In Q3 2025, researchers reported a range of cybersecurity threats targeting industrial automation systems, specifically noting the prevalence of miners, ransomware, and spyware on ICS computers. These threats pose significant risks to critical infrastructure, potentially disrupting operations and compromising sensitive data. The report underscores the ongoing challenges faced by organizations in safeguarding their industrial systems against increasingly sophisticated attacks. Companies operating in this space need to remain vigilant and proactive in their cybersecurity measures to mitigate these risks. The findings serve as a reminder that industrial environments are not immune to the growing tide of cyber threats.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
Fortinet has reported that a five-year-old vulnerability in its FortiOS SSL VPN is being actively exploited. This flaw, identified as CVE-2020-12812, allows attackers to bypass two-factor authentication under specific configurations, enabling unauthorized access to systems. Organizations using affected versions of FortiOS SSL VPN should be particularly vigilant, as this vulnerability could lead to significant security breaches. The issue emphasizes the need for users to ensure their VPN configurations are secure and up-to-date. Fortinet's warning serves as a critical reminder of the importance of addressing known vulnerabilities, even those that have been around for several years.
Infosecurity Magazine
The U.S. Securities and Exchange Commission (SEC) has filed charges against multiple cryptocurrency platforms and investment clubs for allegedly scamming investors out of more than $14 million. These entities misled U.S. investors, promising high returns on investments in crypto-related schemes. The SEC's action aims to protect investors and maintain market integrity by holding these firms accountable for their fraudulent activities. This case underscores the ongoing risks in the cryptocurrency space, where scams can thrive amid a lack of regulation and oversight. Investors should remain vigilant and conduct thorough research before engaging with any investment platform.
On Monday, the French national postal service, La Poste, experienced a significant disruption due to a Distributed Denial of Service (DDoS) attack. The attack caused central computer systems to go offline, impacting operations across the postal service. Pro-Russian hacker groups have claimed responsibility for the incident, raising concerns about the motivations behind such attacks amid ongoing geopolitical tensions. This incident not only disrupts postal services but also highlights the vulnerability of critical infrastructure to cyber threats. As La Poste works to restore services, this event serves as a reminder of the increasing frequency and severity of cyberattacks targeting essential services.
In 2025, small and medium-sized businesses (SMBs) faced a surge in cyberattacks that challenged assumptions about which sectors were at risk. Cybercriminals increasingly targeted these businesses, breaching networks to steal sensitive data and sell it on the dark web, leading to significant financial losses. As the tactics used by attackers evolve, businesses need to rethink their security strategies to protect themselves from these threats. The article outlines three key measures companies should adopt to safeguard their operations in 2026. This shift in focus to SMBs is crucial, as many may not have the resources to defend against sophisticated attacks, making them more vulnerable.
Hackread – Cybersecurity News, Data Breaches, AI, and More
Researchers have identified significant vulnerabilities in Eurostar's AI chatbot, including issues like prompt injection and HTML injection. These flaws could potentially allow attackers to manipulate the chatbot's responses or access sensitive information. Instead of addressing these concerns, Eurostar accused the researchers of blackmail, raising questions about the company's approach to cybersecurity and transparency. This incident highlights the ongoing challenges companies face in securing their AI technologies and the importance of open communication with researchers who uncover vulnerabilities. Users of the chatbot may be at risk if these issues are not addressed promptly.
Infosecurity Magazine
The French postal service, La Poste, has been facing significant disruptions due to a major DDoS (Distributed Denial of Service) attack. This incident, which occurred just before Christmas, has rendered their online services largely inaccessible, impacting both customers and businesses that rely on postal services during the holiday season. La Poste acknowledged the situation and described it as a 'major network incident.' As the postal service works to restore functionality, users may experience delays and challenges in sending and receiving packages, which is particularly concerning during this busy time of year. The attack raises important questions about the security of critical infrastructure and the potential for further disruptions in similar sectors.
