Security Affairs newsletter Round 561 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Overview

The latest edition of the Security Affairs newsletter covers several significant cybersecurity developments. Notably, the Department of Justice has released information about a skilled hacker allegedly working for Jeffrey Epstein, raising concerns about the implications of such associations for cybersecurity. Additionally, cyberattacks have disrupted communication systems at Wind and Solar companies, highlighting vulnerabilities in critical infrastructure. These incidents underscore the ongoing risks that hackers pose to both individuals and organizations, particularly in sectors that are essential for energy generation and distribution. As these stories unfold, they serve as a reminder for companies to enhance their security measures and for users to remain vigilant against potential threats.

Key Takeaways

  • Affected Systems: Wind and Solar communications systems
  • Action Required: Companies should review and strengthen their cybersecurity protocols, particularly in critical infrastructure.
  • Timeline: Newly disclosed

Original Article Summary

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. DOJ releases details alleged talented hacker working for Jeffrey Epstein Cyberattacks Disrupt Communications at Wind, Solar, […]

Impact

Wind and Solar communications systems

Exploitation Status

The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.

Timeline

Newly disclosed

Remediation

Companies should review and strengthen their cybersecurity protocols, particularly in critical infrastructure.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Critical.

Related Coverage

Ransomware surge prompts FCC guidance for stronger telecom security practices

SCM feed for Latest

The Federal Communications Commission (FCC) is urging telecom companies to enhance their cybersecurity practices in response to a rise in ransomware attacks. The FCC emphasizes that implementing basic security measures, such as regularly updating software, using multifactor authentication, and segmenting networks, can greatly reduce the risk of falling victim to these attacks. This guidance comes as ransomware continues to pose a significant threat to the telecommunications sector, which plays a crucial role in national infrastructure. By adopting these recommended practices, telecom providers can better protect sensitive customer data and ensure the reliability of their services. The FCC's advice serves as a timely reminder for the industry to stay vigilant against evolving cyber threats.

Feb 4, 2026

Denmark subjected to sweeping Russian cyberattack threats

SCM feed for Latest

Denmark is facing a significant cyber threat from a pro-Russian hacker group known as the Russian Legion. This group has declared intentions to launch large-scale cyber intrusions in response to Denmark's plans to provide military aid to Ukraine. The threat underscores the ongoing tensions between Russia and countries supporting Ukraine, marking a potential escalation in cyber warfare tactics. As Denmark prepares for these potential attacks, the government and cybersecurity agencies will need to bolster their defenses to protect critical infrastructure and sensitive data. This situation serves as a reminder of the complex relationship between geopolitical events and cybersecurity risks.

Feb 4, 2026

Negotiating with Scattered Lapsu$ Hunters discouraged

SCM feed for Latest

Experts from Unit 221B have issued a warning to organizations targeted by the Scattered Lapsus$ Hunters hacking group. They advise against negotiating with these attackers, as doing so can lead to intensified extortion attempts and victim harassment. Additionally, there is a strong likelihood that the attackers will not fulfill any promises to return stolen data. This situation raises concerns for companies that may be tempted to pay ransoms, as the risks associated with negotiation appear to outweigh any potential benefits. Organizations must be aware of these tactics and consider alternative strategies for addressing such incidents.

Feb 3, 2026

Cantwell claims telecoms blocked release of Salt Typhoon report

CyberScoop

Senator Maria Cantwell from Washington is pushing for hearings to investigate how AT&T and Verizon have responded to recent cyberattacks targeting telecom networks. She claims that these companies have obstructed the release of a report known as Salt Typhoon, which likely contains critical information about the hacks. Cantwell's calls for transparency come amid growing concerns about the security of telecommunication infrastructure, especially as it plays a vital role in national security and everyday communications. The outcome of these hearings could lead to increased accountability for telecom companies in how they protect their networks and respond to breaches.

Feb 3, 2026

What’s next for DHS’s forthcoming replacement critical infrastructure protection panel, AI information sharing

CyberScoop

Nick Andersen, a senior official at the Cybersecurity and Infrastructure Security Agency (CISA), recently outlined plans to enhance the Critical Infrastructure Partnership Advisory Council (CIPAC) and establish an Artificial Intelligence Information Sharing and Analysis Center (AI-ISAC). These initiatives aim to improve collaboration among government agencies and private sector organizations to better protect critical infrastructure. The focus on AI in cybersecurity reflects growing concerns about the potential risks and vulnerabilities associated with emerging technologies. The establishment of the AI-ISAC would facilitate the sharing of information related to AI threats, helping organizations stay ahead of potential cyber attacks. This move is significant as it underscores the need for updated frameworks to address the evolving landscape of cybersecurity challenges.

Feb 3, 2026

Ivanti’s EPMM is under active attack, thanks to two critical zero-days

CyberScoop

Ivanti's Endpoint Manager Mobile (EPMM) is currently facing serious security threats due to two newly discovered zero-day vulnerabilities. Initial limited attacks were reported before Ivanti made its findings public, but since then, numerous threat groups have exploited these weaknesses, leading to a surge in attacks. More than 1,400 instances of EPMM remain exposed, putting organizations at risk of unauthorized access and data breaches. This situation is alarming as it highlights the vulnerabilities in widely used software, prompting urgent action from affected users to protect their systems. Companies using EPMM should prioritize patching and securing their environments to mitigate the risks associated with these vulnerabilities.

Feb 3, 2026