Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now

Hackread – Cybersecurity News, Data Breaches, AI and More

A serious vulnerability identified as CVE-2026-5194 has been found in wolfSSL, affecting a vast array of devices, including Internet of Things (IoT) devices, routers, and military systems. This flaw allows attackers to forge digital identities, which poses a significant risk to the security of billions of devices globally. Users and organizations utilizing wolfSSL should promptly update to version 5.9.1 to mitigate this risk. The widespread impact of this vulnerability emphasizes the importance of regular software updates to maintain security across various platforms. Failure to address this issue could lead to unauthorized access and potential exploitation of sensitive systems.

Impact: Affected products include wolfSSL versions prior to 5.9.1, specifically impacting IoT devices, routers, and military systems utilizing this library.
Remediation: Update to wolfSSL version 5.9.1 to fix the vulnerability and reduce risk.
Read Original

JanelaRAT is a type of malware that is specifically targeting banks in Latin America. It uses a unique detection method that allows it to identify and focus on particular financial websites by scanning for custom title bars. This targeted approach makes it a serious concern for financial institutions and their customers, as it can lead to unauthorized access to sensitive information. As attackers continue to refine their tactics, banks must remain vigilant and implement robust security measures to protect their systems and customers from these malicious activities. The ongoing threat from JanelaRAT underscores the need for increased cybersecurity awareness and defenses among financial organizations in the region.

Impact: Latin American banks, financial websites
Remediation: Implement advanced security measures, monitor for unusual activity, educate users about phishing and malware threats.
Read Original

The UK has successfully disrupted a Russian intelligence operation aimed at subsea cables, which are crucial for global communications. This operation involved Russian vessels from the Main Directorate of Deep Sea Research (GUGI), known for monitoring important offshore infrastructure. The UK authorities did not disclose specific details about the timing or methods of the disruption but emphasized the importance of protecting critical infrastructure from foreign interference. This incident raises concerns about the security of undersea cables, as they are vital for internet connectivity and economic stability. It also highlights ongoing tensions between the UK and Russia regarding cybersecurity and espionage activities.

Impact: Subsea cables, critical offshore infrastructure
Remediation: N/A
Read Original

A recent educational exercise called 'Capture the Narrative' involved students creating bots to manipulate a fictional election. This simulation aimed to demonstrate the potential impact of social media manipulation on real-world political scenarios. By using these bots, participants learned how misinformation can sway public opinion and affect electoral outcomes. The exercise underscores the growing concern about the influence of social media in politics and the tactics that can be employed to distort reality. As social media platforms continue to play a significant role in shaping public discourse, understanding these dynamics is crucial for both individuals and policymakers.

Impact: N/A
Remediation: N/A
Read Original
Kraken Exchange Faces Extortion After Insider Recorded System Footage

Hackread – Cybersecurity News, Data Breaches, AI and More

Kraken exchange is facing an extortion attempt after a staff member recorded internal system footage without authorization. Approximately 2,000 user accounts were impacted, although the exchange confirmed that no funds or systems were compromised. This incident raises concerns about insider threats and the potential misuse of employee access to sensitive information. As exchanges handle vast amounts of customer data, ensuring robust internal security measures is crucial to prevent similar situations in the future. The incident serves as a reminder for companies to monitor employee activities closely and maintain strict access controls.

Impact: Kraken exchange accounts
Remediation: Implement stricter access controls and monitor employee activities.
Read Original

Two serious vulnerabilities have been found in Composer, a popular package manager for PHP, which could allow attackers to execute arbitrary commands on affected systems. These flaws specifically target the Perforce VCS driver, raising concerns for developers and organizations that rely on this tool for managing PHP packages. If exploited, these vulnerabilities could lead to unauthorized access and control over systems using the affected versions. Users need to act quickly to apply the patches released to secure their environments and protect sensitive data from potential breaches. The vulnerabilities highlight the importance of maintaining updated software to mitigate risks.

Impact: Composer package manager for PHP, Perforce VCS driver
Remediation: Patches have been released for the vulnerabilities. Users are advised to update to the latest version of Composer that addresses these command injection flaws.
Read Original

The UK government's AI Security Institute (AISI) recently tested Claude Mythos Preview, a new large language model developed by Anthropic, for its potential use in automated cyber attacks. While Claude Mythos showed advanced capabilities in completing capture-the-flag challenges and simulating multi-step attacks, the research concluded that it cannot consistently perform autonomous attacks on well-protected networks. This finding is significant as it indicates that, although AI models like Claude Mythos are improving in cybersecurity tasks, they still have limitations that prevent them from being effective in real-world, high-security scenarios. Understanding these capabilities and constraints is crucial for both developers and cybersecurity professionals as they navigate the evolving landscape of AI in cybersecurity.

Impact: Claude Mythos Preview
Remediation: N/A
Read Original
Booking.com Confirms Data Breach as Hackers Access Customer Details

Hackread – Cybersecurity News, Data Breaches, AI and More

Booking.com has confirmed that a data breach has occurred, compromising customer details. Although no payment information was accessed, the breach raises concerns about potential phishing scams targeting affected users. This incident puts customers at risk of receiving fraudulent communications that could lead to further data theft or financial loss. Booking.com has not specified how many users are impacted or the exact nature of the compromised data. Customers should remain vigilant and be cautious with any unsolicited emails or messages they receive following this breach.

