Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Cyberattacks are on the rise in Latin America, specifically targeting government systems. In Puerto Rico, there have been disruptive attacks that have affected government operations. Meanwhile, Colombia's health sector is facing a surge of probing activities, raising concerns about data integrity and system security. These incidents reflect a growing trend of cyber threats in the region, putting government agencies and public services at risk. As these attacks escalate, they not only disrupt essential services but also pose a challenge for authorities in maintaining public trust and safety.

Impact: Government systems in Puerto Rico and Colombia's health sector
Remediation: Strengthening cybersecurity measures, conducting system audits, and implementing incident response plans
Read Original
Actively Exploited

Cybersecurity incidents are increasingly being driven by identity theft, particularly through stolen login credentials. Reports indicate that attackers are using these stolen credentials as a primary way to infiltrate systems, leading to a surge in ransomware attacks. This trend poses significant risks for companies and individuals alike, as unauthorized access can lead to data breaches and financial losses. Organizations need to strengthen their security measures and educate users on the importance of password hygiene and multi-factor authentication to combat this rising threat. The alarming rise in credential abuse emphasizes the need for vigilance in cybersecurity practices.

Impact: Stolen login credentials, ransomware systems
Remediation: Implement strong password policies, enforce multi-factor authentication, conduct regular security training for users
Read Original

Cybercriminals are sending out fake LinkedIn alert messages that claim to offer job opportunities, but their real goal is to steal user credentials. This phishing campaign tricks recipients into providing sensitive information, putting their accounts at risk. The fraudulent messages imitate legitimate notifications from LinkedIn, making them difficult to detect. Users who fall for this scam could find their personal data compromised, leading to potential identity theft or unauthorized access to their accounts. It's essential for LinkedIn users to be cautious and verify messages before clicking on any links or providing information.

Impact: LinkedIn accounts
Remediation: Users should verify the authenticity of job alerts directly through LinkedIn's official site and avoid clicking on suspicious links. It is also advisable to enable two-factor authentication for added security.
Read Original
Anthropic Leaks 512,000 Lines of Claude AI Code in Major Blunder

Hackread – Cybersecurity News, Data Breaches, AI and More

Anthropic, the AI research company, accidentally exposed over 512,000 lines of code related to its Claude AI system. This significant leak included sensitive information about two of its projects, KAIROS and Capybara. As a result, users are being urged to switch to the Native Installer to mitigate any potential risks associated with this exposure. The incident raises concerns about data security and the safeguards in place for proprietary code, especially given the competitive nature of the AI industry. It serves as a reminder of how human error can lead to significant breaches of confidentiality and proprietary information.

Impact: Anthropic Claude AI, KAIROS, Capybara
Remediation: Users are advised to switch to the Native Installer.
Read Original
Actively Exploited

The United Arab Emirates is experiencing a rise in cyberattacks fueled by artificial intelligence tools. Attackers, including those linked to state-sponsored groups, are utilizing platforms like ChatGPT to enhance their cyber operations. This trend raises concerns for various sectors in the UAE, as the sophistication of these attacks could lead to significant data breaches and disruptions. The situation underscores the need for stronger cybersecurity measures and awareness among organizations and individuals alike. As the threat landscape evolves with AI, stakeholders must remain vigilant to protect sensitive information and infrastructure.

Impact: N/A
Remediation: Organizations should enhance their cybersecurity protocols, conduct regular training for staff on recognizing phishing and other attack vectors, and implement advanced threat detection systems.
Read Original

Google has released a series of updates to address 21 vulnerabilities in its Chrome browser, including a significant zero-day flaw identified as CVE-2026-5281. This vulnerability affects the Dawn component of Chrome and has been exploited in the wild, which means attackers are actively taking advantage of it. Users of Chrome are urged to update their browsers to the latest version to protect themselves against potential exploits. Keeping browsers up to date is crucial as these vulnerabilities can allow unauthorized access or manipulation of user data. The timely patching of such vulnerabilities emphasizes the ongoing need for vigilance in maintaining cybersecurity.

Impact: Google Chrome browser, specifically the Dawn component, affected versions unspecified.
Remediation: Users should update their Chrome browser to the latest version to mitigate the risks associated with CVE-2026-5281 and the other vulnerabilities.
Read Original

A recent cyberattack has compromised npm packages for Axios, a widely-used HTTP client library, and is believed to be linked to North Korean hackers known for financially motivated attacks. On March 31, 2026, attackers gained access to a maintainer's npm account and published two malicious packages. These backdoored versions contained a hidden dependency that included a post-install script, which executed automatically upon installation. This incident raises serious concerns for developers and organizations using Axios, as it highlights the vulnerabilities within the software supply chain and the potential for widespread impact on applications relying on this library. Users are urged to take precautions and verify package integrity to avoid falling victim to similar attacks in the future.

Impact: Axios npm packages
Remediation: Users should verify the integrity of npm packages and consider implementing additional security measures for package management.
Read Original

A new threat report from Blackpoint Cyber reveals that modern cyber intrusions often begin with valid credentials rather than traditional exploits. Researchers found that many incidents are driven by the abuse of VPNs, remote monitoring and management (RMM) tools, and social engineering tactics. This shift indicates that attackers are increasingly taking advantage of legitimate access points within organizations, which can make detection more challenging. Companies need to strengthen their security measures and educate employees about the risks associated with social engineering to mitigate these threats. The findings highlight the importance of monitoring and managing access privileges to prevent misuse.