Kaspersky's GReAT team has released findings on a sophisticated attack by a group known as Evasive Panda APT. This group employs a technique that poisons DNS requests to deploy a malicious implant called MgBot. The attack chain includes the use of shellcode that is encrypted with DPAPI and RC5, making it harder to detect. This method poses a significant risk as it can compromise systems and networks by redirecting legitimate traffic to malicious sites. Organizations need to be aware of these tactics to prevent potential breaches and protect their infrastructure.
Help Net Security
A recent study from the University of Maryland and North Carolina State University raises concerns about the effectiveness of paper-based counterfeit protection systems, specifically those using paper physically unclonable functions (PUFs). These systems authenticate products by relying on unique microscopic variations in the paper's surface. However, the research indicates that these systems can be disrupted or bypassed, potentially allowing counterfeiters to replicate products without detection. This finding is significant as it questions the reliance on paper PUFs in securing product authenticity, impacting industries that use these methods for anti-counterfeiting measures. The results suggest that companies need to reconsider their security strategies to address these vulnerabilities.
Security Affairs
A recent breach involving Red Hat’s self-managed GitLab has compromised the data of approximately 21,000 Nissan customers. The Japanese automaker confirmed that attackers accessed their GitLab instance, which is used by Red Hat Consulting. This incident raises significant concerns about data security, especially given the sensitive nature of the information that may have been stolen. Such breaches can lead to identity theft and further exploitation of affected individuals. Companies like Nissan must prioritize their cybersecurity measures to protect customer data and maintain trust.
As cyberattacks targeting the healthcare sector increase, industry organizations are expressing concerns over proposed changes to the HIPAA security rules. Many in the healthcare field believe that the revisions do not adequately address the growing threats and vulnerabilities. The healthcare industry is under significant strain as attackers exploit weaknesses, which could compromise patient data and disrupt services. Stakeholders are advocating for more comprehensive measures to enhance security and better protect sensitive health information. This ongoing debate highlights the urgent need for updated regulations that reflect the current cybersecurity landscape.
OpenAI is actively testing its ChatGPT Atlas browser for vulnerabilities, specifically against prompt injection attacks. Using an automated attacker, the company simulates the actions of human hackers to assess the system's defenses. However, the ongoing nature of these tests reveals that while the browser is being fortified, safety cannot be fully guaranteed. This effort is crucial as prompt injection attacks can manipulate the AI's responses, potentially leading to misinformation or harmful outputs. As OpenAI works to enhance security, users and developers must remain vigilant about the risks associated with AI-driven technologies.
Infosecurity Magazine
The Clop ransomware group has claimed responsibility for a significant data breach at the University of Phoenix, affecting approximately 3.5 million people. The breach reportedly exposed sensitive information, although the exact nature of the data compromised has not been detailed. This incident raises serious concerns about the security measures in place at educational institutions and the potential for misuse of the stolen data. Individuals affected by the breach may face risks such as identity theft or phishing attempts. As the investigation continues, it underscores the need for stronger cybersecurity protocols to protect personal information in higher education settings.
Hackread – Cybersecurity News, Data Breaches, AI, and More
Romania's national water authority, Romanian Waters, recently experienced a significant ransomware attack that affected around 1,000 of its systems. Fortunately, the attack did not compromise the safety of the dams, which remain secure. Authorities are actively working to restore operations without paying the ransom demanded by the attackers. This incident is a stark reminder of the vulnerabilities critical infrastructure faces from cyber threats, emphasizing the need for robust cybersecurity measures in public services. The situation is still developing as officials assess the full impact and work on recovery efforts.
BleepingComputer
Two malicious Chrome extensions called 'Phantom Shuttle' have been discovered in the Chrome Web Store, masquerading as tools for a proxy service. These extensions are designed to hijack user traffic and steal sensitive information, including login credentials. Users who have installed these extensions are at risk of having their personal data compromised. This incident serves as a reminder for users to be cautious when downloading browser extensions and to regularly review their installed plugins. Google has a responsibility to monitor the extensions available in its store to protect users from such threats.