected. This incident highlights the vulnerabilities in the financial sector and the ongoing threat posed by ransomware groups. Organizations in this space need to enhance their cybersecurity measures to protect both their operations and customer data.

Impact: Personal data of 672,000 individuals, operations of 74 banks
Remediation: Organizations should review their cybersecurity protocols, implement stronger data protection measures, and conduct thorough investigations to understand the breach's extent.
Read Original

The European Union has imposed sanctions on two Chinese individuals, two Chinese companies, and one Iranian firm for their involvement in hacking operations targeting EU member states. This action reflects ongoing concerns about cyber threats linked to state-sponsored actors and their impact on national security and digital infrastructure. The sanctioned entities are believed to have contributed to cyber activities that undermine the stability and security of EU countries. By taking these measures, the EU aims to deter further malicious cyber operations and hold accountable those involved in such activities. This situation underscores the increasing vigilance by international bodies in combating cybercrime and protecting digital sovereignty.

Impact: N/A
Remediation: N/A
Read Original

A malicious Chrome extension called ShieldGuard was discovered to be a crypto scam masquerading as a security tool. This extension primarily targeted users looking to protect their cryptocurrency wallets but instead siphoned off sensitive wallet information and drained user data. Researchers found that once installed, the extension would exploit its permissions to access and transfer funds from users' crypto wallets. This incident affects anyone who installed the ShieldGuard extension, highlighting the ongoing risks of using unverified browser extensions in the cryptocurrency space. Users are urged to be cautious and only download extensions from reputable sources to safeguard their assets.

Impact: ShieldGuard Chrome extension
Remediation: Users should uninstall the ShieldGuard extension immediately and monitor their crypto wallets for unauthorized transactions.
Read Original

A new exploit kit called 'Darksword' is being used to target iPhones, particularly affecting users of cryptocurrency wallet applications. This exploit allows attackers to steal various personal information from compromised devices. The existence of Darksword raises significant concerns, especially for those who handle sensitive financial data on their mobile devices. As users increasingly rely on their phones for managing cryptocurrencies, the risk of falling victim to such attacks is growing. It’s crucial for iPhone users to stay vigilant and ensure their devices are updated to protect against these vulnerabilities.

Impact: iPhones, cryptocurrency wallet applications
Remediation: Users should update their iOS devices to the latest version and consider using security features such as two-factor authentication for their cryptocurrency wallets.
Read Original

Apple has rolled out new WebKit patches to enhance security protections for its users. These updates aim to fill the gaps between regular security updates, addressing vulnerabilities that could potentially be exploited by attackers. While specific details about the vulnerabilities have not been disclosed, the updates are essential for users of Apple's web browsing technologies, which are integral to Safari and other applications. Keeping WebKit up to date is crucial as it helps protect against possible security risks that could compromise user data and privacy. Users are encouraged to ensure their devices are running the latest version to benefit from these improvements.

Impact: Apple devices using WebKit, including Safari and other related applications.
Remediation: Users should update their devices to the latest version of WebKit as soon as possible to apply the security patches.
Read Original

A significant rise in hardcoded secrets found in public GitHub commits has raised concerns among cybersecurity experts. In 2025, researchers identified 28.65 million instances of sensitive data, such as API keys and passwords, embedded directly in code. The alarming trend shows that AI coding assistants are twice as likely to contribute to these leaks compared to traditional coding methods. This increase in exposed secrets, which rose by 34% from previous years, poses a serious risk to organizations, potentially leading to unauthorized access and data breaches. Companies and developers must be vigilant in managing their code and ensuring that sensitive information is not inadvertently shared in public repositories.

Impact: GitHub repositories, AI coding assistants
Remediation: Developers should avoid hardcoding secrets in their code and use environment variables or secret management tools instead.
Read Original

Cybersecurity researchers have identified nine significant vulnerabilities in low-cost IP KVM devices from four vendors: GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, and JetKVM. These flaws can allow unauthorized users to gain root access, giving them extensive control over affected systems. The most critical vulnerabilities could enable attackers to execute commands and manipulate the devices without authentication. This poses a serious risk, especially for organizations relying on these devices for remote management of their IT infrastructure. Users of these products are urged to take immediate action to secure their systems and monitor for any suspicious activity.