Impact: VPNs, RMM tools, employee accounts
Remediation: Implement stricter access controls, enhance employee training on social engineering, and monitor VPN and RMM tool usage closely.
Read Original

The FBI has issued a public service announcement warning Americans about potential data privacy risks associated with certain mobile apps developed outside the United States. According to the FBI, these apps may gather user data continuously, even if users have only authorized data collection for specific features or during active use. This raises concerns about how user information is monitored and potentially exploited without users' explicit consent. The warning serves as a reminder for individuals to be cautious about the apps they download and the permissions they grant, especially those from foreign developers. Users are urged to review app permissions regularly and consider the potential risks to their personal information.

Impact: Foreign-developed mobile applications
Remediation: Users should review app permissions regularly and limit data access to only what is necessary.
Read Original
Actively Exploited

Jonathan Spalletta has been charged for exploiting vulnerabilities in the smart contracts of Uranium, a cryptocurrency exchange, leading to a theft of around $55 million worth of digital assets. The hack forced Uranium to shut down operations, impacting users and investors who relied on the platform for trading. This incident highlights the ongoing risks associated with smart contracts in the crypto space, where security flaws can lead to significant financial losses. The case is part of a broader trend, as law enforcement agencies increase their scrutiny of cybercriminal activities in the cryptocurrency sector. As Spalletta faces legal consequences, it raises awareness about the importance of security measures in protecting digital currencies.

Impact: Uranium cryptocurrency exchange, smart contracts
Remediation: Improving security audits for smart contracts, implementing stricter code review processes
Read Original

A new malware-as-a-service platform called Venom Stealer has emerged, designed to automate the theft of sensitive data such as login credentials and cryptocurrency information. This platform utilizes a method known as ClickFix social engineering to lure victims and extract their data. Venom Stealer represents a growing trend in cybercrime where attackers can easily access sophisticated tools to conduct continuous data theft without needing extensive technical skills. This poses a significant risk to individuals and organizations alike, as it can lead to financial losses and breaches of personal information. Users are urged to remain vigilant and implement strong security measures to protect themselves from potential attacks.

Impact: N/A
Remediation: Users should implement strong password policies, enable two-factor authentication, and be cautious of suspicious links and downloads.
Read Original
Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Recent research from Seqrite has revealed that ransomware groups are increasingly using legitimate IT tools, such as IOBit Unlocker, to bypass antivirus software. This tactic, known as the 'dual-use dilemma,' allows attackers to exploit trusted software to carry out their malicious activities without raising immediate alarms. By repurposing these tools, they enhance their chances of successfully infiltrating systems and encrypting data for ransom. This trend poses a significant risk to organizations that rely on these tools for legitimate purposes, as it complicates detection and response efforts. As cybercriminals continue to adapt their methods, companies must remain vigilant and consider revising their security measures to account for the misuse of legitimate software.

Impact: IOBit Unlocker, antivirus software
Remediation: Companies should enhance their endpoint security measures, conduct regular audits of software usage, and educate employees on the risks associated with using third-party tools.
Read Original

The FBI has issued a warning to American users about the potential privacy risks associated with mobile applications developed in China. This caution arises from concerns that these apps might collect sensitive data and share it with the Chinese government. The FBI emphasizes that the use of such apps could compromise personal and national security. Users are encouraged to be cautious and consider the implications of downloading these applications, particularly those that require extensive permissions. This warning reflects growing scrutiny over foreign technology and its impact on user privacy and data security.

Impact: Chinese mobile applications
Remediation: Users should avoid downloading apps from Chinese developers and review app permissions carefully.
Read Original
Actively Exploited

Google has addressed 21 vulnerabilities in its Chrome browser, including a serious zero-day flaw identified as CVE-2026-5281. This vulnerability is categorized as a use-after-free (UAF) issue in Dawn, which is part of the WebGPU standard utilized by Chromium and its derivatives. While specific details about the exploitation of this flaw are scarce, the fact that it has been flagged as 'in-the-wild' suggests that attackers are actively using it. Users of Chrome and other Chromium-based browsers should ensure they are running the latest versions to protect themselves from potential attacks. Keeping browsers updated is crucial because such vulnerabilities can lead to unauthorized access or other malicious activities.

Impact: Google Chrome, Chromium-based browsers, Dawn (WebGPU implementation)
Remediation: Users should update their Chrome browsers to the latest version to mitigate the risks associated with CVE-2026-5281.
Read Original

Venom Stealer is a type of malware-as-a-service (MaaS) that has been linked to various cyberattacks, including those targeting ClickFix and cryptocurrency theft. Once it infiltrates a victim's device, the malware remains persistent, immediately stealing sensitive data without storing it locally. This rapid exfiltration process makes it particularly dangerous, as victims may not even realize their information has been compromised until it’s too late. The versatility of Venom Stealer in targeting both general data and specific financial information poses a significant risk to individuals and organizations alike. As cybercriminals increasingly adopt such services, users need to be vigilant about their cybersecurity practices.

Impact: Venom Stealer, ClickFix, cryptocurrency systems
Remediation: Users should employ robust antivirus solutions, ensure regular software updates, and practice safe browsing habits to mitigate risks.
Read Original
Page 1 of 136Next