U.S. government agencies have issued an urgent warning about Iranian hackers targeting American energy and water infrastructure. These cyberattacks are aimed at disrupting devices and systems that manage industrial processes. Reports indicate that these attacks have already caused damage to some victims over the past month, coinciding with increased tensions due to U.S.-Israel strikes against Iran. This situation raises concerns about the security of critical infrastructure, as such attacks could lead to significant disruptions in essential services like electricity and water supply. Officials are urging organizations in the energy and water sectors to bolster their defenses against these threats.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
The article discusses the urgent need for a complete overhaul of cybersecurity strategies in response to threats posed by AI-enabled nation-state actors. Current incremental approaches are deemed insufficient against the rapid evolution of these threats. The author emphasizes that organizations must adopt architectural changes to effectively counteract the speed and sophistication of attacks. This shift is crucial for national security and the protection of sensitive information across various sectors. The piece calls for a proactive stance that goes beyond traditional methods, urging stakeholders to rethink their cybersecurity frameworks to stay ahead of potential adversaries.
Help Net Security
The UK’s National Cyber Security Centre (NCSC) has issued a warning about the Russian cyber group APT28, which is reportedly hijacking internet traffic by compromising vulnerable routers. The attackers manipulate DHCP and DNS settings to redirect user traffic through their own servers, allowing them to spy on victims. This activity is linked to the GRU's Military Intelligence Unit 26165. Organizations and individuals using susceptible routers may be at risk, making it crucial for them to secure their devices against such exploits. The ongoing activity highlights the need for constant vigilance in network security, especially when it comes to maintaining router configurations.
A serious vulnerability has been discovered in Flowise that allows attackers to run arbitrary JavaScript code, which could lead to unauthorized access to a user's file system. This issue stems from improper validation of user-supplied code, making it a significant risk for users and organizations relying on Flowise. If exploited, attackers could manipulate data or install malicious software, raising concerns about data integrity and security. Users need to be aware of this vulnerability and take steps to secure their systems. Immediate action is necessary to prevent potential breaches and safeguard sensitive information.
Infosecurity Magazine
The UK security agency has issued a warning about a new series of cyberattacks linked to the Russian hacking group APT28. These attackers are modifying virtual private servers to function as malicious DNS servers, which they then use to hijack routers. This tactic allows them to steal user credentials and potentially gain access to sensitive information. The implications of these attacks are significant, as they could affect a wide range of internet users and organizations relying on compromised routers for secure connections. Users are advised to ensure their router firmware is up-to-date and to monitor their networks for any suspicious activity.
The Hacker News
CVE-2026-34040A serious vulnerability in Docker Engine, identified as CVE-2026-34040, has been reported that allows attackers to bypass authorization plugins under certain conditions. This flaw has a high severity rating, with a CVSS score of 8.8, and it is rooted in an incomplete fix for a previous vulnerability, CVE-2024-41110, which was disclosed in July 2024. This means that systems relying on Docker for container management could be at risk, potentially allowing unauthorized access to the host system. Organizations using Docker should take immediate action to assess their exposure and implement necessary security measures. The implications of this vulnerability are significant, as it could lead to unauthorized actions on affected systems, compromising sensitive data and operations.
SCM feed for Latest
A new privilege escalation vulnerability, dubbed 'BlueHammer', has been identified in Windows operating systems. This flaw, which merges a time-of-check to time-of-use (TOCTOU) vulnerability with path confusion, allows attackers to gain higher-level access to systems. Users of affected Windows versions are particularly at risk, as this could enable unauthorized actions that compromise system security. The release of exploit code for BlueHammer raises concerns about its potential use in cyberattacks, making it crucial for organizations to address this vulnerability promptly. Keeping systems updated and applying any available patches will be essential to mitigate the risks associated with this flaw.
SCM feed for Latest
In February 2026, the Uffizi Galleries, a renowned art museum in Florence, Italy, fell victim to a cyberattack that resulted in the theft of its complete photographic archive. The attack raised significant concerns about the security of cultural institutions, which often hold invaluable collections. The museum has since managed to restore its archive using backups, but the incident raises questions about the adequacy of cybersecurity measures in place to protect sensitive data. Such breaches not only threaten the integrity of cultural heritage but also expose institutions to potential reputational damage and financial losses. This incident serves as a stark reminder for museums and similar organizations to bolster their cybersecurity defenses.
