Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

A recent study by Proofpoint revealed that half of global organizations have experienced incidents involving artificial intelligence, even with AI security measures in place. This suggests that existing safeguards are not sufficient to prevent misuse or attacks related to AI technologies. The research highlights a growing concern among businesses about the vulnerabilities associated with AI, particularly as adoption rates increase. Security professionals need to reassess their strategies to better protect against AI-related threats, as the technology continues to evolve. This finding serves as a wake-up call for organizations to enhance their defenses and stay ahead of potential risks.

Impact: N/A
Remediation: Organizations should reassess their AI security strategies and enhance their defenses against potential AI-related threats.
Read Original

In 2025, U.S. companies are facing record fines related to privacy violations, largely driven by stringent privacy laws in states like California. The increased scrutiny comes from new partnerships between states and a growing concern over how artificial intelligence and automation impact personal privacy. These fines reflect a broader trend of enforcing privacy regulations more aggressively, signaling to businesses that they must prioritize consumer data protection. As more states adopt similar laws, companies across various sectors will need to reassess their data handling practices to avoid costly penalties. This situation is significant as it emphasizes the evolving landscape of privacy laws and the responsibility of companies to comply with them.

Impact: N/A
Remediation: Companies should review and update their privacy policies and data handling practices to comply with state regulations.
Read Original

The UK’s National Cyber Security Centre (NCSC) has introduced SilentGlass, a new security device designed to protect HDMI and DisplayPort connections from potential hardware attacks. This small plug-in device addresses a significant security gap in IT systems, which often overlook the physical connections between computers and monitors. By blocking malicious links, SilentGlass aims to safeguard sensitive information displayed on screens, making it particularly important for organizations that handle confidential data. The device is now available for commercial use globally, emphasizing the importance of securing physical connections in an increasingly digital world.

Impact: HDMI and DisplayPort connections
Remediation: Use SilentGlass plug-in device for securing HDMI and DisplayPort links
Read Original

The ShinyHunters cybercrime group has claimed to have stolen approximately 9 million records of personal information from Medtronic, a major medical technology company. This claim was made after ShinyHunters threatened to leak the data if their demands were not met. Medtronic has confirmed that a security incident occurred, raising concerns about the protection of sensitive health-related information. This incident could lead to significant privacy issues for affected individuals, as the stolen data may include personal health details. The situation underscores the need for robust cybersecurity measures, especially in the healthcare sector, where data breaches can have serious implications for patient confidentiality and trust.

Impact: Medtronic personal data records, possibly including patient health information
Remediation: N/A
Read Original

A vulnerability has been discovered in the Zimbra Collaboration Suite, affecting versions 8.8.15, 9.0, 10.0, and 10.1. This flaw is currently being actively exploited, putting thousands of Zimbra servers at risk. Organizations using these specific versions need to act quickly to protect their systems from potential attacks. The exploitation of this vulnerability could lead to unauthorized access or data breaches, making it critical for users to ensure their software is updated. Companies should monitor for any signs of intrusion and apply necessary patches as soon as they become available.

Impact: Zimbra Collaboration Suite versions 8.8.15, 9.0, 10.0, and 10.1
Remediation: Users should update their Zimbra Collaboration Suite to the latest version as patches become available. Regular monitoring and auditing of server access logs are also recommended to detect any suspicious activity.
Read Original

BlackFile hackers are using voice phishing, or vishing, to target the retail and hospitality sectors. They make calls using spoofed numbers to pose as IT support, tricking employees into revealing sensitive information. This method allows them to gather data for potential extortion. Companies in these industries should be vigilant as the attackers exploit trust in IT communications to gain access to critical systems. The rise of such tactics underscores the need for enhanced security training for staff to recognize and respond to these types of scams.

Impact: Retail and hospitality sectors
Remediation: Implement security awareness training for employees, use caller ID verification, and establish clear protocols for handling unsolicited IT requests.
Read Original

The U.S. government has accused Chinese entities of engaging in large-scale theft of artificial intelligence models from American companies. According to a memo from the White House, these entities reportedly employed tens of thousands of proxy accounts and utilized jailbreaking techniques to extract advanced capabilities from U.S. frontier AI systems. This incident raises significant concerns about intellectual property theft and national security, as the stolen technology could enhance China's competitive edge in the AI sector. The implications for U.S. companies and the broader tech industry are profound, as continued cyber espionage could stifle innovation and lead to economic losses. This situation highlights the ongoing tensions between the U.S. and China over technology and cybersecurity.

Impact: U.S. frontier AI systems, potentially affecting companies involved in AI development.
Remediation: N/A
Read Original

A new wave of the GlassWorm malware campaign is targeting the OpenVSX ecosystem through 73 malicious 'sleeper' extensions. These extensions initially appear harmless but become malicious after receiving an update, posing a significant risk to users who may unknowingly install them. Researchers have noted that this tactic allows attackers to bypass traditional security measures that focus on identifying known malware. Developers and users of OpenVSX should be particularly vigilant, as these extensions can compromise their systems without warning. The situation emphasizes the need for caution when updating software and extensions from less familiar sources.

