Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Senator Maria Cantwell from Washington is pushing for hearings to investigate how AT&T and Verizon have responded to recent cyberattacks targeting telecom networks. She claims that these companies have obstructed the release of a report known as Salt Typhoon, which likely contains critical information about the hacks. Cantwell's calls for transparency come amid growing concerns about the security of telecommunication infrastructure, especially as it plays a vital role in national security and everyday communications. The outcome of these hearings could lead to increased accountability for telecom companies in how they protect their networks and respond to breaches.

Impact: AT&T, Verizon, telecom networks
Remediation: N/A
Read Original

Nick Andersen, a senior official at the Cybersecurity and Infrastructure Security Agency (CISA), recently outlined plans to enhance the Critical Infrastructure Partnership Advisory Council (CIPAC) and establish an Artificial Intelligence Information Sharing and Analysis Center (AI-ISAC). These initiatives aim to improve collaboration among government agencies and private sector organizations to better protect critical infrastructure. The focus on AI in cybersecurity reflects growing concerns about the potential risks and vulnerabilities associated with emerging technologies. The establishment of the AI-ISAC would facilitate the sharing of information related to AI threats, helping organizations stay ahead of potential cyber attacks. This move is significant as it underscores the need for updated frameworks to address the evolving landscape of cybersecurity challenges.

Impact: N/A
Remediation: N/A
Read Original

Ivanti's Endpoint Manager Mobile (EPMM) is currently facing serious security threats due to two newly discovered zero-day vulnerabilities. Initial limited attacks were reported before Ivanti made its findings public, but since then, numerous threat groups have exploited these weaknesses, leading to a surge in attacks. More than 1,400 instances of EPMM remain exposed, putting organizations at risk of unauthorized access and data breaches. This situation is alarming as it highlights the vulnerabilities in widely used software, prompting urgent action from affected users to protect their systems. Companies using EPMM should prioritize patching and securing their environments to mitigate the risks associated with these vulnerabilities.

Impact: Ivanti Endpoint Manager Mobile (EPMM)
Remediation: Organizations should apply the latest patches provided by Ivanti as soon as possible to address the vulnerabilities.
Read Original

A new wave of GlassWorm malware has been detected, targeting Open VSX software components. This self-replicating malware has infiltrated various development environments, leading to infections that steal sensitive information from users. As developers integrate these compromised components, they unknowingly expose their systems and data to potential breaches. The implications are significant, as downstream victims may suffer from data theft and loss of trust in their development tools. Developers and organizations using these components need to take immediate action to secure their environments and mitigate the risks associated with this malware.

Impact: Open VSX software components
Remediation: Developers should audit their environments for compromised components and replace them with verified versions. Regular security updates and monitoring are also recommended.
Read Original

Recently, a coordinated effort has been observed targeting Citrix NetScaler systems through a large-scale scanning operation. This campaign utilized tens of thousands of residential proxies to locate login panels, indicating a significant interest in potentially exploiting these systems. Organizations using Citrix NetScaler may be at risk, as the scans could lead to unauthorized access or data breaches if vulnerabilities are found. The use of residential proxies suggests that the attackers are trying to mask their activities and avoid detection. This incident serves as a reminder for companies to strengthen their security measures and monitor their networks for unusual activity.

Impact: Citrix NetScaler systems
Remediation: Organizations should review their security configurations, implement stronger access controls, and monitor for unusual login attempts. Regularly updating software to the latest versions is also advised.
Read Original

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in SolarWinds Web Help Desk that is currently being exploited in active attacks. This flaw poses a risk to federal agencies, which have been instructed to apply necessary patches within three days to mitigate potential damage. The urgency of the situation underscores the importance of maintaining up-to-date systems, especially for organizations that rely on SolarWinds products. If left unaddressed, this vulnerability could lead to unauthorized access and compromise sensitive data, affecting not just government agencies but potentially their partners and clients as well. The situation is a reminder for all users of SolarWinds software to remain vigilant and ensure their systems are secure.

Impact: SolarWinds Web Help Desk
Remediation: Federal agencies are required to patch their systems within three days. Specific patch numbers or versions are not mentioned.
Read Original

CrossCurve, a decentralized finance platform, recently lost $3 million due to an exploit in its smart contract. Attackers took advantage of a vulnerability in the ReceiverAxelar contract, which was missing an essential validation check. This flaw allowed them to manipulate transactions undetected, leading to significant financial loss. The incident raises concerns about the security of smart contracts within the DeFi space, where similar vulnerabilities can have widespread implications for users and investors. As decentralized finance continues to grow, ensuring the security of such contracts is crucial to maintaining trust in these platforms.

Impact: CrossCurve ReceiverAxelar contract
Remediation: Conduct a thorough review and audit of smart contracts, implement additional validation checks, and possibly halt affected contracts until they are secured.
Read Original

A serious SQL injection vulnerability has been identified in the Quiz and Survey Master plugin, affecting approximately 40,000 WordPress sites. This flaw allows attackers to manipulate the database and potentially access sensitive information. Users of the affected plugin need to take immediate action to secure their sites to prevent unauthorized access and data breaches. Website owners are urged to update the plugin to the latest version as soon as possible to mitigate these risks. The discovery of this vulnerability serves as a reminder for all WordPress site administrators to regularly monitor and update their plugins to ensure their sites remain secure.

