A research collaboration between Access Now, Lookout, and SMEX has uncovered a troubling spyware campaign targeting journalists in the Middle East and North Africa. The campaign is believed to be linked to a group called Bitter, which is suspected of having connections to the Indian government. The spyware, identified as ProSpy, poses a significant risk to the privacy and safety of journalists in the region, as it can be used to monitor their communications and activities. This incident raises serious concerns about the increasing use of hack-for-hire services to silence critical voices and undermine press freedom. The implications of this spyware campaign extend beyond individual journalists, potentially affecting the broader landscape of media and freedom of expression in these areas.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Cyber fraud is escalating in Latin America, particularly among mobile users. Attackers are quickly taking control of compromised devices, leading to account takeovers and unauthorized fund transfers. This rapid sequence of events often occurs faster than many financial institutions can respond, leaving victims vulnerable to significant financial losses. The trend is concerning as it highlights the growing sophistication of cyber fraud in a region that is increasingly reliant on mobile technology for banking and transactions. Users and financial institutions must remain vigilant and adopt stronger security measures to protect against these threats.
SCM feed for Latest
A recent study reveals that outdated software on Macs and mobile devices poses serious security risks, with nearly all assessed mobile applications—95%—containing at least one medium-severity vulnerability. This puts a wide range of users at risk, as these vulnerabilities could be exploited by attackers to gain unauthorized access or compromise sensitive data. The findings suggest that many users may not be aware of the importance of keeping their software updated. Regular updates can help patch these vulnerabilities and protect devices from potential attacks. Users and companies alike need to prioritize software maintenance to ensure better security.
Signature Healthcare in Brockton, Massachusetts, experienced a cyberattack that severely disrupted its hospital operations, leading to the diversion of ambulances and the cancellation of some services. The attack particularly affected pharmacy operations, preventing staff from filling prescriptions, although urgent care and walk-in services continued to function. This incident highlights the vulnerabilities in healthcare systems, which are increasingly targeted by cybercriminals. The impact on patient care and access to medications raises significant concerns about the security measures in place at healthcare facilities. As more hospitals digitize their operations, the need for robust cybersecurity practices becomes more critical.
Iranian hackers have targeted critical infrastructure in the United States by exploiting Internet-facing operational technology (OT) devices, specifically programmable logic controllers (PLCs). This breach has led to file and display manipulation, causing significant operational disruptions and financial losses across various sectors. The attackers have demonstrated their capability to disrupt essential services, raising concerns about the security of critical infrastructure in the U.S. Organizations relying on these systems need to review their security measures to prevent similar incidents in the future. The situation serves as a wake-up call for industries to prioritize the protection of their OT environments against external threats.
In 2025, the FBI reported receiving over 1 million complaints related to cybercrime, resulting in losses close to $21 billion. The most significant financial damages came from investment scams, business email compromise (BEC) schemes, and tech support fraud. These scams have been particularly damaging, affecting individuals and businesses alike, and highlighting the urgent need for better cybersecurity awareness and protections. The sheer volume of complaints indicates a growing trend in cybercrime, emphasizing that both consumers and companies must remain vigilant against these types of attacks. The financial impact of these scams not only affects victims directly but also has broader implications for the economy as a whole.
Signature Healthcare, a Massachusetts hospital, is facing significant disruptions due to a cyberattack that has forced the facility to divert ambulances and cancel certain services. The attack has also impacted the hospital's pharmacies, rendering them unable to fill prescriptions for patients. This incident underscores the vulnerabilities that healthcare systems face from cyber threats, which can directly affect patient care and safety. As hospitals increasingly rely on digital systems, attacks like this can disrupt critical services and have severe implications for patient health. The situation is ongoing, and the hospital is likely working to restore normal operations while managing the fallout from the incident.
Anthropic has launched Project Glasswing, an initiative aimed at using its Claude Mythos Preview AI to autonomously detect and fix previously undiscovered vulnerabilities in critical software. This project addresses a significant concern in cybersecurity, as many vulnerabilities remain unaddressed until they are exploited by attackers. By leveraging AI, Anthropic hopes to enhance the security of various software systems, potentially reducing the risk of breaches and attacks. This proactive approach could benefit organizations that rely on critical software, as it aims to minimize the window of exposure for undetected vulnerabilities. The implications of this technology could be far-reaching, as it addresses a growing need for automated security solutions in a rapidly evolving threat landscape.