Impact: OpenVSX ecosystem, users of affected extensions
Remediation: Users should avoid installing unverified extensions and regularly check for updates from trusted sources. It's advisable to monitor installed extensions for any unexpected changes.
Read Original

The Supreme Court is currently considering a significant case, Chatrie v. United States, which revolves around the use of geofence surveillance by law enforcement. This technology allows authorities to gather location data from mobile devices within a specific area during a certain time frame, raising concerns about privacy and the extent of government monitoring. Justices expressed skepticism towards both sides, indicating they are carefully weighing the implications of allowing such surveillance methods. A decision is expected this summer, which could set important precedents for how law enforcement agencies can collect and use data in investigations. The outcome may impact privacy rights and law enforcement practices nationwide.

Impact: N/A
Remediation: N/A
Read Original
82 Chrome Extensions Found Selling User Data, 6.5 Million Users Affected

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Research conducted by LayerX has uncovered that 82 Chrome extensions have been collecting and selling user data, impacting at least 6.5 million users. These extensions utilized disclosed but troubling practices to gather personal information, raising significant privacy concerns. Users of these extensions may have unknowingly compromised their data, which could lead to targeted advertising or other privacy invasions. The findings emphasize the need for users to be cautious about the permissions they grant to browser extensions and to regularly review their installed extensions. This incident serves as a stark reminder of the potential risks associated with seemingly innocuous tools that can operate within web browsers.

Impact: 82 Chrome extensions
Remediation: Users should review and remove any suspicious or unnecessary extensions from their browsers and be cautious about granting excessive permissions to new extensions.
Read Original

Medtronic recently reported that it experienced a cyberattack, but it maintained that its operations were not disrupted. This incident raised alarms as it marks the second cyberattack on a significant medical device manufacturer since the onset of the Iran war. Although specific details about the nature of the attack were not disclosed, the event raises concerns about the growing targeting of healthcare companies, which are crucial for patient care. As cyber threats evolve, companies in the medical sector must remain vigilant to protect sensitive patient data and ensure the continuous operation of medical devices. The implications of such attacks can be severe, potentially affecting patient safety and trust in healthcare providers.

Impact: Medtronic medical devices
Remediation: N/A
Read Original

Senators Maggie Hassan and Jim Banks have reached out to Navigate360 after a hacker claimed to have accessed sensitive student data from a school safety tip line that was designed to be anonymous. This incident raises serious concerns about the security measures in place for tools meant to protect students and ensure their safety. The hackers' actions could put the personal information of students at risk, potentially leading to misuse or exploitation. The senators are seeking clarity on how this breach occurred and what steps are being taken to secure the data moving forward. This situation emphasizes the need for robust security protocols in educational tools that handle sensitive information.

Impact: Navigate360 school safety tool, student data
Remediation: N/A
Read Original

A vulnerability in Firefox and the Tor Browser has been discovered, linked to how IndexedDB, a database used by these browsers to store data, operates. This flaw can potentially expose hidden identifiers, which can compromise user privacy and anonymity. Both browsers are widely used, especially by individuals seeking enhanced privacy online, making this issue particularly concerning. Users of these browsers should be aware of the risks associated with this vulnerability, as it may allow malicious actors to track their online activities. It is crucial for users to stay updated with the latest browser patches to mitigate these risks.

Impact: Firefox, Tor Browser
Remediation: Users should update to the latest versions of Firefox and Tor Browser as patches are made available.
Read Original

Checkmarx has confirmed that data from its GitHub repository was posted on the dark web following a supply chain attack on March 23, 2026. The company is currently investigating the breach and believes that the attackers gained access to its repository during this incident. This exposure could have significant implications for Checkmarx and its clients, as sensitive information may have been compromised. The incident highlights the ongoing risks associated with supply chain vulnerabilities, emphasizing the need for companies to enhance their security measures. As the investigation continues, Checkmarx is likely to provide further updates on the extent of the data breach and potential impacts on affected users.

Impact: Checkmarx GitHub repository data
Remediation: N/A
Read Original

A group of attackers known as BlackFile is actively extorting companies in the retail and hospitality sectors by threatening to release stolen data. Researchers believe these attackers are linked to another group called The Com. In a disturbing tactic, they have reportedly swatted company executives, which involves falsely reporting emergencies to law enforcement to create fear and pressure victims into complying with ransom demands. This aggressive strategy not only harms the targeted businesses but also raises concerns about the safety and privacy of their executives and employees. Companies in these sectors need to be vigilant about their cybersecurity measures and consider the potential risks of data breaches and extortion attempts.

Impact: Retail and hospitality sectors, company executives
Remediation: Companies should enhance their cybersecurity protocols, conduct employee training on social engineering attacks, and consider legal measures against extortion attempts.
Read Original
Page 1 of 173Next