Impact: GL-iNet Comet RM-1, Angeet/Yeeso ES3 KVM, Sipeed NanoKVM, JetKVM
Remediation: Users should immediately update their devices to the latest firmware provided by the respective vendors and implement strong access controls to mitigate unauthorized access risks.
Read Original

Researchers have identified a new version of the Vidar Stealer malware, known as Vidar 2.0, which is being distributed through fake game cheats on platforms like GitHub and Reddit. This malware targets users looking for free cheats for popular games, tricking them into downloading malicious software instead. Once installed, Vidar 2.0 can steal sensitive information, including passwords, credit card details, and other personal data. This method of delivery raises concerns as it exploits trusted platforms, making it harder for users to recognize the threat. Gamers and users of these platforms should be particularly cautious when downloading software that claims to be free game cheats, as it could lead to serious security breaches.

Impact: GitHub, Reddit, gaming platforms, user devices
Remediation: Users should avoid downloading cheats from unofficial sources and ensure their antivirus software is up to date. Regularly monitor accounts for suspicious activity and consider using password managers to enhance security.
Read Original

Kaspersky's Security Operations Center has identified a new Horabot campaign targeting users in Mexico. This campaign involves sophisticated tactics that aim to compromise systems and steal sensitive information. Researchers have provided insights into how the attack is carried out, which can help security teams identify and respond to the threat effectively. The focus on Mexico suggests that local businesses and individuals may be particularly vulnerable, highlighting the need for increased awareness and protective measures. Understanding the methods used in this campaign can assist in preventing future attacks and safeguarding valuable data.

Impact: Users in Mexico, particularly businesses and individuals with sensitive information.
Remediation: Implement security awareness training, monitor for suspicious activity, and utilize endpoint protection solutions.
Read Original

A security researcher has discovered a vulnerability in WhatsApp that allows users to bypass the app's 'View Once' feature, which is designed to make images and videos disappear after being viewed. This issue arises from the use of a modified client application, and Meta, the parent company of WhatsApp, has stated it will not release a patch for this vulnerability. The decision not to address the flaw raises concerns about user privacy, as it undermines the security feature intended to protect sensitive media. Users who rely on this feature for confidential communications may be at risk of having their private content saved and shared without consent. The vulnerability's existence highlights the potential for modified applications to exploit weaknesses in popular messaging platforms.

Impact: WhatsApp (all versions using modified client applications)
Remediation: N/A
Read Original

According to a recent report by Gartner, security teams should prioritize their involvement in artificial intelligence (AI) projects to prevent expensive incident response efforts in the future. The research suggests that by 2028, AI-related issues will account for half of all incident response activities. This shift highlights the growing intersection between cybersecurity and AI, emphasizing that companies need to integrate security considerations from the outset of AI development. Failing to do so could lead to significant vulnerabilities and costly breaches. As AI technology becomes more prevalent in various sectors, understanding its risks and preparing for potential security incidents will be crucial for organizations.

Impact: N/A
Remediation: N/A
Read Original

The ongoing conflict in Iran is expected to extend, leading to an increase in cyber threats and potential disruptions in energy supply across the region. Companies operating in the Middle East may face heightened risks as tensions escalate. Cybersecurity experts are warning that this situation could result in more frequent and severe cyberattacks aimed at critical infrastructure and private enterprises. The implications of such attacks could be wide-ranging, impacting not just local businesses but also global markets and energy prices. Stakeholders in the region are advised to bolster their cybersecurity measures to mitigate potential risks.

Impact: Critical infrastructure, energy sector, Middle Eastern companies
Remediation: Companies should enhance their cybersecurity protocols and incident response strategies.
Read Original
Page 1 of 116Next