Anthropic has introduced Claude Mythos, a new AI model aimed at bolstering cybersecurity through a project called Glasswing. This initiative seeks to protect software from potential cyber threats before they can be exploited by malicious actors. The interest in Claude Mythos surged following a leak of nearly 3,000 internal files, raising concerns about the implications of AI in cybersecurity. While the technology promises to enhance protection against cyberattacks, it also poses risks as it could be used to improve the capabilities of attackers. This dual-use nature of AI in security underscores the need for careful consideration and regulation in its deployment.
Docker has addressed a significant vulnerability that allowed attackers to bypass authorization controls and create containers with excessive privileges. This issue arose from a crafted HTTP request that could make restricted containers invisible to authentication and authorization plugins. As a result, unauthorized users could gain elevated access, potentially allowing them to execute harmful actions within the system. This vulnerability affects users of Docker's containerization platform, and it is crucial for organizations to apply the latest patches to safeguard their environments. Docker has released updates to fix this flaw, emphasizing the importance of maintaining security best practices in container management.
Schneier on Security
Researchers have discovered a malicious code injection in the Python Package Index (PyPI) through a compromised version of the litellm package, specifically version 1.82.8. This version includes a harmful .pth file that executes automatically when Python starts, without needing the litellm module to be imported. This means that any user who installs this package could unknowingly run the malicious code, posing a significant risk to their systems. The incident raises concerns about supply chain security in the Python ecosystem and underscores the need for better security measures, such as Software Bill of Materials (SBOMs) and verification systems. Users of Python and developers relying on this package should take immediate steps to secure their environments and avoid the compromised version.
Infosecurity Magazine
The FBI has successfully disrupted a network of DNS hijacking attacks linked to the Russian hacking group APT28. This group, also known as Fancy Bear, has been known for targeting various sectors, including government and military organizations. The FBI's action involved disconnecting US-based routers that had been compromised, effectively cutting them off from APT28's control. This incident underscores the ongoing threat posed by foreign cyber actors to US infrastructure and services. By taking these routers offline, the FBI aims to protect users from being redirected to malicious sites that could steal sensitive information or install malware.
Infosecurity Magazine
Researchers have discovered a long-hidden vulnerability in Apache ActiveMQ Classic, a widely-used messaging server. This bug was identified with the help of Anthropic's Claude AI, marking a significant find after 13 years. The vulnerability could allow attackers to manipulate message queues, potentially leading to data leaks or service disruptions. Companies that rely on ActiveMQ for their messaging infrastructure should take this discovery seriously, as it affects their systems' security. Users are urged to review their configurations and apply any available updates to mitigate risks associated with this flaw.
Infosecurity Magazine
The Cybersecurity and Infrastructure Security Agency (CISA) has reported that Iranian-backed threat actors are targeting U.S. critical infrastructure firms through internet-facing operational technology (OT) assets. These attacks have resulted in significant disruptions and financial losses for these companies. While specific companies affected have not been disclosed, the potential risks to critical infrastructure highlight the growing concern over state-sponsored cyber threats. Organizations in the energy, water, and transportation sectors should be particularly vigilant and enhance their security measures to protect against such attacks. This incident emphasizes the need for robust cybersecurity practices in an increasingly interconnected world.
SCM feed for Latest
Voxbeam Telecommunications, a major U.S. voice service provider, has been fined $4.5 million by the Federal Communications Commission (FCC) for mishandling call traffic. The FCC found that Voxbeam accepted suspicious call traffic from a foreign provider without proper authorization. This incident raises concerns about the integrity of telecommunications networks and the potential for abuse through unauthorized call traffic. The fine serves as a reminder for voice service providers to ensure compliance with regulations designed to combat robocalls and protect consumers. As the issue of robocalls continues to plague many Americans, this action by the FCC aims to strengthen enforcement against companies that contribute to the problem.