SCM feed for Latest
Charming Kitten, a group linked to Iran's security forces, has been ramping up its use of social engineering tactics to carry out cyber espionage. This group is known for targeting officials, researchers, and employees at various companies by pretending to be trusted contacts. By impersonating familiar figures, they manipulate individuals into sharing sensitive information or clicking on malicious links. This method of attack is concerning because it exploits human psychology rather than technical vulnerabilities, making it harder for victims to recognize the threat. As these tactics become more sophisticated, it raises alarm bells for organizations that must bolster their defenses against such deceptive practices.
Recent findings reveal that attackers can exploit Grafana's AI components to leak sensitive enterprise data. By directing Grafana to external resources and using indirect prompts, they can bypass existing security measures. This vulnerability poses a significant risk to organizations that rely on Grafana for data visualization and monitoring, as it may expose confidential information. Companies using Grafana should take immediate action to assess their configurations and consider implementing additional safeguards to protect against such exploitation. The implications of this issue are serious, as it could lead to unauthorized access to critical business data.
Noma Security researchers have discovered a method called 'GrafanaGhost' that exploits Grafana's AI capabilities to extract sensitive corporate data without detection. By using indirect prompt injection, attackers can manipulate the AI to inadvertently share confidential information. This incident raises significant concerns for organizations relying on Grafana for data visualization, as it reveals vulnerabilities in how AI handles user inputs. The implications are serious, as this could lead to unauthorized data exposure for companies that use Grafana's services. Organizations need to be aware of these risks and consider reviewing their AI configurations and security protocols.
Storm-1175, a China-based cybercriminal group, is executing rapid ransomware attacks using newly discovered vulnerabilities to infiltrate networks. The group focuses on exploiting flaws before organizations have a chance to patch them, allowing for swift movement from gaining access to stealing data and deploying Medusa ransomware. This tactic not only threatens the immediate security of affected networks but also poses a significant risk to sensitive data and financial resources. Companies need to be vigilant about their security measures, especially around exposed systems, to defend against these fast-moving attacks. The urgency of this situation is underscored by the group's ability to execute attacks shortly after vulnerabilities are made public.
Hackread – Cybersecurity News, Data Breaches, AI and More
A new report from Keeper Security indicates that non-human identities, such as AI agents and automated systems, pose a significant security risk for businesses by 2026. Researchers found that as companies increasingly rely on these automated interactions, vulnerabilities are emerging that could be exploited by attackers. This shift raises concerns about how well current security measures can protect against these non-human threats. Organizations need to reassess their cybersecurity strategies to address the unique challenges presented by automated systems and ensure they are not leaving critical gaps in their defenses. As businesses become more digital, understanding and mitigating these risks will be vital for maintaining security and trust.
Infosecurity Magazine
The FBI has reported that cyber fraud cost victims over $17 billion in the past year, with cryptocurrency scams accounting for more than $7 billion of that total. The rise of AI-enabled fraud is a growing concern, as attackers are increasingly using advanced technology to deceive individuals and organizations. This surge in cyber crime affects a broad range of victims, from everyday users to businesses. The FBI's findings emphasize the urgent need for increased awareness and protective measures against these evolving scams. As cyber criminals become more sophisticated, both individuals and companies must stay informed about the risks and adopt better security practices to safeguard their assets.
Researchers have shown that GPU Rowhammer attacks can lead to privilege escalation, allowing attackers to gain root shell access on affected systems. This technique exploits vulnerabilities in the way graphics processing units (GPUs) manage memory, enabling unauthorized users to manipulate data and execute commands with higher privileges than intended. The implications of this discovery are significant, as it raises concerns about the security of systems that rely on GPUs for processing. Companies and users who utilize GPUs in their infrastructure may need to reassess their security measures to protect against this type of attack. As the research develops, it’s crucial for affected parties to stay informed and take necessary precautions to secure their systems.