Impact: Booking.com customer data
Remediation: Users are advised to be cautious of phishing attempts and to monitor their accounts for any suspicious activity.
Read Original

A significant data breach involving Rockstar Games has been reported, with a leak of 8.1GB of sensitive data attributed to the hacking group ShinyHunters. The leaked files include anti-cheat source code, player analytics, and game assets, along with Zendesk support tickets. This breach raises concerns about the security of user data and the integrity of the games produced by Rockstar. Game developers and players alike should be aware of the potential risks associated with such leaks, including the possibility of cheating and exploitation in online games. The data was reportedly obtained through a third-party service called Anodot, highlighting the vulnerabilities that can arise from third-party integrations.

Impact: Rockstar Games, including its online gaming platforms and related services.
Remediation: Companies should evaluate their data security measures, especially concerning third-party integrations and anti-cheat mechanisms.
Read Original
Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

ViperTunnel is a new backdoor malware linked to the DragonForce ransomware, specifically targeting businesses that operate on Windows servers in the US and the UK. This Python-based malware allows attackers to gain unauthorized access to systems, which can lead to data theft or further exploitation. Companies utilizing Windows server environments should be particularly vigilant, as the malware poses a significant risk to their operations and data security. The emergence of ViperTunnel highlights the ongoing challenges businesses face in protecting their networks from evolving ransomware threats. Organizations are urged to implement strong security measures and regularly update their systems to fend off such attacks.

Impact: Windows servers
Remediation: Organizations should implement strong security measures, regularly update their systems, and monitor for unusual activities.
Read Original

A recent analysis by OX Security examined 216 million security findings from 250 organizations over a span of 90 days. The report revealed that while the overall number of security alerts increased by 52% compared to the previous year, the number of critical risks surged by almost 400%. This alarming trend is largely attributed to the rapid growth of AI-assisted development, which is outpacing the ability to manage high-impact vulnerabilities. As organizations adopt more AI technologies, they need to be vigilant about the increasing density of these vulnerabilities, which could lead to significant security breaches if not addressed promptly. Companies must prioritize their security measures to keep up with this accelerating risk landscape.

Impact: N/A
Remediation: Organizations should enhance their security protocols and prioritize the management of critical vulnerabilities, especially those related to AI technologies.
Read Original

RCI Hospitality, a major player in the nightclub industry, has reported a data breach due to an IDOR (Insecure Direct Object Reference) vulnerability in RCI Internet Services. This security flaw exposed sensitive contractor data, potentially affecting individuals associated with the company. The breach was disclosed in a filing with the Securities and Exchange Commission (SEC), indicating that the company is taking the matter seriously. This incident raises concerns about data security in the hospitality sector, as breaches can lead to identity theft and other malicious activities. Stakeholders will need to monitor the situation closely as RCI investigates the extent of the exposure and implements necessary safeguards.

Impact: Contractor data from RCI Internet Services
Remediation: N/A
Read Original
Actively Exploited

A serious vulnerability has been discovered in ShowDoc, an online tool used by IT teams for document sharing and collaboration. This flaw, identified as CVE-2025-0520, allows attackers to execute remote code on unpatched servers, posing a significant risk to organizations that have not updated their systems. With a CVSS score of 9.4, this remote code execution vulnerability is currently being exploited in the wild, meaning that attackers are actively taking advantage of it. Companies using ShowDoc need to prioritize patching their servers to protect against potential breaches and unauthorized access to sensitive information. Failing to address this issue could lead to severe consequences for affected organizations.

Impact: ShowDoc servers running unpatched versions are affected by CVE-2025-0520.
Remediation: Organizations should immediately apply the latest patches for ShowDoc to mitigate the risk associated with CVE-2025-0520. Regularly updating software and monitoring for vulnerabilities is also recommended.
Read Original

A recent study has revealed that over one-third of the official partners of the FIFA World Cup 2026 are exposing the public to the risk of email fraud. This vulnerability arises mainly from the use of unsecured email practices, which can make them easy targets for phishing attacks. The findings suggest that these partners, which include various companies and organizations involved with the event, need to enhance their email security measures to protect their communications and sensitive information. The implications are significant, as successful email fraud can lead to financial losses and damage to reputations, especially for high-profile events like the World Cup. Stakeholders are urged to adopt stronger security protocols to mitigate these risks and safeguard their users.

Impact: Official partners of FIFA World Cup 2026
Remediation: Enhance email security measures, implement two-factor authentication, provide phishing awareness training
Read Original

Basic-Fit, a popular fitness chain in Europe, has reported a significant data breach affecting approximately one million of its customers. Hackers managed to infiltrate the company's systems and accessed sensitive information. While Basic-Fit has not specified exactly what data was compromised, breaches of this nature often involve personal details such as names, email addresses, and possibly payment information. This incident raises concerns about the security of customer data in the fitness industry, especially as more people rely on online services for their health and fitness needs. Customers are advised to monitor their accounts for any unusual activity and consider changing their passwords to enhance their security.

Impact: Customer data including names, email addresses, and potentially payment information.
Remediation: Customers should monitor their accounts for unusual activity and change their passwords.
Read Original
Page 1 of 153Next