Impact: Quiz and Survey Master plugin for WordPress
Remediation: Update the Quiz and Survey Master plugin to the latest version.
Read Original

Hackers have been exploiting a serious vulnerability in the React Native CLI, identified as CVE-2025-11953, to execute remote commands and deploy stealthy Rust-based malware. This flaw arises from the React Native CLI's Metro server, which, by default, binds to external interfaces, making it susceptible to unauthorized access. This exploitation occurred weeks before the vulnerability was publicly disclosed, indicating that attackers are actively targeting this weakness. Users of React Native should be particularly vigilant, as the impact could extend to various applications built on this framework. Prompt action is necessary to secure affected systems and prevent further malicious activities.

Impact: React Native CLI, Metro server
Remediation: Users should immediately restrict access to the Metro server by modifying configuration settings to bind only to local interfaces. Additionally, they should monitor their systems for any signs of unauthorized access or malware installation. Regular updates and patches from React Native should be applied as they become available.
Read Original

The UK's Information Commissioner's Office (ICO) has launched an investigation into X, the social media platform owned by Elon Musk, due to concerns about AI-generated non-consensual sexual imagery being shared on the site. The ICO expressed serious worries about data privacy and the potential harm this type of content could cause to individuals. The investigation aims to assess how X handles user data and whether it complies with UK data protection regulations. This situation raises significant questions about the responsibilities of social media platforms in managing harmful content and protecting user privacy. The outcome of the investigation could lead to stricter regulations or penalties for X if violations are found.

Impact: X (social media platform)
Remediation: N/A
Read Original

The UK's data protection authority is investigating X and its Irish subsidiary following allegations that the Grok AI assistant has been used to create nonconsensual sexual images. This investigation stems from concerns that the AI tool might be misused to produce explicit content without the consent of the individuals depicted. The implications of this inquiry are significant, as it raises serious ethical questions about the use of AI technology in generating potentially harmful material. Additionally, the outcome of this investigation could lead to stricter regulations regarding AI applications in the UK and beyond. The case not only affects the companies involved but also highlights the broader issue of accountability in the development and deployment of AI systems.

Impact: Grok AI assistant, X, Irish subsidiary of X
Remediation: N/A
Read Original

A newly discovered vulnerability in React Native has been exploited in the wild, allowing attackers to disable security protections and deliver malware to affected devices. This flaw, which was previously thought to be a theoretical risk, has now raised alarms among developers and users of applications built with React Native. The impact of this vulnerability can be significant, as it compromises the integrity and security of applications, potentially affecting millions of users. Developers are urged to take immediate action to secure their applications and protect user data from malicious exploitation.

Impact: React Native applications, including those developed by various companies using this framework.
Remediation: Developers should apply security patches provided by React Native, review their application code for vulnerabilities, and enhance security measures to prevent unauthorized access. Regularly updating to the latest versions of React Native is also advised.
Read Original
Actively Exploited

Researchers have identified a new ransomware-as-a-service (RaaS) variant known as 'Vect'. This operation stands out due to its custom malware, which poses a significant threat to organizations. The Vect RaaS allows attackers to easily deploy ransomware attacks, potentially affecting a wide range of victims, from small businesses to larger enterprises. The introduction of this variant raises concerns about the increasing sophistication of ransomware operations, making it crucial for companies to bolster their cybersecurity measures. Users are advised to stay vigilant and regularly update their security protocols to defend against such evolving threats.

Impact: Organizations utilizing outdated cybersecurity measures and systems.
Remediation: Organizations should implement strong security protocols, regular software updates, and employee training on phishing and ransomware prevention.
Read Original

A serious security vulnerability, identified as CVE-2025-11953 and nicknamed Metro4Shell, has been discovered in the Metro Development Server, which is part of the '@react-native-community/cli' npm package. This flaw, rated 9.8 on the CVSS scale, allows remote attackers to execute arbitrary code without authentication. Researchers from VulnCheck first detected active exploitation of this vulnerability on December 21, 2025. This poses a significant risk for developers and organizations using this package, as it could lead to unauthorized control over their systems. Users of the affected npm package need to take immediate action to protect their applications.

Impact: Metro Development Server in the '@react-native-community/cli' npm package.
Remediation: Developers should update their '@react-native-community/cli' package to the latest version to mitigate the vulnerability. They should also review their server configurations and implement security best practices to limit exposure to such attacks.
Read Original

A vulnerability has been discovered in OpenClaw, also known as Moltbot and Clawdbot, which allows attackers to execute remote code with just one click. This flaw poses a significant risk as it could enable hackers to take control of the AI assistant, potentially compromising user data and system integrity. The issue affects users of OpenClaw across various platforms, raising concerns about the security of AI tools that are increasingly integrated into everyday applications. It's essential for users and organizations to be aware of this vulnerability and take necessary precautions to protect their systems. The situation underscores the need for vigilance in managing software vulnerabilities, particularly in AI technologies that handle sensitive information.

Impact: OpenClaw, Moltbot, Clawdbot
Remediation: Users should apply any available patches or updates for OpenClaw and consider disabling the AI assistant until a fix is confirmed.
Read Original
Page 1 of 85Next