Cyberattacks are on the rise in Latin America, specifically targeting government systems. In Puerto Rico, there have been disruptive attacks that have affected government operations. Meanwhile, Colombia's health sector is facing a surge of probing activities, raising concerns about data integrity and system security. These incidents reflect a growing trend of cyber threats in the region, putting government agencies and public services at risk. As these attacks escalate, they not only disrupt essential services but also pose a challenge for authorities in maintaining public trust and safety.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
SCM feed for Latest
Cybersecurity incidents are increasingly being driven by identity theft, particularly through stolen login credentials. Reports indicate that attackers are using these stolen credentials as a primary way to infiltrate systems, leading to a surge in ransomware attacks. This trend poses significant risks for companies and individuals alike, as unauthorized access can lead to data breaches and financial losses. Organizations need to strengthen their security measures and educate users on the importance of password hygiene and multi-factor authentication to combat this rising threat. The alarming rise in credential abuse emphasizes the need for vigilance in cybersecurity practices.
SCM feed for Latest
Cybercriminals are sending out fake LinkedIn alert messages that claim to offer job opportunities, but their real goal is to steal user credentials. This phishing campaign tricks recipients into providing sensitive information, putting their accounts at risk. The fraudulent messages imitate legitimate notifications from LinkedIn, making them difficult to detect. Users who fall for this scam could find their personal data compromised, leading to potential identity theft or unauthorized access to their accounts. It's essential for LinkedIn users to be cautious and verify messages before clicking on any links or providing information.
Hackread – Cybersecurity News, Data Breaches, AI and More
Anthropic, the AI research company, accidentally exposed over 512,000 lines of code related to its Claude AI system. This significant leak included sensitive information about two of its projects, KAIROS and Capybara. As a result, users are being urged to switch to the Native Installer to mitigate any potential risks associated with this exposure. The incident raises concerns about data security and the safeguards in place for proprietary code, especially given the competitive nature of the AI industry. It serves as a reminder of how human error can lead to significant breaches of confidentiality and proprietary information.
SCM feed for Latest
The United Arab Emirates is experiencing a rise in cyberattacks fueled by artificial intelligence tools. Attackers, including those linked to state-sponsored groups, are utilizing platforms like ChatGPT to enhance their cyber operations. This trend raises concerns for various sectors in the UAE, as the sophistication of these attacks could lead to significant data breaches and disruptions. The situation underscores the need for stronger cybersecurity measures and awareness among organizations and individuals alike. As the threat landscape evolves with AI, stakeholders must remain vigilant to protect sensitive information and infrastructure.
Google has released a series of updates to address 21 vulnerabilities in its Chrome browser, including a significant zero-day flaw identified as CVE-2026-5281. This vulnerability affects the Dawn component of Chrome and has been exploited in the wild, which means attackers are actively taking advantage of it. Users of Chrome are urged to update their browsers to the latest version to protect themselves against potential exploits. Keeping browsers up to date is crucial as these vulnerabilities can allow unauthorized access or manipulation of user data. The timely patching of such vulnerabilities emphasizes the ongoing need for vigilance in maintaining cybersecurity.
Help Net Security
A recent cyberattack has compromised npm packages for Axios, a widely-used HTTP client library, and is believed to be linked to North Korean hackers known for financially motivated attacks. On March 31, 2026, attackers gained access to a maintainer's npm account and published two malicious packages. These backdoored versions contained a hidden dependency that included a post-install script, which executed automatically upon installation. This incident raises serious concerns for developers and organizations using Axios, as it highlights the vulnerabilities within the software supply chain and the potential for widespread impact on applications relying on this library. Users are urged to take precautions and verify package integrity to avoid falling victim to similar attacks in the future.
A new threat report from Blackpoint Cyber reveals that modern cyber intrusions often begin with valid credentials rather than traditional exploits. Researchers found that many incidents are driven by the abuse of VPNs, remote monitoring and management (RMM) tools, and social engineering tactics. This shift indicates that attackers are increasingly taking advantage of legitimate access points within organizations, which can make detection more challenging. Companies need to strengthen their security measures and educate employees about the risks associated with social engineering to mitigate these threats. The findings highlight the importance of monitoring and managing access privileges to prevent misuse.
