Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A significant security vulnerability has been identified in Ghost CMS, specifically a SQL injection flaw labeled CVE-2026-26980. Attackers are exploiting this weakness to inject harmful JavaScript code, which activates ClickFix attack flows across numerous websites utilizing this content management system. This exploitation poses a serious risk to users by potentially compromising their data and functionality of affected sites. Ghost CMS users, particularly those running outdated versions, should take immediate action to secure their systems. This incident highlights the ongoing need for vigilance in web security and the importance of keeping software up to date.

Impact: Ghost CMS versions vulnerable to CVE-2026-26980
Remediation: Users should update their Ghost CMS to the latest version that addresses CVE-2026-26980. Regularly applying security patches and monitoring for unusual activity can help mitigate risks associated with SQL injection vulnerabilities.
Read Original
Actively Exploited

Recent reports indicate that the popular npm package 'node-ipc' has been compromised with a credential-stealing malware. This incident affects developers who rely on this package for their applications, potentially exposing sensitive user information. Additionally, a new group called TeamPCP has emerged, deploying clones of the Shai-Hulud malware, which may pose further risks to various systems. Moreover, active supply chain attacks have targeted '@antv' packages on npm, putting more developers at risk. The compromised GitHub Action 'actions-cool/issues-helper' has also been found to redirect all tags to malicious endpoints, heightening concerns over the security of widely-used development tools. Developers and organizations should take immediate precautions to secure their environments and monitor for any unusual activity.

Impact: node-ipc npm package, @antv packages on npm, actions-cool/issues-helper GitHub Action
Remediation: Developers should remove the compromised packages immediately and replace them with verified alternatives. Regularly audit dependencies and update all packages to their latest, secure versions. Implement monitoring for suspicious activities in development environments.
Read Original

Anthropic's AI initiative, Project Glasswing, has identified over 10,000 serious vulnerabilities within just one month of operation. This alarming discovery exposes a significant gap in the ability of organizations to patch and manage these vulnerabilities effectively. The vulnerabilities range in severity from high to critical, raising concerns for companies and users who rely on the affected systems. As the number of vulnerabilities continues to grow, it becomes increasingly clear that many organizations struggle with timely patching and security management. This situation not only jeopardizes the security of sensitive data but also highlights the urgent need for improved cybersecurity practices across the industry.

Impact: N/A
Remediation: N/A
Read Original

Last week, the hacking group TeamPCP claimed to have breached GitHub's internal codebase by using a poisoned Visual Studio Code (VS Code) extension. GitHub, owned by Microsoft, confirmed the breach and has since launched an investigation into how their private code repositories were compromised. This incident raises serious concerns about the security of development tools widely used by programmers. Moreover, researchers recently discovered a critical flaw in NGINX, a popular web server software, which is being actively exploited. These incidents highlight the ongoing vulnerabilities in essential software and the need for robust security measures to protect sensitive information.

Impact: GitHub's internal codebase, Visual Studio Code extensions, NGINX web server software
Remediation: GitHub is investigating the breach; users should ensure their VS Code extensions are from trusted sources. For NGINX, users should apply the latest security patches as they become available.
Read Original

A recent supply chain attack has compromised Laravel Lang localization packages, leading to the distribution of credential-stealing malware. Attackers exploited GitHub version tags to insert malicious code into Composer packages, which are widely used by developers for PHP applications. This incident puts numerous developers at risk, as the malicious packages can steal sensitive information such as login credentials. Those using affected Laravel Lang packages need to be vigilant and check their dependencies to ensure they are not using compromised versions. The attack raises concerns about the security of open-source software and the potential for similar incidents in the future.

Impact: Laravel Lang localization packages, Composer packages
Remediation: Developers should review their Composer dependencies, ensure they are using the latest secure versions of Laravel Lang packages, and consider implementing additional security measures such as monitoring for unusual activity.
Read Original

Italian officials have taken action against the CINEMAGOAL app, a piracy tool that illegally provided access to popular streaming services like Netflix, Disney+, and Spotify. The app was reportedly using stolen authentication codes to bypass payment systems, allowing users to access content without subscriptions. This crackdown is significant as it not only protects the intellectual property rights of these streaming platforms but also highlights ongoing challenges in combating online piracy. By dismantling this network, authorities aim to deter similar activities in the future and safeguard legitimate services. The action is part of a broader effort to enforce copyright laws and ensure users are not misled into using illegal services.

Impact: Netflix, Disney+, Spotify
Remediation: N/A
Read Original

Anthropic announced that its Project Glasswing has identified over 10,000 high- or critical-severity vulnerabilities in widely-used software since its launch last month. This initiative involves collaboration with around 50 partners and focuses on software deemed systemically important on a global scale. These vulnerabilities pose significant risks to organizations and users relying on this software, potentially exposing them to data breaches or cyberattacks. The findings emphasize the urgent need for software developers and companies to address these flaws promptly to safeguard their systems and users. This proactive approach highlights the role of AI in enhancing cybersecurity efforts.

Impact: N/A
Remediation: N/A
Read Original

A new vulnerability, dubbed 'Underminr', affects around 88 million domains, allowing attackers to hide malicious connections behind trusted domain names. This exploit can bypass DNS filtering mechanisms, making it easier for cybercriminals to manage command-and-control traffic without detection. As a result, organizations that rely on these domains for security may be at greater risk of compromise. The vulnerability raises concerns about the effectiveness of current DNS security measures, as attackers can leverage this flaw to blend in with legitimate traffic. Companies and system administrators are urged to review their DNS filtering strategies to mitigate potential risks associated with this vulnerability.