SCM feed for Latest
The FBI has issued a public service announcement warning Americans about potential data privacy risks associated with certain mobile apps developed outside the United States. According to the FBI, these apps may gather user data continuously, even if users have only authorized data collection for specific features or during active use. This raises concerns about how user information is monitored and potentially exploited without users' explicit consent. The warning serves as a reminder for individuals to be cautious about the apps they download and the permissions they grant, especially those from foreign developers. Users are urged to review app permissions regularly and consider the potential risks to their personal information.
SecurityWeek
Jonathan Spalletta has been charged for exploiting vulnerabilities in the smart contracts of Uranium, a cryptocurrency exchange, leading to a theft of around $55 million worth of digital assets. The hack forced Uranium to shut down operations, impacting users and investors who relied on the platform for trading. This incident highlights the ongoing risks associated with smart contracts in the crypto space, where security flaws can lead to significant financial losses. The case is part of a broader trend, as law enforcement agencies increase their scrutiny of cybercriminal activities in the cryptocurrency sector. As Spalletta faces legal consequences, it raises awareness about the importance of security measures in protecting digital currencies.
Infosecurity Magazine
A new malware-as-a-service platform called Venom Stealer has emerged, designed to automate the theft of sensitive data such as login credentials and cryptocurrency information. This platform utilizes a method known as ClickFix social engineering to lure victims and extract their data. Venom Stealer represents a growing trend in cybercrime where attackers can easily access sophisticated tools to conduct continuous data theft without needing extensive technical skills. This poses a significant risk to individuals and organizations alike, as it can lead to financial losses and breaches of personal information. Users are urged to remain vigilant and implement strong security measures to protect themselves from potential attacks.
Hackread – Cybersecurity News, Data Breaches, AI and More
Recent research from Seqrite has revealed that ransomware groups are increasingly using legitimate IT tools, such as IOBit Unlocker, to bypass antivirus software. This tactic, known as the 'dual-use dilemma,' allows attackers to exploit trusted software to carry out their malicious activities without raising immediate alarms. By repurposing these tools, they enhance their chances of successfully infiltrating systems and encrypting data for ransom. This trend poses a significant risk to organizations that rely on these tools for legitimate purposes, as it complicates detection and response efforts. As cybercriminals continue to adapt their methods, companies must remain vigilant and consider revising their security measures to account for the misuse of legitimate software.
BleepingComputer
The FBI has issued a warning to American users about the potential privacy risks associated with mobile applications developed in China. This caution arises from concerns that these apps might collect sensitive data and share it with the Chinese government. The FBI emphasizes that the use of such apps could compromise personal and national security. Users are encouraged to be cautious and consider the implications of downloading these applications, particularly those that require extensive permissions. This warning reflects growing scrutiny over foreign technology and its impact on user privacy and data security.
Help Net Security
CVE-2026-5281Google has addressed 21 vulnerabilities in its Chrome browser, including a serious zero-day flaw identified as CVE-2026-5281. This vulnerability is categorized as a use-after-free (UAF) issue in Dawn, which is part of the WebGPU standard utilized by Chromium and its derivatives. While specific details about the exploitation of this flaw are scarce, the fact that it has been flagged as 'in-the-wild' suggests that attackers are actively using it. Users of Chrome and other Chromium-based browsers should ensure they are running the latest versions to protect themselves from potential attacks. Keeping browsers updated is crucial because such vulnerabilities can lead to unauthorized access or other malicious activities.
SCM feed for Latest
Venom Stealer is a type of malware-as-a-service (MaaS) that has been linked to various cyberattacks, including those targeting ClickFix and cryptocurrency theft. Once it infiltrates a victim's device, the malware remains persistent, immediately stealing sensitive data without storing it locally. This rapid exfiltration process makes it particularly dangerous, as victims may not even realize their information has been compromised until it’s too late. The versatility of Venom Stealer in targeting both general data and specific financial information poses a significant risk to individuals and organizations alike. As cybercriminals increasingly adopt such services, users need to be vigilant about their cybersecurity practices.