Impact: Approximately 88 million domains that utilize DNS filtering
Remediation: Organizations should review and enhance their DNS filtering practices, including monitoring for unusual traffic patterns and considering additional security measures to identify and block hidden command-and-control connections.
Read Original

Cybersecurity researchers have identified a software supply chain attack that compromised several PHP packages associated with Laravel-Lang. The affected packages include laravel-lang/lang, laravel-lang/http-statuses, laravel-lang/attributes, and laravel-lang/actions. These packages were manipulated to deliver a credential-stealing framework that could potentially affect developers and users utilizing these resources. This incident raises concerns about the security of software supply chains, particularly in open-source communities where such packages are widely used. Developers should remain vigilant and review their dependencies to ensure they are not using compromised versions of these packages.

Impact: laravel-lang/lang, laravel-lang/http-statuses, laravel-lang/attributes, laravel-lang/actions
Remediation: Developers should review and update to the latest, verified versions of the affected packages and monitor for any signs of credential theft.
Read Original

A severe security vulnerability has been discovered in the LiteSpeed User-End cPanel Plugin, identified as CVE-2026-48172, which has a maximum CVSS score of 10.0. This flaw allows attackers to exploit incorrect privilege assignments, enabling them to execute arbitrary scripts with root privileges. As a result, any cPanel user, including potential attackers or compromised accounts, can take advantage of this vulnerability. The ongoing exploitation of this flaw poses significant risks to server security and data integrity, making it crucial for affected users to take immediate action. The situation emphasizes the need for vigilance among web hosts and cPanel users to prevent unauthorized access and maintain secure environments.

Impact: LiteSpeed User-End cPanel Plugin
Remediation: Affected users should immediately update their LiteSpeed User-End cPanel Plugin to the latest version to mitigate this vulnerability. Additionally, users should review user permissions and consider restricting access to cPanel accounts until the update is applied. Regular security audits and monitoring for unusual activities are also recommended.
Read Original

Ubiquiti has patched three serious vulnerabilities in its UniFi OS, labeled CVE-2026-34908, CVE-2026-34909, and CVE-2026-34910. These flaws could allow unauthorized users to make system changes, access sensitive system files through path traversal, and execute commands remotely via command injection. This is a significant concern for users of UniFi OS, as it could lead to unauthorized access and control over network devices. Ubiquiti is urging all users to apply the updates as soon as possible to protect their systems from potential exploitation. Given the nature of these vulnerabilities, companies using UniFi OS should prioritize updating their systems to ensure their networks remain secure.

Impact: UniFi OS users, specifically versions affected by CVE-2026-34908, CVE-2026-34909, and CVE-2026-34910.
Remediation: Ubiquiti has released patches for the vulnerabilities in the latest update of UniFi OS. Users are advised to update their systems immediately to the latest version to close these security gaps.
Read Original

Cisco's recent research has raised concerns about the reliability of AI-generated security incident reports. The study found that large language models (LLMs) can produce inconsistent results, even when querying the same data. This variability can lead to confusion and mistakes in understanding security incidents, which is critical for organizations relying on accurate reporting for their security posture. The findings suggest that companies using AI for cybersecurity reporting need to be cautious and verify the data produced by these systems, as discrepancies could hinder effective incident response. As AI becomes more integrated into security operations, ensuring its accuracy will be vital for maintaining trust and effectiveness in cybersecurity efforts.

Impact: N/A
Remediation: Organizations should verify AI-generated reports and cross-check with human analysis to ensure accuracy.
Read Original

Based Apparel, a merchandise site linked to Kash Patel, was recently hacked to distribute infostealer malware aimed at stealing user credentials. This security incident came to light when a user on X shared the alarming news. The malware poses a serious risk to anyone who visited the site, as it can compromise sensitive information like login details. Users who made purchases or even just browsed the site should take immediate steps to protect their accounts, such as changing passwords and monitoring for suspicious activity. The attack underscores the ongoing risks associated with online shopping and the need for users to remain vigilant about their cybersecurity practices.

Impact: Based Apparel merchandise site
Remediation: Users should change their passwords and monitor accounts for suspicious activity.
Read Original

The Belarus-linked hacking group Ghostwriter, also known as UAC-0057 and UNC1151, has launched a multi-stage cyberattack targeting Ukraine. Researchers have identified that the group is using the Prometheus learning platform as bait to lure victims into their traps. This tactic raises concerns as it not only threatens the security of individuals and organizations in Ukraine but also highlights the ongoing cyber warfare linked to the conflict in the region. The implications are significant, as such attacks can disrupt critical infrastructure and undermine trust in digital platforms, especially in a time of heightened tensions. As the situation evolves, vigilance is essential for those engaged in online education and other sectors potentially impacted by these tactics.

Impact: Prometheus learning platform, Ukraine's digital infrastructure
Remediation: Users and organizations should enhance their cybersecurity measures, including employee training on phishing and social engineering tactics, as well as implementing robust endpoint protection solutions.
Read Original

A recent report by Hunt.io has uncovered over 1,350 command and control (C2) servers operating across 14 countries in the Middle East. Notably, Saudi Telecom Company (STC) has been linked to more than 72% of these servers, often through systems that have been compromised by attackers. This concentration of malicious infrastructure raises concerns for cybersecurity in the region, as it suggests that many customer systems are being exploited for nefarious purposes. The presence of so many C2 servers indicates a significant risk for data breaches and other cyber incidents, affecting both businesses and individuals who rely on these services. Stakeholders in the region should be vigilant and take steps to secure their networks.

Impact: C2 servers impacting customer systems of Saudi Telecom Company (STC) and other providers in the region.
Remediation: Organizations should conduct security assessments of their systems, enhance monitoring for unusual activities, and strengthen access controls to prevent exploitation.
Read Original
Page 1 of 212Next